text
stringlengths
70
351k
source
stringclasses
4 values
<|meta_start|><|file|> hyperswitch/crates/router/src/core/payments/flows/session_flow.rs<|crate|> router anchor=is_dynamic_fields_required kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/payments/flows/session_flow.rs" role="context" start="195" end="227"> fn is_dynamic_fields_required( required_fields: &settings::RequiredFields, payment_method: enums::PaymentMethod, payment_method_type: enums::PaymentMethodType, connector: types::Connector, required_field_type: Vec<enums::FieldType>, ) -> bool { required_fields .0 .get(&payment_method) .and_then(|pm_type| pm_type.0.get(&payment_method_type)) .and_then(|required_fields_for_connector| { required_fields_for_connector.fields.get(&connector) }) .map(|required_fields_final| { required_fields_final .non_mandate .iter() .flatten() .any(|field_info| required_field_type.contains(&field_info.field_type)) || required_fields_final .mandate .iter() .flatten() .any(|field_info| required_field_type.contains(&field_info.field_type)) || required_fields_final .common .iter() .flatten() .any(|field_info| required_field_type.contains(&field_info.field_type)) }) .unwrap_or(false) } <file_sep path="hyperswitch/crates/router/src/core/payments/flows/session_flow.rs" role="context" start="194" end="194"> use common_utils::{ ext_traits::ByteSliceExt, request::RequestContent, types::{AmountConvertor, StringMajorUnitForConnector}, }; use crate::{ consts::PROTOCOL, core::{ errors::{self, ConnectorErrorExt, RouterResult}, payments::{self, access_token, helpers, transformers, PaymentData}, }, headers, logger, routes::{self, app::settings, metrics}, services, types::{ self, api::{self, enums}, domain, }, utils::OptionExt, }; <file_sep path="hyperswitch/crates/router/src/core/payments/flows/session_flow.rs" role="context" start="253" end="573"> async fn create_applepay_session_token( state: &routes::SessionState, router_data: &types::PaymentsSessionRouterData, connector: &api::ConnectorData, business_profile: &domain::Profile, header_payload: hyperswitch_domain_models::payments::HeaderPayload, ) -> RouterResult<types::PaymentsSessionRouterData> { let delayed_response = is_session_response_delayed(state, connector); if delayed_response { let delayed_response_apple_pay_session = Some(payment_types::ApplePaySessionResponse::NoSessionResponse); create_apple_pay_session_response( router_data, delayed_response_apple_pay_session, None, // Apple pay payment request will be none for delayed session response connector.connector_name.to_string(), delayed_response, payment_types::NextActionCall::Confirm, header_payload, ) } else { // Get the apple pay metadata let apple_pay_metadata = helpers::get_applepay_metadata(router_data.connector_meta_data.clone()) .attach_printable( "Failed to to fetch apple pay certificates during session call", )?; // Get payment request data , apple pay session request and merchant keys let ( payment_request_data, apple_pay_session_request_optional, apple_pay_merchant_cert, apple_pay_merchant_cert_key, apple_pay_merchant_identifier, merchant_business_country, merchant_configured_domain_optional, ) = match apple_pay_metadata { payment_types::ApplepaySessionTokenMetadata::ApplePayCombined( apple_pay_combined_metadata, ) => match apple_pay_combined_metadata { payment_types::ApplePayCombinedMetadata::Simplified { payment_request_data, session_token_data, } => { logger::info!("Apple pay simplified flow"); let merchant_identifier = state .conf .applepay_merchant_configs .get_inner() .common_merchant_identifier .clone() .expose(); let merchant_business_country = session_token_data.merchant_business_country; let apple_pay_session_request = get_session_request_for_simplified_apple_pay( merchant_identifier.clone(), session_token_data.clone(), ); let apple_pay_merchant_cert = state .conf .applepay_decrypt_keys .get_inner() .apple_pay_merchant_cert .clone(); let apple_pay_merchant_cert_key = state .conf .applepay_decrypt_keys .get_inner() .apple_pay_merchant_cert_key .clone(); ( payment_request_data, Ok(apple_pay_session_request), apple_pay_merchant_cert, apple_pay_merchant_cert_key, merchant_identifier, merchant_business_country, Some(session_token_data.initiative_context), ) } payment_types::ApplePayCombinedMetadata::Manual { payment_request_data, session_token_data, } => { logger::info!("Apple pay manual flow"); let apple_pay_session_request = get_session_request_for_manual_apple_pay( session_token_data.clone(), header_payload.x_merchant_domain.clone(), ); let merchant_business_country = session_token_data.merchant_business_country; ( payment_request_data, apple_pay_session_request, session_token_data.certificate.clone(), session_token_data.certificate_keys, session_token_data.merchant_identifier, merchant_business_country, session_token_data.initiative_context, ) } }, payment_types::ApplepaySessionTokenMetadata::ApplePay(apple_pay_metadata) => { logger::info!("Apple pay manual flow"); let apple_pay_session_request = get_session_request_for_manual_apple_pay( apple_pay_metadata.session_token_data.clone(), header_payload.x_merchant_domain.clone(), ); let merchant_business_country = apple_pay_metadata .session_token_data .merchant_business_country; ( apple_pay_metadata.payment_request_data, apple_pay_session_request, apple_pay_metadata.session_token_data.certificate.clone(), apple_pay_metadata .session_token_data .certificate_keys .clone(), apple_pay_metadata.session_token_data.merchant_identifier, merchant_business_country, apple_pay_metadata.session_token_data.initiative_context, ) } }; // Get amount info for apple pay let amount_info = get_apple_pay_amount_info( payment_request_data.label.as_str(), router_data.request.to_owned(), )?; let required_billing_contact_fields = if business_profile .always_collect_billing_details_from_wallet_connector .unwrap_or(false) { Some(payment_types::ApplePayBillingContactFields(vec![ payment_types::ApplePayAddressParameters::PostalAddress, ])) } else if business_profile .collect_billing_details_from_wallet_connector .unwrap_or(false) { let billing_variants = enums::FieldType::get_billing_variants(); is_dynamic_fields_required( &state.conf.required_fields, enums::PaymentMethod::Wallet, enums::PaymentMethodType::ApplePay, connector.connector_name, billing_variants, ) .then_some(payment_types::ApplePayBillingContactFields(vec![ payment_types::ApplePayAddressParameters::PostalAddress, ])) } else { None }; let required_shipping_contact_fields = if business_profile .always_collect_shipping_details_from_wallet_connector .unwrap_or(false) { Some(payment_types::ApplePayShippingContactFields(vec![ payment_types::ApplePayAddressParameters::PostalAddress, payment_types::ApplePayAddressParameters::Phone, payment_types::ApplePayAddressParameters::Email, ])) } else if business_profile .collect_shipping_details_from_wallet_connector .unwrap_or(false) { let shipping_variants = enums::FieldType::get_shipping_variants(); is_dynamic_fields_required( &state.conf.required_fields, enums::PaymentMethod::Wallet, enums::PaymentMethodType::ApplePay, connector.connector_name, shipping_variants, ) .then_some(payment_types::ApplePayShippingContactFields(vec![ payment_types::ApplePayAddressParameters::PostalAddress, payment_types::ApplePayAddressParameters::Phone, payment_types::ApplePayAddressParameters::Email, ])) } else { None }; // If collect_shipping_details_from_wallet_connector is false, we check if // collect_billing_details_from_wallet_connector is true. If it is, then we pass the Email and Phone in // ApplePayShippingContactFields as it is a required parameter and ApplePayBillingContactFields // does not contain Email and Phone. let required_shipping_contact_fields_updated = if required_billing_contact_fields.is_some() && required_shipping_contact_fields.is_none() { Some(payment_types::ApplePayShippingContactFields(vec![ payment_types::ApplePayAddressParameters::Phone, payment_types::ApplePayAddressParameters::Email, ])) } else { required_shipping_contact_fields }; // Get apple pay payment request let applepay_payment_request = get_apple_pay_payment_request( amount_info, payment_request_data, router_data.request.to_owned(), apple_pay_merchant_identifier.as_str(), merchant_business_country, required_billing_contact_fields, required_shipping_contact_fields_updated, )?; let apple_pay_session_response = match ( header_payload.browser_name.clone(), header_payload.x_client_platform.clone(), ) { (Some(common_enums::BrowserName::Safari), Some(common_enums::ClientPlatform::Web)) | (None, None) => { let apple_pay_session_request = apple_pay_session_request_optional .attach_printable("Failed to obtain apple pay session request")?; let applepay_session_request = build_apple_pay_session_request( state, apple_pay_session_request.clone(), apple_pay_merchant_cert.clone(), apple_pay_merchant_cert_key.clone(), )?; let response = services::call_connector_api( state, applepay_session_request, "create_apple_pay_session_token", ) .await; let updated_response = match ( response.as_ref().ok(), header_payload.x_merchant_domain.clone(), ) { (Some(Err(error)), Some(_)) => { logger::error!( "Retry apple pay session call with the merchant configured domain {error:?}" ); let merchant_configured_domain = merchant_configured_domain_optional .get_required_value("apple pay domain") .attach_printable("Failed to get domain for apple pay session call")?; let apple_pay_retry_session_request = payment_types::ApplepaySessionRequest { initiative_context: merchant_configured_domain, ..apple_pay_session_request }; let applepay_retry_session_request = build_apple_pay_session_request( state, apple_pay_retry_session_request, apple_pay_merchant_cert, apple_pay_merchant_cert_key, )?; services::call_connector_api( state, applepay_retry_session_request, "create_apple_pay_session_token", ) .await } _ => response, }; // logging the error if present in session call response log_session_response_if_error(&updated_response); updated_response .ok() .and_then(|apple_pay_res| { apple_pay_res .map(|res| { let response: Result< payment_types::NoThirdPartySdkSessionResponse, Report<common_utils::errors::ParsingError>, > = res.response.parse_struct("NoThirdPartySdkSessionResponse"); // logging the parsing failed error if let Err(error) = response.as_ref() { logger::error!(?error); }; response.ok() }) .ok() }) .flatten() } _ => { logger::debug!("Skipping apple pay session call based on the browser name"); None } }; let session_response = apple_pay_session_response.map(payment_types::ApplePaySessionResponse::NoThirdPartySdk); create_apple_pay_session_response( router_data, session_response, Some(applepay_payment_request), connector.connector_name.to_string(), delayed_response, payment_types::NextActionCall::Confirm, header_payload, ) } } <file_sep path="hyperswitch/crates/router/src/core/payments/flows/session_flow.rs" role="context" start="229" end="251"> fn build_apple_pay_session_request( state: &routes::SessionState, request: payment_types::ApplepaySessionRequest, apple_pay_merchant_cert: masking::Secret<String>, apple_pay_merchant_cert_key: masking::Secret<String>, ) -> RouterResult<services::Request> { let mut url = state.conf.connectors.applepay.base_url.to_owned(); url.push_str("paymentservices/paymentSession"); let session_request = services::RequestBuilder::new() .method(services::Method::Post) .url(url.as_str()) .attach_default_headers() .headers(vec![( headers::CONTENT_TYPE.to_string(), "application/json".to_string().into(), )]) .set_body(RequestContent::Json(Box::new(request))) .add_certificate(Some(apple_pay_merchant_cert)) .add_certificate_key(Some(apple_pay_merchant_cert_key)) .build(); Ok(session_request) } <file_sep path="hyperswitch/crates/router/src/core/payments/flows/session_flow.rs" role="context" start="161" end="190"> fn is_dynamic_fields_required( required_fields: &settings::RequiredFields, payment_method: enums::PaymentMethod, payment_method_type: enums::PaymentMethodType, connector: types::Connector, required_field_type: Vec<enums::FieldType>, ) -> bool { required_fields .0 .get(&payment_method) .and_then(|pm_type| pm_type.0.get(&payment_method_type)) .and_then(|required_fields_for_connector| { required_fields_for_connector.fields.get(&connector) }) .map(|required_fields_final| { required_fields_final .non_mandate .iter() .any(|(_, val)| required_field_type.contains(&val.field_type)) || required_fields_final .mandate .iter() .any(|(_, val)| required_field_type.contains(&val.field_type)) || required_fields_final .common .iter() .any(|(_, val)| required_field_type.contains(&val.field_type)) }) .unwrap_or(false) } <file_sep path="hyperswitch/crates/router/src/core/payments/flows/session_flow.rs" role="context" start="146" end="155"> async fn add_access_token<'a>( &self, state: &routes::SessionState, connector: &api::ConnectorData, merchant_account: &domain::MerchantAccount, creds_identifier: Option<&str>, ) -> RouterResult<types::AddAccessTokenResult> { access_token::add_access_token(state, connector, merchant_account, self, creds_identifier) .await } <file_sep path="hyperswitch/crates/router/src/core/payments/flows/session_flow.rs" role="context" start="716" end="744"> fn is_billing_address_required_to_be_collected_from_wallet( state: &routes::SessionState, connector: &api::ConnectorData, business_profile: &domain::Profile, payment_method_type: enums::PaymentMethodType, ) -> bool { let always_collect_billing_details_from_wallet_connector = business_profile .always_collect_billing_details_from_wallet_connector .unwrap_or(false); if always_collect_billing_details_from_wallet_connector { always_collect_billing_details_from_wallet_connector } else if business_profile .collect_billing_details_from_wallet_connector .unwrap_or(false) { let billing_variants = enums::FieldType::get_billing_variants(); is_dynamic_fields_required( &state.conf.required_fields, enums::PaymentMethod::Wallet, payment_method_type, connector.connector_name, billing_variants, ) } else { false } } <file_sep path="hyperswitch/v2_compatible_migrations/2024-08-28-081721_add_v2_columns/up.sql" role="context" start="54" end="70"> ADD COLUMN redirection_data JSONB, ADD COLUMN connector_payment_data TEXT, ADD COLUMN connector_token_details JSONB; -- Change the type of the column from JSON to JSONB ALTER TABLE merchant_connector_account ADD COLUMN IF NOT EXISTS feature_metadata JSONB; ALTER TABLE payment_methods ADD COLUMN IF NOT EXISTS locker_fingerprint_id VARCHAR(64), ADD COLUMN IF NOT EXISTS payment_method_type_v2 VARCHAR(64), ADD COLUMN IF NOT EXISTS payment_method_subtype VARCHAR(64); ALTER TABLE refund ADD COLUMN IF NOT EXISTS id VARCHAR(64), ADD COLUMN IF NOT EXISTS merchant_reference_id VARCHAR(64), ADD COLUMN IF NOT EXISTS connector_id VARCHAR(64); <file_sep path="hyperswitch/crates/api_models/src/enums.rs" role="context" start="209" end="255"> pub enum FieldType { UserCardNumber, UserCardExpiryMonth, UserCardExpiryYear, UserCardCvc, UserCardNetwork, UserFullName, UserEmailAddress, UserPhoneNumber, UserPhoneNumberCountryCode, //phone number's country code UserCountry { options: Vec<String> }, //for country inside payment method data ex- bank redirect UserCurrency { options: Vec<String> }, UserCryptoCurrencyNetwork, //for crypto network associated with the cryptopcurrency UserBillingName, UserAddressLine1, UserAddressLine2, UserAddressCity, UserAddressPincode, UserAddressState, UserAddressCountry { options: Vec<String> }, UserShippingName, UserShippingAddressLine1, UserShippingAddressLine2, UserShippingAddressCity, UserShippingAddressPincode, UserShippingAddressState, UserShippingAddressCountry { options: Vec<String> }, UserSocialSecurityNumber, UserBlikCode, UserBank, UserBankAccountNumber, Text, DropDown { options: Vec<String> }, UserDateOfBirth, UserVpaId, LanguagePreference { options: Vec<String> }, UserPixKey, UserCpf, UserCnpj, UserIban, UserBsbNumber, UserBankSortCode, UserBankRoutingNumber, UserMsisdn, UserClientIdentifier, OrderDetailsProductName, }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/payments/transformers.rs<|crate|> router anchor=foreign_try_from kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/payments/transformers.rs" role="context" start="4038" end="4081"> fn foreign_try_from( capture_sync_response: types::CaptureSyncResponse, ) -> Result<Self, Self::Error> { match capture_sync_response { types::CaptureSyncResponse::Success { resource_id, status, connector_response_reference_id, .. } => { let (connector_capture_id, processor_capture_data) = match resource_id { types::ResponseId::EncodedData(_) | types::ResponseId::NoResponseId => { (None, None) } types::ResponseId::ConnectorTransactionId(id) => { let (txn_id, txn_data) = common_utils_type::ConnectorTransactionId::form_id_and_data(id); (Some(txn_id), txn_data) } }; Ok(Self::ResponseUpdate { status: enums::CaptureStatus::foreign_try_from(status)?, connector_capture_id, connector_response_reference_id, processor_capture_data, }) } types::CaptureSyncResponse::Error { code, message, reason, status_code, .. } => Ok(Self::ErrorUpdate { status: match status_code { 500..=511 => enums::CaptureStatus::Pending, _ => enums::CaptureStatus::Failed, }, error_code: Some(code), error_message: Some(message), error_reason: reason, }), } } <file_sep path="hyperswitch/crates/router/src/core/payments/transformers.rs" role="context" start="4037" end="4037"> use common_utils::{ consts::X_HS_LATENCY, fp_utils, pii, types::{ self as common_utils_type, AmountConvertor, MinorUnit, StringMajorUnit, StringMajorUnitForConnector, }, }; use super::{flows::Feature, types::AuthenticationData, OperationSessionGetters, PaymentData}; use crate::{ configs::settings::ConnectorRequestReferenceIdConfig, core::{ errors::{self, RouterResponse, RouterResult}, payments::{self, helpers}, utils as core_utils, }, headers::X_PAYMENT_CONFIRM_SOURCE, routes::{metrics, SessionState}, services::{self, RedirectForm}, types::{ self, api::{self, ConnectorTransactionId}, domain, storage::{self, enums}, transformers::{ForeignFrom, ForeignInto, ForeignTryFrom}, MultipleCaptureRequestData, }, utils::{OptionExt, ValueExt}, }; <file_sep path="hyperswitch/crates/router/src/core/payments/transformers.rs" role="context" start="4167" end="4169"> fn try_from(additional_data: PaymentAdditionalData<'_, F>) -> Result<Self, Self::Error> { todo!() } <file_sep path="hyperswitch/crates/router/src/core/payments/transformers.rs" role="context" start="4088" end="4160"> fn try_from(additional_data: PaymentAdditionalData<'_, F>) -> Result<Self, Self::Error> { let payment_data = additional_data.payment_data; let router_base_url = &additional_data.router_base_url; let connector_name = &additional_data.connector_name; let attempt = &payment_data.payment_attempt; let browser_info: Option<types::BrowserInformation> = payment_data .payment_attempt .browser_info .clone() .map(|b| b.parse_value("BrowserInformation")) .transpose() .change_context(errors::ApiErrorResponse::InvalidDataValue { field_name: "browser_info", })?; let redirect_response = payment_data.redirect_response.map(|redirect| { types::CompleteAuthorizeRedirectResponse { params: redirect.param, payload: redirect.json_payload, } }); let amount = payment_data.payment_attempt.get_total_amount(); let complete_authorize_url = Some(helpers::create_complete_authorize_url( router_base_url, attempt, connector_name, payment_data.creds_identifier.as_deref(), )); let braintree_metadata = payment_data .payment_intent .connector_metadata .clone() .map(|cm| { cm.parse_value::<api_models::payments::ConnectorMetadata>("ConnectorMetadata") .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed parsing ConnectorMetadata") }) .transpose()? .and_then(|cm| cm.braintree); let merchant_account_id = braintree_metadata .as_ref() .and_then(|braintree| braintree.merchant_account_id.clone()); let merchant_config_currency = braintree_metadata.and_then(|braintree| braintree.merchant_config_currency); Ok(Self { setup_future_usage: payment_data.payment_intent.setup_future_usage, mandate_id: payment_data.mandate_id.clone(), off_session: payment_data.mandate_id.as_ref().map(|_| true), setup_mandate_details: payment_data.setup_mandate.clone(), confirm: payment_data.payment_attempt.confirm, statement_descriptor_suffix: payment_data.payment_intent.statement_descriptor_suffix, capture_method: payment_data.payment_attempt.capture_method, amount: amount.get_amount_as_i64(), // need to change once we move to connector module minor_amount: amount, currency: payment_data.currency, browser_info, email: payment_data.email, payment_method_data: payment_data.payment_method_data, connector_transaction_id: payment_data .payment_attempt .get_connector_payment_id() .map(ToString::to_string), redirect_response, connector_meta: payment_data.payment_attempt.connector_metadata, complete_authorize_url, metadata: payment_data.payment_intent.metadata, customer_acceptance: payment_data.customer_acceptance, merchant_account_id, merchant_config_currency, threeds_method_comp_ind: payment_data.threeds_method_comp_ind, }) } <file_sep path="hyperswitch/crates/router/src/core/payments/transformers.rs" role="context" start="4030" end="4032"> fn try_from(additional_data: PaymentAdditionalData<'_, F>) -> Result<Self, Self::Error> { todo!() } <file_sep path="hyperswitch/crates/router/src/core/payments/transformers.rs" role="context" start="3942" end="4023"> fn try_from(additional_data: PaymentAdditionalData<'_, F>) -> Result<Self, Self::Error> { let payment_data = additional_data.payment_data; let router_base_url = &additional_data.router_base_url; let connector_name = &additional_data.connector_name; let attempt = &payment_data.payment_attempt; let router_return_url = Some(helpers::create_redirect_url( router_base_url, attempt, connector_name, payment_data.creds_identifier.as_deref(), )); let browser_info: Option<types::BrowserInformation> = attempt .browser_info .clone() .map(|b| b.parse_value("BrowserInformation")) .transpose() .change_context(errors::ApiErrorResponse::InvalidDataValue { field_name: "browser_info", })?; let customer_name = additional_data .customer_data .as_ref() .and_then(|customer_data| { customer_data .name .as_ref() .map(|customer| customer.clone().into_inner()) }); let amount = payment_data.payment_attempt.get_total_amount(); let merchant_connector_account_id_or_connector_name = payment_data .payment_attempt .merchant_connector_id .as_ref() .map(|mca_id| mca_id.get_string_repr()) .unwrap_or(connector_name); let webhook_url = Some(helpers::create_webhook_url( router_base_url, &attempt.merchant_id, merchant_connector_account_id_or_connector_name, )); let complete_authorize_url = Some(helpers::create_complete_authorize_url( router_base_url, attempt, connector_name, payment_data.creds_identifier.as_deref(), )); Ok(Self { currency: payment_data.currency, confirm: true, amount: Some(amount.get_amount_as_i64()), //need to change once we move to connector module minor_amount: Some(amount), payment_method_data: (payment_data .payment_method_data .get_required_value("payment_method_data")?), statement_descriptor_suffix: payment_data.payment_intent.statement_descriptor_suffix, setup_future_usage: payment_data.payment_intent.setup_future_usage, off_session: payment_data.mandate_id.as_ref().map(|_| true), mandate_id: payment_data.mandate_id.clone(), setup_mandate_details: payment_data.setup_mandate, customer_acceptance: payment_data.customer_acceptance, router_return_url, email: payment_data.email, customer_name, return_url: payment_data.payment_intent.return_url, browser_info, payment_method_type: attempt.payment_method_type, request_incremental_authorization: matches!( payment_data .payment_intent .request_incremental_authorization, Some(RequestIncrementalAuthorization::True) | Some(RequestIncrementalAuthorization::Default) ), metadata: payment_data.payment_intent.metadata.clone().map(Into::into), shipping_cost: payment_data.payment_intent.shipping_cost, webhook_url, complete_authorize_url, capture_method: payment_data.payment_attempt.capture_method, }) } <file_sep path="hyperswitch/crates/router/src/core/payments/transformers.rs" role="context" start="1454" end="1503"> fn generate_response( payment_data: D, _customer: Option<domain::Customer>, _auth_flow: services::AuthFlow, _base_url: &str, _operation: Op, _connector_request_reference_id_config: &ConnectorRequestReferenceIdConfig, _connector_http_status_code: Option<u16>, _external_latency: Option<u128>, _is_latency_header_enabled: Option<bool>, ) -> RouterResponse<Self> { let mut amount = payment_data.get_payment_intent().amount; let shipping_cost = payment_data.get_payment_intent().shipping_cost; if let Some(shipping_cost) = shipping_cost { amount = amount + shipping_cost; } let order_tax_amount = payment_data .get_payment_intent() .tax_details .clone() .and_then(|tax| { tax.payment_method_type .map(|a| a.order_tax_amount) .or_else(|| tax.default.map(|a| a.order_tax_amount)) }); if let Some(tax_amount) = order_tax_amount { amount = amount + tax_amount; } let currency = payment_data .get_payment_attempt() .currency .get_required_value("currency")?; Ok(services::ApplicationResponse::JsonWithHeaders(( Self { net_amount: amount, payment_id: payment_data.get_payment_attempt().payment_id.clone(), order_tax_amount, shipping_cost, display_amount: api_models::payments::DisplayAmountOnSdk::foreign_try_from(( amount, shipping_cost, order_tax_amount, currency, ))?, }, vec![], ))) } <file_sep path="hyperswitch/crates/router/src/core/payments/transformers.rs" role="context" start="1867" end="1867"> type Error = error_stack::Report<errors::ApiErrorResponse>; <file_sep path="hyperswitch/crates/api_models/src/payment_methods.rs" role="context" start="2478" end="2478"> type Error = error_stack::Report<errors::ValidationError>;
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/payment_methods/cards.rs<|crate|> router anchor=get_client_secret_or_add_payment_method kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="1030" end="1107"> pub async fn get_client_secret_or_add_payment_method( state: &routes::SessionState, req: api::PaymentMethodCreate, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, ) -> errors::RouterResponse<api::PaymentMethodResponse> { let merchant_id = merchant_account.get_id(); let customer_id = req.customer_id.clone().get_required_value("customer_id")?; #[cfg(not(feature = "payouts"))] let condition = req.card.is_some(); #[cfg(feature = "payouts")] let condition = req.card.is_some() || req.bank_transfer.is_some() || req.wallet.is_some(); let key_manager_state = state.into(); let payment_method_billing_address: Option<Encryptable<Secret<serde_json::Value>>> = req .billing .clone() .async_map(|billing| create_encrypted_data(&key_manager_state, key_store, billing)) .await .transpose() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to encrypt Payment method billing address")?; let connector_mandate_details = req .connector_mandate_details .clone() .map(serde_json::to_value) .transpose() .change_context(errors::ApiErrorResponse::InternalServerError)?; if condition { Box::pin(add_payment_method(state, req, merchant_account, key_store)).await } else { let payment_method_id = generate_id(consts::ID_LENGTH, "pm"); let res = create_payment_method( state, &req, &customer_id, payment_method_id.as_str(), None, merchant_id, None, None, None, key_store, connector_mandate_details, Some(enums::PaymentMethodStatus::AwaitingData), None, merchant_account.storage_scheme, payment_method_billing_address, None, None, None, None, ) .await?; if res.status == enums::PaymentMethodStatus::AwaitingData { add_payment_method_status_update_task( &*state.store, &res, enums::PaymentMethodStatus::AwaitingData, enums::PaymentMethodStatus::Inactive, merchant_id, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable( "Failed to add payment method status update task in process tracker", )?; } Ok(services::api::ApplicationResponse::Json( api::PaymentMethodResponse::foreign_from((None, res)), )) } } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="1029" end="1029"> cards::validate::validate_card_number_chars(&card_isin) .and_then(|_| cards::validate::validate_card_number_chars(&last4_digits))?; Ok((card_isin, last4_digits)) } #[cfg(all( any(feature = "v1", feature = "v2"), not(feature = "payment_methods_v2") ))] #[instrument(skip_all)] pub async fn get_client_secret_or_add_payment_method( state: &routes::SessionState, req: api::PaymentMethodCreate, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, ) -> errors::RouterResponse<api::PaymentMethodResponse> { let merchant_id = merchant_account.get_id(); let customer_id = req.customer_id.clone().get_required_value("customer_id")?; #[cfg(not(feature = "payouts"))] let condition = req.card.is_some(); #[cfg(feature = "payouts")] let condition = req.card.is_some() || req.bank_transfer.is_some() || req.wallet.is_some(); <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="1215" end="1240"> pub fn authenticate_pm_client_secret_and_check_expiry( req_client_secret: &String, payment_method: &domain::PaymentMethod, ) -> errors::CustomResult<bool, errors::ApiErrorResponse> { let stored_client_secret = payment_method .client_secret .clone() .get_required_value("client_secret") .change_context(errors::ApiErrorResponse::MissingRequiredField { field_name: "client_secret", }) .attach_printable("client secret not found in db")?; if req_client_secret != &stored_client_secret { Err((errors::ApiErrorResponse::ClientSecretInvalid).into()) } else { let current_timestamp = common_utils::date_time::now(); let session_expiry = payment_method .created_at .saturating_add(time::Duration::seconds(consts::DEFAULT_SESSION_EXPIRY)); let expired = current_timestamp > session_expiry; Ok(expired) } } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="1114" end="1212"> pub async fn get_client_secret_or_add_payment_method_for_migration( state: &routes::SessionState, req: api::PaymentMethodCreate, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, migration_status: &mut migration::RecordMigrationStatusBuilder, ) -> errors::RouterResponse<api::PaymentMethodResponse> { let merchant_id = merchant_account.get_id(); let customer_id = req.customer_id.clone().get_required_value("customer_id")?; #[cfg(not(feature = "payouts"))] let condition = req.card.is_some(); #[cfg(feature = "payouts")] let condition = req.card.is_some() || req.bank_transfer.is_some() || req.wallet.is_some(); let key_manager_state = state.into(); let payment_method_billing_address: Option<Encryptable<Secret<serde_json::Value>>> = req .billing .clone() .async_map(|billing| create_encrypted_data(&key_manager_state, key_store, billing)) .await .transpose() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to encrypt Payment method billing address")?; let connector_mandate_details = req .connector_mandate_details .clone() .map(serde_json::to_value) .transpose() .change_context(errors::ApiErrorResponse::InternalServerError)?; if condition { Box::pin(save_migration_payment_method( state, req, merchant_account, key_store, migration_status, )) .await } else { let payment_method_id = generate_id(consts::ID_LENGTH, "pm"); let res = create_payment_method( state, &req, &customer_id, payment_method_id.as_str(), None, merchant_id, None, None, None, key_store, connector_mandate_details.clone(), Some(enums::PaymentMethodStatus::AwaitingData), None, merchant_account.storage_scheme, payment_method_billing_address, None, None, None, None, ) .await?; migration_status.connector_mandate_details_migrated( connector_mandate_details .clone() .and_then(|val| (val != json!({})).then_some(true)) .or_else(|| { req.connector_mandate_details .clone() .and_then(|val| (!val.0.is_empty()).then_some(false)) }), ); //card is not migrated in this case migration_status.card_migrated(false); if res.status == enums::PaymentMethodStatus::AwaitingData { add_payment_method_status_update_task( &*state.store, &res, enums::PaymentMethodStatus::AwaitingData, enums::PaymentMethodStatus::Inactive, merchant_id, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable( "Failed to add payment method status update task in process tracker", )?; } Ok(services::api::ApplicationResponse::Json( api::PaymentMethodResponse::foreign_from((None, res)), )) } } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="1005" end="1023"> pub fn get_card_bin_and_last4_digits_for_masked_card( masked_card_number: &str, ) -> Result<(String, String), cards::CardNumberValidationErr> { let last4_digits = masked_card_number .chars() .rev() .take(4) .collect::<String>() .chars() .rev() .collect::<String>(); let card_isin = masked_card_number.chars().take(6).collect::<String>(); cards::validate::validate_card_number_chars(&card_isin) .and_then(|_| cards::validate::validate_card_number_chars(&last4_digits))?; Ok((card_isin, last4_digits)) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="994" end="1003"> pub async fn skip_locker_call_and_migrate_payment_method( _state: routes::SessionState, _req: &api::PaymentMethodMigrate, _merchant_id: id_type::MerchantId, _key_store: &domain::MerchantKeyStore, _merchant_account: &domain::MerchantAccount, _card: api_models::payment_methods::CardDetailFromLocker, ) -> errors::RouterResponse<api::PaymentMethodResponse> { todo!() } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="133" end="232"> pub async fn create_payment_method( state: &routes::SessionState, req: &api::PaymentMethodCreate, customer_id: &id_type::CustomerId, payment_method_id: &str, locker_id: Option<String>, merchant_id: &id_type::MerchantId, pm_metadata: Option<serde_json::Value>, customer_acceptance: Option<serde_json::Value>, payment_method_data: crypto::OptionalEncryptableValue, key_store: &domain::MerchantKeyStore, connector_mandate_details: Option<serde_json::Value>, status: Option<enums::PaymentMethodStatus>, network_transaction_id: Option<String>, storage_scheme: MerchantStorageScheme, payment_method_billing_address: crypto::OptionalEncryptableValue, card_scheme: Option<String>, network_token_requestor_reference_id: Option<String>, network_token_locker_id: Option<String>, network_token_payment_method_data: crypto::OptionalEncryptableValue, ) -> errors::CustomResult<domain::PaymentMethod, errors::ApiErrorResponse> { let db = &*state.store; let customer = db .find_customer_by_customer_id_merchant_id( &state.into(), customer_id, merchant_id, key_store, storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::CustomerNotFound)?; let client_secret = generate_id( consts::ID_LENGTH, format!("{payment_method_id}_secret").as_str(), ); let current_time = common_utils::date_time::now(); let response = db .insert_payment_method( &state.into(), key_store, domain::PaymentMethod { customer_id: customer_id.to_owned(), merchant_id: merchant_id.to_owned(), payment_method_id: payment_method_id.to_string(), locker_id, payment_method: req.payment_method, payment_method_type: req.payment_method_type, payment_method_issuer: req.payment_method_issuer.clone(), scheme: req.card_network.clone().or(card_scheme), metadata: pm_metadata.map(Secret::new), payment_method_data, connector_mandate_details, customer_acceptance: customer_acceptance.map(Secret::new), client_secret: Some(client_secret), status: status.unwrap_or(enums::PaymentMethodStatus::Active), network_transaction_id: network_transaction_id.to_owned(), payment_method_issuer_code: None, accepted_currency: None, token: None, cardholder_name: None, issuer_name: None, issuer_country: None, payer_country: None, is_stored: None, swift_code: None, direct_debit_token: None, created_at: current_time, last_modified: current_time, last_used_at: current_time, payment_method_billing_address, updated_by: None, version: common_types::consts::API_VERSION, network_token_requestor_reference_id, network_token_locker_id, network_token_payment_method_data, }, storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to add payment method in db")?; if customer.default_payment_method_id.is_none() && req.payment_method.is_some() { let _ = set_default_payment_method( state, merchant_id, key_store.clone(), customer_id, payment_method_id.to_owned(), storage_scheme, ) .await .map_err(|error| logger::error!(?error, "Failed to set the payment method as default")); } Ok(response) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="1454" end="1705"> pub async fn add_payment_method( state: &routes::SessionState, req: api::PaymentMethodCreate, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, ) -> errors::RouterResponse<api::PaymentMethodResponse> { req.validate()?; let db = &*state.store; let merchant_id = merchant_account.get_id(); let customer_id = req.customer_id.clone().get_required_value("customer_id")?; let payment_method = req.payment_method.get_required_value("payment_method")?; let key_manager_state = state.into(); let payment_method_billing_address: Option<Encryptable<Secret<serde_json::Value>>> = req .billing .clone() .async_map(|billing| create_encrypted_data(&key_manager_state, key_store, billing)) .await .transpose() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to encrypt Payment method billing address")?; let connector_mandate_details = req .connector_mandate_details .clone() .map(serde_json::to_value) .transpose() .change_context(errors::ApiErrorResponse::InternalServerError)?; let response = match payment_method { #[cfg(feature = "payouts")] api_enums::PaymentMethod::BankTransfer => match req.bank_transfer.clone() { Some(bank) => add_bank_to_locker( state, req.clone(), merchant_account, key_store, &bank, &customer_id, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Add PaymentMethod Failed"), _ => Ok(store_default_payment_method( &req, &customer_id, merchant_id, )), }, api_enums::PaymentMethod::Card => match req.card.clone() { Some(card) => { let mut card_details = card; card_details = helpers::populate_bin_details_for_payment_method_create( card_details.clone(), db, ) .await; helpers::validate_card_expiry( &card_details.card_exp_month, &card_details.card_exp_year, )?; Box::pin(add_card_to_locker( state, req.clone(), &card_details, &customer_id, merchant_account, None, )) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Add Card Failed") } _ => Ok(store_default_payment_method( &req, &customer_id, merchant_id, )), }, _ => Ok(store_default_payment_method( &req, &customer_id, merchant_id, )), }; let (mut resp, duplication_check) = response?; match duplication_check { Some(duplication_check) => match duplication_check { payment_methods::DataDuplicationCheck::Duplicated => { let existing_pm = get_or_insert_payment_method( state, req.clone(), &mut resp, merchant_account, &customer_id, key_store, ) .await?; resp.client_secret = existing_pm.client_secret; } payment_methods::DataDuplicationCheck::MetaDataChanged => { if let Some(card) = req.card.clone() { let existing_pm = get_or_insert_payment_method( state, req.clone(), &mut resp, merchant_account, &customer_id, key_store, ) .await?; let client_secret = existing_pm.client_secret.clone(); delete_card_from_locker( state, &customer_id, merchant_id, existing_pm .locker_id .as_ref() .unwrap_or(&existing_pm.payment_method_id), ) .await?; let add_card_resp = add_card_hs( state, req.clone(), &card, &customer_id, merchant_account, api::enums::LockerChoice::HyperswitchCardVault, Some( existing_pm .locker_id .as_ref() .unwrap_or(&existing_pm.payment_method_id), ), ) .await; if let Err(err) = add_card_resp { logger::error!(vault_err=?err); db.delete_payment_method_by_merchant_id_payment_method_id( &(state.into()), key_store, merchant_id, &resp.payment_method_id, ) .await .to_not_found_response(errors::ApiErrorResponse::PaymentMethodNotFound)?; Err(report!(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed while updating card metadata changes"))? }; let existing_pm_data = get_card_details_without_locker_fallback(&existing_pm, state).await?; let updated_card = Some(api::CardDetailFromLocker { scheme: existing_pm.scheme.clone(), last4_digits: Some(card.card_number.get_last4()), issuer_country: card .card_issuing_country .or(existing_pm_data.issuer_country), card_isin: Some(card.card_number.get_card_isin()), card_number: Some(card.card_number), expiry_month: Some(card.card_exp_month), expiry_year: Some(card.card_exp_year), card_token: None, card_fingerprint: None, card_holder_name: card .card_holder_name .or(existing_pm_data.card_holder_name), nick_name: card.nick_name.or(existing_pm_data.nick_name), card_network: card.card_network.or(existing_pm_data.card_network), card_issuer: card.card_issuer.or(existing_pm_data.card_issuer), card_type: card.card_type.or(existing_pm_data.card_type), saved_to_locker: true, }); let updated_pmd = updated_card.as_ref().map(|card| { PaymentMethodsData::Card(CardDetailsPaymentMethod::from(card.clone())) }); let pm_data_encrypted: Option<Encryptable<Secret<serde_json::Value>>> = updated_pmd .async_map(|updated_pmd| { create_encrypted_data(&key_manager_state, key_store, updated_pmd) }) .await .transpose() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to encrypt payment method data")?; let pm_update = storage::PaymentMethodUpdate::PaymentMethodDataUpdate { payment_method_data: pm_data_encrypted.map(Into::into), }; db.update_payment_method( &(state.into()), key_store, existing_pm, pm_update, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to add payment method in db")?; resp.client_secret = client_secret; } } }, None => { let pm_metadata = resp.metadata.as_ref().map(|data| data.peek()); let locker_id = if resp.payment_method == Some(api_enums::PaymentMethod::Card) || resp.payment_method == Some(api_enums::PaymentMethod::BankTransfer) { Some(resp.payment_method_id) } else { None }; resp.payment_method_id = generate_id(consts::ID_LENGTH, "pm"); let pm = insert_payment_method( state, &resp, &req, key_store, merchant_id, &customer_id, pm_metadata.cloned(), None, locker_id, connector_mandate_details, req.network_transaction_id.clone(), merchant_account.storage_scheme, payment_method_billing_address, None, None, None, ) .await?; resp.client_secret = pm.client_secret; } } Ok(services::ApplicationResponse::Json(resp)) } <file_sep path="hyperswitch/crates/router/src/routes/app.rs" role="context" start="104" end="125"> pub struct SessionState { pub store: Box<dyn StorageInterface>, /// Global store is used for global schema operations in tables like Users and Tenants pub global_store: Box<dyn GlobalStorageInterface>, pub accounts_store: Box<dyn AccountsStorageInterface>, pub conf: Arc<settings::Settings<RawSecret>>, pub api_client: Box<dyn crate::services::ApiClient>, pub event_handler: EventsHandler, #[cfg(feature = "email")] pub email_client: Arc<Box<dyn EmailService>>, #[cfg(feature = "olap")] pub pool: AnalyticsProvider, pub file_storage_client: Arc<dyn FileStorageInterface>, pub request_id: Option<RequestId>, pub base_url: String, pub tenant: Tenant, #[cfg(feature = "olap")] pub opensearch_client: Option<Arc<OpenSearchClient>>, pub grpc_client: Arc<GrpcClients>, pub theme_storage_client: Arc<dyn FileStorageInterface>, pub locale: String, } <file_sep path="hyperswitch/v2_compatible_migrations/2024-08-28-081757_drop_not_null_constraints_on_v1_columns/up.sql" role="context" start="5" end="21"> ALTER COLUMN org_id DROP NOT NULL; -- Create index on org_id in organization table -- This is done to mullify the effects of droping primary key for v1 CREATE INDEX idx_organization_org_id ON organization (org_id); ------------------------ Merchant Account ------------------- -- Drop not null in merchant_account table for v1 columns that are dropped in v2 ALTER TABLE merchant_account DROP CONSTRAINT merchant_account_pkey, ALTER COLUMN merchant_id DROP NOT NULL, ALTER COLUMN primary_business_details DROP NOT NULL, ALTER COLUMN is_recon_enabled DROP NOT NULL; -- This is done to mullify the effects of droping primary key for v1 CREATE INDEX idx_merchant_account_merchant_id ON merchant_account (merchant_id); <file_sep path="hyperswitch/crates/api_models/src/errors/types.rs" role="context" start="86" end="100"> pub enum ApiErrorResponse { Unauthorized(ApiError), ForbiddenCommonResource(ApiError), ForbiddenPrivateResource(ApiError), Conflict(ApiError), Gone(ApiError), Unprocessable(ApiError), InternalServerError(ApiError), NotImplemented(ApiError), ConnectorError(ApiError, #[serde(skip_serializing)] StatusCode), NotFound(ApiError), MethodNotAllowed(ApiError), BadRequest(ApiError), DomainError(ApiError), }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/payouts.rs<|crate|> router anchor=make_connector_decision kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="169" end="270"> pub async fn make_connector_decision( state: &SessionState, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, connector_call_type: api::ConnectorCallType, payout_data: &mut PayoutData, ) -> RouterResult<()> { match connector_call_type { api::ConnectorCallType::PreDetermined(connector_data) => { Box::pin(call_connector_payout( state, merchant_account, key_store, &connector_data, payout_data, )) .await?; #[cfg(feature = "payout_retry")] { let config_bool = retry::config_should_call_gsm_payout( &*state.store, merchant_account.get_id(), PayoutRetryType::SingleConnector, ) .await; if config_bool && payout_data.should_call_gsm() { Box::pin(retry::do_gsm_single_connector_actions( state, connector_data, payout_data, merchant_account, key_store, )) .await?; } } Ok(()) } api::ConnectorCallType::Retryable(connectors) => { let mut connectors = connectors.into_iter(); let connector_data = get_next_connector(&mut connectors)?; Box::pin(call_connector_payout( state, merchant_account, key_store, &connector_data, payout_data, )) .await?; #[cfg(feature = "payout_retry")] { let config_multiple_connector_bool = retry::config_should_call_gsm_payout( &*state.store, merchant_account.get_id(), PayoutRetryType::MultiConnector, ) .await; if config_multiple_connector_bool && payout_data.should_call_gsm() { Box::pin(retry::do_gsm_multiple_connector_actions( state, connectors, connector_data.clone(), payout_data, merchant_account, key_store, )) .await?; } let config_single_connector_bool = retry::config_should_call_gsm_payout( &*state.store, merchant_account.get_id(), PayoutRetryType::SingleConnector, ) .await; if config_single_connector_bool && payout_data.should_call_gsm() { Box::pin(retry::do_gsm_single_connector_actions( state, connector_data, payout_data, merchant_account, key_store, )) .await?; } } Ok(()) } _ => Err(errors::ApiErrorResponse::InternalServerError).attach_printable({ "only PreDetermined and Retryable ConnectorCallTypes are supported".to_string() })?, } } <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="168" end="168"> use common_enums::PayoutRetryType; use retry::GsmValidation; use crate::types::domain::behaviour::Conversion; use crate::{ core::{ errors::{ self, ConnectorErrorExt, CustomResult, RouterResponse, RouterResult, StorageErrorExt, }, payments::{self, customers, helpers as payment_helpers}, utils as core_utils, }, db::StorageInterface, routes::SessionState, services, types::{ self, api::{self, payments as payment_api_types, payouts}, domain, storage::{self, PaymentRoutingInfo}, transformers::ForeignFrom, }, utils::{self, OptionExt}, }; <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="309" end="318"> pub async fn payouts_core( state: &SessionState, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, payout_data: &mut PayoutData, routing_algorithm: Option<serde_json::Value>, eligible_connectors: Option<Vec<api_enums::PayoutConnectors>>, ) -> RouterResult<()> { todo!() } <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="274" end="305"> pub async fn payouts_core( state: &SessionState, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, payout_data: &mut PayoutData, routing_algorithm: Option<serde_json::Value>, eligible_connectors: Option<Vec<api_enums::PayoutConnectors>>, ) -> RouterResult<()> { let payout_attempt = &payout_data.payout_attempt; // Form connector data let connector_call_type = get_connector_choice( state, merchant_account, key_store, payout_attempt.connector.clone(), routing_algorithm, payout_data, eligible_connectors, ) .await?; // Call connector steps Box::pin(make_connector_decision( state, merchant_account, key_store, connector_call_type, payout_data, )) .await } <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="94" end="166"> pub async fn get_connector_choice( state: &SessionState, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, connector: Option<String>, routing_algorithm: Option<serde_json::Value>, payout_data: &mut PayoutData, eligible_connectors: Option<Vec<api_enums::PayoutConnectors>>, ) -> RouterResult<api::ConnectorCallType> { let eligible_routable_connectors = eligible_connectors.map(|connectors| { connectors .into_iter() .map(api::enums::RoutableConnectors::from) .collect() }); let connector_choice = helpers::get_default_payout_connector(state, routing_algorithm).await?; match connector_choice { api::ConnectorChoice::SessionMultiple(_) => { Err(errors::ApiErrorResponse::InternalServerError) .attach_printable("Invalid connector choice - SessionMultiple")? } api::ConnectorChoice::StraightThrough(straight_through) => { let request_straight_through: api::routing::StraightThroughAlgorithm = straight_through .clone() .parse_value("StraightThroughAlgorithm") .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Invalid straight through routing rules format")?; payout_data.payout_attempt.routing_info = Some(straight_through); let mut routing_data = storage::RoutingData { routed_through: connector, merchant_connector_id: None, algorithm: Some(request_straight_through.clone()), routing_info: PaymentRoutingInfo { algorithm: None, pre_routing_results: None, }, }; helpers::decide_payout_connector( state, merchant_account, key_store, Some(request_straight_through), &mut routing_data, payout_data, eligible_routable_connectors, ) .await } api::ConnectorChoice::Decide => { let mut routing_data = storage::RoutingData { routed_through: connector, merchant_connector_id: None, algorithm: None, routing_info: PaymentRoutingInfo { algorithm: None, pre_routing_results: None, }, }; helpers::decide_payout_connector( state, merchant_account, key_store, None, &mut routing_data, payout_data, eligible_routable_connectors, ) .await } } } <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="84" end="91"> pub fn get_next_connector( connectors: &mut IntoIter<api::ConnectorData>, ) -> RouterResult<api::ConnectorData> { connectors .next() .ok_or(errors::ApiErrorResponse::InternalServerError) .attach_printable("Connector not found in connectors iterator") } <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="1048" end="1168"> pub async fn call_connector_payout( state: &SessionState, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, connector_data: &api::ConnectorData, payout_data: &mut PayoutData, ) -> RouterResult<()> { let payout_attempt = &payout_data.payout_attempt.to_owned(); let payouts = &payout_data.payouts.to_owned(); // fetch merchant connector account if not present if payout_data.merchant_connector_account.is_none() || payout_data.payout_attempt.merchant_connector_id.is_none() { let merchant_connector_account = get_mca_from_profile_id( state, merchant_account, &payout_data.profile_id, &connector_data.connector_name.to_string(), payout_attempt .merchant_connector_id .clone() .or(connector_data.merchant_connector_id.clone()) .as_ref(), key_store, ) .await?; payout_data.payout_attempt.merchant_connector_id = merchant_connector_account.get_mca_id(); payout_data.merchant_connector_account = Some(merchant_connector_account); } // update connector_name if payout_data.payout_attempt.connector.is_none() || payout_data.payout_attempt.connector != Some(connector_data.connector_name.to_string()) { payout_data.payout_attempt.connector = Some(connector_data.connector_name.to_string()); let updated_payout_attempt = storage::PayoutAttemptUpdate::UpdateRouting { connector: connector_data.connector_name.to_string(), routing_info: payout_data.payout_attempt.routing_info.clone(), merchant_connector_id: payout_data.payout_attempt.merchant_connector_id.clone(), }; let db = &*state.store; payout_data.payout_attempt = db .update_payout_attempt( &payout_data.payout_attempt, updated_payout_attempt, payouts, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error updating routing info in payout_attempt")?; }; // Fetch / store payout_method_data if payout_data.payout_method_data.is_none() || payout_attempt.payout_token.is_none() { let customer_id = payouts .customer_id .clone() .get_required_value("customer_id")?; payout_data.payout_method_data = Some( helpers::make_payout_method_data( state, payout_data.payout_method_data.to_owned().as_ref(), payout_attempt.payout_token.as_deref(), &customer_id, &payout_attempt.merchant_id, payouts.payout_type, key_store, Some(payout_data), merchant_account.storage_scheme, ) .await? .get_required_value("payout_method_data")?, ); } // Eligibility flow complete_payout_eligibility(state, merchant_account, connector_data, payout_data).await?; // Create customer flow Box::pin(complete_create_recipient( state, merchant_account, key_store, connector_data, payout_data, )) .await?; // Create customer's disbursement account flow Box::pin(complete_create_recipient_disburse_account( state, merchant_account, connector_data, payout_data, key_store, )) .await?; // Payout creation flow Box::pin(complete_create_payout( state, merchant_account, connector_data, payout_data, )) .await?; // Auto fulfillment flow let status = payout_data.payout_attempt.status; if payouts.auto_fulfill && status == storage_enums::PayoutStatus::RequiresFulfillment { Box::pin(fulfill_payout( state, merchant_account, key_store, connector_data, payout_data, )) .await .attach_printable("Payout fulfillment failed for given Payout request")?; } Ok(()) } <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="68" end="81"> pub struct PayoutData { pub billing_address: Option<domain::Address>, pub business_profile: domain::Profile, pub customer_details: Option<domain::Customer>, pub merchant_connector_account: Option<payment_helpers::MerchantConnectorAccountType>, pub payouts: storage::Payouts, pub payout_attempt: storage::PayoutAttempt, pub payout_method_data: Option<payouts::PayoutMethodData>, pub profile_id: common_utils::id_type::ProfileId, pub should_terminate: bool, pub payout_link: Option<PayoutLink>, pub current_locale: String, pub payment_method: Option<PaymentMethod>, } <file_sep path="hyperswitch/crates/router/src/core/errors.rs" role="context" start="31" end="31"> pub type RouterResult<T> = CustomResult<T, ApiErrorResponse>; <file_sep path="hyperswitch/v2_compatible_migrations/2024-08-28-081757_drop_not_null_constraints_on_v1_columns/up.sql" role="context" start="5" end="21"> ALTER COLUMN org_id DROP NOT NULL; -- Create index on org_id in organization table -- This is done to mullify the effects of droping primary key for v1 CREATE INDEX idx_organization_org_id ON organization (org_id); ------------------------ Merchant Account ------------------- -- Drop not null in merchant_account table for v1 columns that are dropped in v2 ALTER TABLE merchant_account DROP CONSTRAINT merchant_account_pkey, ALTER COLUMN merchant_id DROP NOT NULL, ALTER COLUMN primary_business_details DROP NOT NULL, ALTER COLUMN is_recon_enabled DROP NOT NULL; -- This is done to mullify the effects of droping primary key for v1 CREATE INDEX idx_merchant_account_merchant_id ON merchant_account (merchant_id); <file_sep path="hyperswitch/crates/api_models/src/errors/types.rs" role="context" start="86" end="100"> pub enum ApiErrorResponse { Unauthorized(ApiError), ForbiddenCommonResource(ApiError), ForbiddenPrivateResource(ApiError), Conflict(ApiError), Gone(ApiError), Unprocessable(ApiError), InternalServerError(ApiError), NotImplemented(ApiError), ConnectorError(ApiError, #[serde(skip_serializing)] StatusCode), NotFound(ApiError), MethodNotAllowed(ApiError), BadRequest(ApiError), DomainError(ApiError), } <file_sep path="hyperswitch/postman/collection-dir/powertranz/Flow Testcases/Happy Cases/Scenario1-Create payment with confirm true/Payments - Create/event.test.js" role="context" start="61" end="78"> "INFO - Unable to assign variable {{client_secret}}, as jsonData.client_secret is undefined.", ); } // Response body should have value "succeeded" for "status" if (jsonData?.status) { pm.test( "[POST]::/payments - Content check if value for 'status' matches 'succeeded'", function () { pm.expect(jsonData.status).to.eql("succeeded"); }, ); }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/api_keys.rs<|crate|> router anchor=create_api_key kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/api_keys.rs" role="context" start="112" end="184"> pub async fn create_api_key( state: SessionState, api_key: api::CreateApiKeyRequest, key_store: domain::MerchantKeyStore, ) -> RouterResponse<api::CreateApiKeyResponse> { let api_key_config = state.conf.api_keys.get_inner(); let store = state.store.as_ref(); let merchant_id = key_store.merchant_id.clone(); let hash_key = api_key_config.get_hash_key()?; let plaintext_api_key = PlaintextApiKey::new(consts::API_KEY_LENGTH); let api_key = storage::ApiKeyNew { key_id: PlaintextApiKey::new_key_id(), merchant_id: merchant_id.to_owned(), name: api_key.name, description: api_key.description, hashed_api_key: plaintext_api_key.keyed_hash(hash_key.peek()).into(), prefix: plaintext_api_key.prefix(), created_at: date_time::now(), expires_at: api_key.expiration.into(), last_used: None, }; let api_key = store .insert_api_key(api_key) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to insert new API key")?; let state_inner = state.clone(); let hashed_api_key = api_key.hashed_api_key.clone(); let merchant_id_inner = merchant_id.clone(); let key_id = api_key.key_id.clone(); let expires_at = api_key.expires_at; authentication::decision::spawn_tracked_job( async move { authentication::decision::add_api_key( &state_inner, hashed_api_key.into_inner().into(), merchant_id_inner, key_id, expires_at.map(authentication::decision::convert_expiry), ) .await }, authentication::decision::ADD, ); metrics::API_KEY_CREATED.add( 1, router_env::metric_attributes!(("merchant", merchant_id.clone())), ); // Add process to process_tracker for email reminder, only if expiry is set to future date // If the `api_key` is set to expire in less than 7 days, the merchant is not notified about it's expiry #[cfg(feature = "email")] { if api_key.expires_at.is_some() { let expiry_reminder_days = state.conf.api_keys.get_inner().expiry_reminder_days.clone(); add_api_key_expiry_task(store, &api_key, expiry_reminder_days) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to insert API key expiry reminder to process tracker")?; } } Ok(ApplicationResponse::Json( (api_key, plaintext_api_key).foreign_into(), )) } <file_sep path="hyperswitch/crates/router/src/core/api_keys.rs" role="context" start="111" end="111"> use common_utils::date_time; use diesel_models::{api_keys::ApiKey, enums as storage_enums}; use router_env::{instrument, tracing}; use crate::{ configs::settings, consts, core::errors::{self, RouterResponse, StorageErrorExt}, db::domain, routes::{metrics, SessionState}, services::{authentication, ApplicationResponse}, types::{api, storage, transformers::ForeignInto}, }; <file_sep path="hyperswitch/crates/router/src/core/api_keys.rs" role="context" start="254" end="268"> pub async fn retrieve_api_key( state: SessionState, merchant_id: common_utils::id_type::MerchantId, key_id: common_utils::id_type::ApiKeyId, ) -> RouterResponse<api::RetrieveApiKeyResponse> { let store = state.store.as_ref(); let api_key = store .find_api_key_by_merchant_id_key_id_optional(&merchant_id, &key_id) .await .change_context(errors::ApiErrorResponse::InternalServerError) // If retrieve failed .attach_printable("Failed to retrieve API key")? .ok_or(report!(errors::ApiErrorResponse::ApiKeyNotFound))?; // If retrieve returned `None` Ok(ApplicationResponse::Json(api_key.foreign_into())) } <file_sep path="hyperswitch/crates/router/src/core/api_keys.rs" role="context" start="192" end="251"> pub async fn add_api_key_expiry_task( store: &dyn crate::db::StorageInterface, api_key: &ApiKey, expiry_reminder_days: Vec<u8>, ) -> Result<(), errors::ProcessTrackerError> { let current_time = date_time::now(); let schedule_time = expiry_reminder_days .first() .and_then(|expiry_reminder_day| { api_key.expires_at.map(|expires_at| { expires_at.saturating_sub(time::Duration::days(i64::from(*expiry_reminder_day))) }) }) .ok_or(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to obtain initial process tracker schedule time")?; if schedule_time <= current_time { return Ok(()); } let api_key_expiry_tracker = storage::ApiKeyExpiryTrackingData { key_id: api_key.key_id.clone(), merchant_id: api_key.merchant_id.clone(), api_key_name: api_key.name.clone(), prefix: api_key.prefix.clone(), // We need API key expiry too, because we need to decide on the schedule_time in // execute_workflow() where we won't be having access to the Api key object. api_key_expiry: api_key.expires_at, expiry_reminder_days: expiry_reminder_days.clone(), }; let process_tracker_id = generate_task_id_for_api_key_expiry_workflow(&api_key.key_id); let process_tracker_entry = storage::ProcessTrackerNew::new( process_tracker_id, API_KEY_EXPIRY_NAME, API_KEY_EXPIRY_RUNNER, [API_KEY_EXPIRY_TAG], api_key_expiry_tracker, None, schedule_time, common_types::consts::API_VERSION, ) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to construct API key expiry process tracker task")?; store .insert_process(process_tracker_entry) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable_lazy(|| { format!( "Failed while inserting API key expiry reminder to process_tracker: {:?}", api_key.key_id ) })?; metrics::TASKS_ADDED_COUNT.add(1, router_env::metric_attributes!(("flow", "ApiKeyExpiry"))); Ok(()) } <file_sep path="hyperswitch/crates/router/src/core/api_keys.rs" role="context" start="78" end="108"> pub fn keyed_hash(&self, key: &[u8; Self::HASH_KEY_LEN]) -> HashedApiKey { /* Decisions regarding API key hashing algorithm chosen: - Since API key hash verification would be done for each request, there is a requirement for the hashing to be quick. - Password hashing algorithms would not be suitable for this purpose as they're designed to prevent brute force attacks, considering that the same password could be shared across multiple sites by the user. - Moreover, password hash verification happens once per user session, so the delay involved is negligible, considering the security benefits it provides. While with API keys (assuming uniqueness of keys across the application), the delay involved in hashing (with the use of a password hashing algorithm) becomes significant, considering that it must be done per request. - Since we are the only ones generating API keys and are able to guarantee their uniqueness, a simple hash algorithm is sufficient for this purpose. Hash algorithms considered: - Password hashing algorithms: Argon2id and PBKDF2 - Simple hashing algorithms: HMAC-SHA256, HMAC-SHA512, BLAKE3 After benchmarking the simple hashing algorithms, we decided to go with the BLAKE3 keyed hashing algorithm, with a randomly generated key for the hash key. */ HashedApiKey( blake3::keyed_hash(key, self.0.peek().as_bytes()) .to_hex() .to_string(), ) } <file_sep path="hyperswitch/crates/router/src/core/api_keys.rs" role="context" start="74" end="76"> pub fn peek(&self) -> &str { self.0.peek() } <file_sep path="hyperswitch/crates/router/src/core/api_keys.rs" role="context" start="65" end="68"> pub fn new_key_id() -> common_utils::id_type::ApiKeyId { let env = router_env::env::prefix_for_env(); common_utils::id_type::ApiKeyId::generate_key_id(env) } <file_sep path="hyperswitch/crates/router/src/core/api_keys.rs" role="context" start="49" end="49"> pub struct PlaintextApiKey(StrongSecret<String>); <file_sep path="hyperswitch/crates/router/src/routes/app.rs" role="context" start="104" end="125"> pub struct SessionState { pub store: Box<dyn StorageInterface>, /// Global store is used for global schema operations in tables like Users and Tenants pub global_store: Box<dyn GlobalStorageInterface>, pub accounts_store: Box<dyn AccountsStorageInterface>, pub conf: Arc<settings::Settings<RawSecret>>, pub api_client: Box<dyn crate::services::ApiClient>, pub event_handler: EventsHandler, #[cfg(feature = "email")] pub email_client: Arc<Box<dyn EmailService>>, #[cfg(feature = "olap")] pub pool: AnalyticsProvider, pub file_storage_client: Arc<dyn FileStorageInterface>, pub request_id: Option<RequestId>, pub base_url: String, pub tenant: Tenant, #[cfg(feature = "olap")] pub opensearch_client: Option<Arc<OpenSearchClient>>, pub grpc_client: Arc<GrpcClients>, pub theme_storage_client: Arc<dyn FileStorageInterface>, pub locale: String, } <file_sep path="hyperswitch-encryption-service/migrations/2024-05-28-075150_create_dek_table/up.sql" role="context" start="1" end="9"> CREATE TABLE IF NOT EXISTS data_key_store ( id SERIAL PRIMARY KEY, key_identifier VARCHAR(255) NOT NULL, data_identifier VARCHAR(20) NOT NULL, encryption_key bytea NOT NULL, version VARCHAR(30) NOT NULL, created_at TIMESTAMP NOT NULL ); <file_sep path="hyperswitch/crates/api_models/src/errors/types.rs" role="context" start="86" end="100"> pub enum ApiErrorResponse { Unauthorized(ApiError), ForbiddenCommonResource(ApiError), ForbiddenPrivateResource(ApiError), Conflict(ApiError), Gone(ApiError), Unprocessable(ApiError), InternalServerError(ApiError), NotImplemented(ApiError), ConnectorError(ApiError, #[serde(skip_serializing)] StatusCode), NotFound(ApiError), MethodNotAllowed(ApiError), BadRequest(ApiError), DomainError(ApiError), }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/user/dashboard_metadata.rs<|crate|> router anchor=backfill_metadata kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/user/dashboard_metadata.rs" role="context" start="663" end="772"> pub async fn backfill_metadata( state: &SessionState, user: &UserFromToken, key: &DBEnum, ) -> UserResult<Option<DashboardMetadata>> { let key_store = state .store .get_merchant_key_store_by_merchant_id( &state.into(), &user.merchant_id, &state.store.get_master_key().to_vec().into(), ) .await .change_context(UserErrors::InternalServerError)?; match key { DBEnum::StripeConnected => { let mca = if let Some(stripe_connected) = get_merchant_connector_account_by_name( state, &user.merchant_id, api_models::enums::RoutableConnectors::Stripe .to_string() .as_str(), &key_store, ) .await? { stripe_connected } else if let Some(stripe_test_connected) = get_merchant_connector_account_by_name( state, &user.merchant_id, //TODO: Use Enum with proper feature flag "stripe_test", &key_store, ) .await? { stripe_test_connected } else { return Ok(None); }; #[cfg(feature = "v1")] let processor_name = mca.connector_name.clone(); #[cfg(feature = "v2")] let processor_name = mca.connector_name.to_string().clone(); Some( insert_metadata( state, user.to_owned(), DBEnum::StripeConnected, types::MetaData::StripeConnected(api::ProcessorConnected { processor_id: mca.get_id(), processor_name, }), ) .await, ) .transpose() } DBEnum::PaypalConnected => { let mca = if let Some(paypal_connected) = get_merchant_connector_account_by_name( state, &user.merchant_id, api_models::enums::RoutableConnectors::Paypal .to_string() .as_str(), &key_store, ) .await? { paypal_connected } else if let Some(paypal_test_connected) = get_merchant_connector_account_by_name( state, &user.merchant_id, //TODO: Use Enum with proper feature flag "paypal_test", &key_store, ) .await? { paypal_test_connected } else { return Ok(None); }; #[cfg(feature = "v1")] let processor_name = mca.connector_name.clone(); #[cfg(feature = "v2")] let processor_name = mca.connector_name.to_string().clone(); Some( insert_metadata( state, user.to_owned(), DBEnum::PaypalConnected, types::MetaData::PaypalConnected(api::ProcessorConnected { processor_id: mca.get_id(), processor_name, }), ) .await, ) .transpose() } _ => Ok(None), } } <file_sep path="hyperswitch/crates/router/src/core/user/dashboard_metadata.rs" role="context" start="662" end="662"> use api_models::user::dashboard_metadata::{self as api, GetMultipleMetaDataPayload}; use diesel_models::{ enums::DashboardMetadata as DBEnum, user::dashboard_metadata::DashboardMetadata, }; use crate::{ core::errors::{UserErrors, UserResponse, UserResult}, routes::{app::ReqState, SessionState}, services::{authentication::UserFromToken, ApplicationResponse}, types::domain::{self, user::dashboard_metadata as types, MerchantKeyStore}, utils::user::dashboard_metadata as utils, }; use crate::{services::email::types as email_types, utils::user::theme as theme_utils}; <file_sep path="hyperswitch/crates/router/src/core/user/dashboard_metadata.rs" role="context" start="774" end="805"> pub async fn get_merchant_connector_account_by_name( state: &SessionState, merchant_id: &common_utils::id_type::MerchantId, connector_name: &str, key_store: &MerchantKeyStore, ) -> UserResult<Option<domain::MerchantConnectorAccount>> { #[cfg(feature = "v1")] { state .store .find_merchant_connector_account_by_merchant_id_connector_name( &state.into(), merchant_id, connector_name, key_store, ) .await .map_err(|e| { e.change_context(UserErrors::InternalServerError) .attach_printable("DB Error Fetching DashboardMetaData") }) .map(|data| data.first().cloned()) } #[cfg(feature = "v2")] { let _ = state; let _ = merchant_id; let _ = connector_name; let _ = key_store; todo!() } } <file_sep path="hyperswitch/crates/router/src/core/user/dashboard_metadata.rs" role="context" start="628" end="661"> async fn fetch_metadata( state: &SessionState, user: &UserFromToken, metadata_keys: Vec<DBEnum>, ) -> UserResult<Vec<DashboardMetadata>> { let mut dashboard_metadata = Vec::with_capacity(metadata_keys.len()); let (merchant_scoped_enums, user_scoped_enums) = utils::separate_metadata_type_based_on_scope(metadata_keys); if !merchant_scoped_enums.is_empty() { let mut res = utils::get_merchant_scoped_metadata_from_db( state, user.merchant_id.to_owned(), user.org_id.to_owned(), merchant_scoped_enums, ) .await?; dashboard_metadata.append(&mut res); } if !user_scoped_enums.is_empty() { let mut res = utils::get_user_scoped_metadata_from_db( state, user.user_id.to_owned(), user.merchant_id.to_owned(), user.org_id.to_owned(), user_scoped_enums, ) .await?; dashboard_metadata.append(&mut res); } Ok(dashboard_metadata) } <file_sep path="hyperswitch/crates/router/src/core/user/dashboard_metadata.rs" role="context" start="244" end="626"> async fn insert_metadata( state: &SessionState, user: UserFromToken, metadata_key: DBEnum, metadata_value: types::MetaData, ) -> UserResult<DashboardMetadata> { match metadata_value { types::MetaData::ProductionAgreement(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::SetupProcessor(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::ConfigureEndpoint(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::SetupComplete(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::FirstProcessorConnected(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::SecondProcessorConnected(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::ConfiguredRouting(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::TestPayment(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::IntegrationMethod(data) => { let mut metadata = utils::insert_merchant_scoped_metadata_to_db( state, user.user_id.clone(), user.merchant_id.clone(), user.org_id.clone(), metadata_key, data.clone(), ) .await; if utils::is_update_required(&metadata) { metadata = utils::update_merchant_scoped_metadata( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await .change_context(UserErrors::InternalServerError); } metadata } types::MetaData::ConfigurationType(data) => { let mut metadata = utils::insert_merchant_scoped_metadata_to_db( state, user.user_id.clone(), user.merchant_id.clone(), user.org_id.clone(), metadata_key, data.clone(), ) .await; if utils::is_update_required(&metadata) { metadata = utils::update_merchant_scoped_metadata( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await .change_context(UserErrors::InternalServerError); } metadata } types::MetaData::IntegrationCompleted(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::StripeConnected(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::PaypalConnected(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::SPRoutingConfigured(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::Feedback(data) => { let mut metadata = utils::insert_user_scoped_metadata_to_db( state, user.user_id.clone(), user.merchant_id.clone(), user.org_id.clone(), metadata_key, data.clone(), ) .await; if utils::is_update_required(&metadata) { metadata = utils::update_user_scoped_metadata( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await .change_context(UserErrors::InternalServerError); } metadata } types::MetaData::ProdIntent(data) => { if let Some(poc_email) = &data.poc_email { let inner_poc_email = poc_email.peek().as_str(); pii::Email::from_str(inner_poc_email) .change_context(UserErrors::EmailParsingError)?; } let mut metadata = utils::insert_merchant_scoped_metadata_to_db( state, user.user_id.clone(), user.merchant_id.clone(), user.org_id.clone(), metadata_key, data.clone(), ) .await; if utils::is_update_required(&metadata) { metadata = utils::update_merchant_scoped_metadata( state, user.user_id.clone(), user.merchant_id.clone(), user.org_id.clone(), metadata_key, data.clone(), ) .await .change_context(UserErrors::InternalServerError); } #[cfg(feature = "email")] { let user_data = user.get_user_from_db(state).await?; let user_email = domain::UserEmail::from_pii_email(user_data.get_email()) .change_context(UserErrors::InternalServerError)? .get_secret() .expose(); if utils::is_prod_email_required(&data, user_email) { let theme = theme_utils::get_most_specific_theme_using_token_and_min_entity( state, &user, EntityType::Merchant, ) .await?; let email_contents = email_types::BizEmailProd::new( state, data, theme.as_ref().map(|theme| theme.theme_id.clone()), theme .map(|theme| theme.email_config()) .unwrap_or(state.conf.theme.email_config.clone()), )?; let send_email_result = state .email_client .compose_and_send_email( email_types::get_base_url(state), Box::new(email_contents), state.conf.proxy.https_url.as_ref(), ) .await; logger::info!(prod_intent_email=?send_email_result); } } metadata } types::MetaData::SPTestPayment(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::DownloadWoocom(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::ConfigureWoocom(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::SetupWoocomWebhook(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::IsMultipleConfiguration(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::IsChangePasswordRequired(data) => { utils::insert_user_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::OnboardingSurvey(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::ReconStatus(data) => { let mut metadata = utils::insert_merchant_scoped_metadata_to_db( state, user.user_id.clone(), user.merchant_id.clone(), user.org_id.clone(), metadata_key, data.clone(), ) .await; if utils::is_update_required(&metadata) { metadata = utils::update_merchant_scoped_metadata( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await; } metadata } } } <file_sep path="hyperswitch/crates/router/src/core/user/dashboard_metadata.rs" role="context" start="41" end="65"> pub async fn get_multiple_metadata( state: SessionState, user: UserFromToken, request: GetMultipleMetaDataPayload, _req_state: ReqState, ) -> UserResponse<Vec<api::GetMetaDataResponse>> { let metadata_keys: Vec<DBEnum> = request.results.into_iter().map(parse_get_request).collect(); let metadata = fetch_metadata(&state, &user, metadata_keys.clone()).await?; let mut response = Vec::with_capacity(metadata_keys.len()); for key in metadata_keys { let data = metadata.iter().find(|ele| ele.data_key == key); let resp; if data.is_none() && utils::is_backfill_required(key) { let backfill_data = backfill_metadata(&state, &user, &key).await?; resp = into_response(backfill_data.as_ref(), key)?; } else { resp = into_response(data, key)?; } response.push(resp); } Ok(ApplicationResponse::Json(response)) } <file_sep path="hyperswitch/crates/router/tests/connectors/stripe.rs" role="context" start="11" end="11"> struct Stripe; <file_sep path="hyperswitch/migrations/2023-12-14-101348_alter_dashboard_metadata_key_type/up.sql" role="context" start="17" end="25"> 'configure_woocom', 'setup_woocom_webhook', 'is_multiple_configuration', 'configuration_type', 'feedback', 'prod_intent' ); ALTER TABLE dashboard_metadata ALTER COLUMN data_key TYPE "DashboardMetadata" USING (data_key::"DashboardMetadata"); <file_sep path="hyperswitch/crates/api_models/src/payouts.rs" role="context" start="370" end="382"> pub struct Paypal { /// Email linked with paypal account #[schema(value_type = String, example = "john.doe@example.com")] pub email: Option<Email>, /// mobile number linked to paypal account #[schema(value_type = String, example = "16608213349")] pub telephone_number: Option<Secret<String>>, /// id of the paypal account #[schema(value_type = String, example = "G83KXTJ5EHCQ2")] pub paypal_id: Option<Secret<String>>, }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/api_keys.rs<|crate|> router anchor=from kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=1<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/api_keys.rs" role="context" start="562" end="564"> fn from(hashed_api_key: storage::HashedApiKey) -> Self { Self(hashed_api_key.into_inner()) } <file_sep path="hyperswitch/crates/router/src/core/api_keys.rs" role="context" start="561" end="561"> use crate::{ configs::settings, consts, core::errors::{self, RouterResponse, StorageErrorExt}, db::domain, routes::{metrics, SessionState}, services::{authentication, ApplicationResponse}, types::{api, storage, transformers::ForeignInto}, }; <file_sep path="hyperswitch/crates/router/src/core/api_keys.rs" role="context" start="573" end="587"> async fn test_hashing_and_verification() { let settings = settings::Settings::new().expect("invalid settings"); let plaintext_api_key = PlaintextApiKey::new(consts::API_KEY_LENGTH); let hash_key = settings.api_keys.get_inner().get_hash_key().unwrap(); let hashed_api_key = plaintext_api_key.keyed_hash(hash_key.peek()); assert_ne!( plaintext_api_key.0.peek().as_bytes(), hashed_api_key.0.as_bytes() ); let new_hashed_api_key = plaintext_api_key.keyed_hash(hash_key.peek()); assert_eq!(hashed_api_key, new_hashed_api_key) } <file_sep path="hyperswitch/crates/router/src/core/api_keys.rs" role="context" start="556" end="558"> fn from(hashed_api_key: HashedApiKey) -> Self { hashed_api_key.0.into() } <file_sep path="hyperswitch/crates/router/src/core/api_keys.rs" role="context" start="550" end="552"> fn from(s: String) -> Self { Self(s.into()) } <file_sep path="hyperswitch/crates/router/src/core/api_keys.rs" role="context" start="366" end="423"> pub async fn update_api_key_expiry_task( store: &dyn crate::db::StorageInterface, api_key: &ApiKey, expiry_reminder_days: Vec<u8>, ) -> Result<(), errors::ProcessTrackerError> { let current_time = date_time::now(); let schedule_time = expiry_reminder_days .first() .and_then(|expiry_reminder_day| { api_key.expires_at.map(|expires_at| { expires_at.saturating_sub(time::Duration::days(i64::from(*expiry_reminder_day))) }) }); if let Some(schedule_time) = schedule_time { if schedule_time <= current_time { return Ok(()); } } let task_id = generate_task_id_for_api_key_expiry_workflow(&api_key.key_id); let task_ids = vec![task_id.clone()]; let updated_tracking_data = &storage::ApiKeyExpiryTrackingData { key_id: api_key.key_id.clone(), merchant_id: api_key.merchant_id.clone(), api_key_name: api_key.name.clone(), prefix: api_key.prefix.clone(), api_key_expiry: api_key.expires_at, expiry_reminder_days, }; let updated_api_key_expiry_workflow_model = serde_json::to_value(updated_tracking_data) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable_lazy(|| { format!("unable to serialize API key expiry tracker: {updated_tracking_data:?}") })?; let updated_process_tracker_data = storage::ProcessTrackerUpdate::Update { name: None, retry_count: Some(0), schedule_time, tracking_data: Some(updated_api_key_expiry_workflow_model), business_status: Some(String::from( diesel_models::process_tracker::business_status::PENDING, )), status: Some(storage_enums::ProcessTrackerStatus::New), updated_at: Some(current_time), }; store .process_tracker_update_process_status_by_ids(task_ids, updated_process_tracker_data) .await .change_context(errors::ApiErrorResponse::InternalServerError)?; Ok(()) } <file_sep path="hyperswitch/crates/router/src/core/api_keys.rs" role="context" start="493" end="510"> pub async fn revoke_api_key_expiry_task( store: &dyn crate::db::StorageInterface, key_id: &common_utils::id_type::ApiKeyId, ) -> Result<(), errors::ProcessTrackerError> { let task_id = generate_task_id_for_api_key_expiry_workflow(key_id); let task_ids = vec![task_id]; let updated_process_tracker_data = storage::ProcessTrackerUpdate::StatusUpdate { status: storage_enums::ProcessTrackerStatus::Finish, business_status: Some(String::from(diesel_models::business_status::REVOKED)), }; store .process_tracker_update_process_status_by_ids(task_ids, updated_process_tracker_data) .await .change_context(errors::ApiErrorResponse::InternalServerError)?; Ok(()) } <file_sep path="hyperswitch/crates/router/src/core/api_keys.rs" role="context" start="52" end="52"> pub struct HashedApiKey(String);
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/cards_info.rs<|crate|> router anchor=new kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=1<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/cards_info.rs" role="context" start="243" end="248"> fn new() -> Self { Self { state: std::marker::PhantomData, card_info: None, } } <file_sep path="hyperswitch/crates/router/src/core/cards_info.rs" role="context" start="262" end="267"> fn transition(self) -> CardInfoBuilder<CardInfoAdd> { CardInfoBuilder { state: std::marker::PhantomData, card_info: None, } } <file_sep path="hyperswitch/crates/router/src/core/cards_info.rs" role="context" start="252" end="260"> fn set_card_info( self, card_info: card_info_models::CardInfo, ) -> CardInfoBuilder<CardInfoUpdate> { CardInfoBuilder { state: std::marker::PhantomData, card_info: Some(card_info), } } <file_sep path="hyperswitch/crates/router/src/core/cards_info.rs" role="context" start="209" end="233"> async fn update_card_info(&self) -> RouterResult<card_info_models::CardInfo> { let db = self.state.store.as_ref(); let card_info = CardsInfoInterface::update_card_info( db, self.record.card_iin.clone(), card_info_models::UpdateCardInfo { card_issuer: self.record.card_issuer.clone(), card_network: self.record.card_network.clone(), card_type: self.record.card_type.clone(), card_subtype: self.record.card_subtype.clone(), card_issuing_country: self.record.card_issuing_country.clone(), bank_code_id: self.record.bank_code_id.clone(), bank_code: self.record.bank_code.clone(), country_code: self.record.country_code.clone(), last_updated: Some(common_utils::date_time::now()), last_updated_provider: self.record.last_updated_provider.clone(), }, ) .await .to_not_found_response(errors::ApiErrorResponse::GenericNotFoundError { message: "Card info with given key does not exist in our records".to_string(), }) .attach_printable("Failed while updating card info")?; Ok(card_info) } <file_sep path="hyperswitch/crates/router/src/core/cards_info.rs" role="context" start="199" end="207"> async fn add_card_info(&self) -> RouterResult<card_info_models::CardInfo> { let db = self.state.store.as_ref(); let card_info = CardsInfoInterface::add_card_info(db, self.record.clone().foreign_into()) .await .to_duplicate_response(errors::ApiErrorResponse::GenericDuplicateError { message: "CardInfo with given key already exists in our records".to_string(), })?; Ok(card_info) } <file_sep path="hyperswitch/crates/router/src/core/cards_info.rs" role="context" start="111" end="124"> fn parse_cards_bin_csv( data: &[u8], ) -> csv::Result<Vec<cards_info_api_types::CardInfoUpdateRequest>> { let mut csv_reader = Reader::from_reader(data); let mut records = Vec::new(); let mut id_counter = 0; for result in csv_reader.deserialize() { let mut record: cards_info_api_types::CardInfoUpdateRequest = result?; id_counter += 1; record.line_number = Some(id_counter); records.push(record); } Ok(records) } <file_sep path="hyperswitch/crates/router/src/core/cards_info.rs" role="context" start="138" end="155"> pub async fn migrate_cards_info( state: routes::SessionState, card_info_records: Vec<cards_info_api_types::CardInfoUpdateRequest>, ) -> RouterResponse<Vec<cards_info_api_types::CardInfoMigrationResponse>> { let mut result = Vec::new(); for record in card_info_records { let res = card_info_flow(record.clone(), state.clone()).await; result.push(cards_info_api_types::CardInfoMigrationResponse::from(( match res { Ok(ApplicationResponse::Json(response)) => Ok(response), Err(e) => Err(e.to_string()), _ => Err("Failed to migrate card info".to_string()), }, record, ))); } Ok(ApplicationResponse::Json(result)) }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/payment_methods/vault.rs<|crate|> router anchor=get_redis_locker_key kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=1<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/payment_methods/vault.rs" role="context" start="1006" end="1008"> fn get_redis_locker_key(lookup_key: &str) -> String { format!("{}_{}", consts::LOCKER_REDIS_PREFIX, lookup_key) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/vault.rs" role="context" start="1005" end="1005"> use crate::{ consts, core::errors::{self, CustomResult, RouterResult}, db, logger, routes, routes::metrics, types::{ api, domain, storage::{self, enums}, }, utils::StringExt, }; <file_sep path="hyperswitch/crates/router/src/core/payment_methods/vault.rs" role="context" start="1076" end="1138"> pub async fn get_tokenized_data( state: &routes::SessionState, lookup_key: &str, _should_get_value2: bool, encryption_key: &masking::Secret<Vec<u8>>, ) -> RouterResult<api::TokenizePayloadRequest> { let redis_key = get_redis_locker_key(lookup_key); let func = || async { metrics::GET_TOKENIZED_CARD.add(1, &[]); let redis_conn = state .store .get_redis_conn() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to get redis connection")?; let response = redis_conn .get_key::<bytes::Bytes>(&redis_key.as_str().into()) .await; match response { Ok(resp) => { let decrypted_payload = GcmAes256 .decode_message( encryption_key.peek().as_ref(), masking::Secret::new(resp.into()), ) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to decode redis temp locker data")?; let get_response: api::TokenizePayloadRequest = bytes::Bytes::from(decrypted_payload) .parse_struct("TokenizePayloadRequest") .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable( "Error getting TokenizePayloadRequest from tokenize response", )?; Ok(get_response) } Err(err) => { metrics::TEMP_LOCKER_FAILURES.add(1, &[]); Err(err).change_context(errors::ApiErrorResponse::UnprocessableEntity { message: "Token is invalid or expired".into(), }) } } }; match func().await { Ok(s) => { logger::info!( "Fetch payload in redis locker successful with lookup key: {:?}", redis_key ); Ok(s) } Err(err) => { logger::error!("Redis Temp locker Failed: {:?}", err); Err(err) } } } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/vault.rs" role="context" start="1011" end="1073"> pub async fn create_tokenize( state: &routes::SessionState, value1: String, value2: Option<String>, lookup_key: String, encryption_key: &masking::Secret<Vec<u8>>, ) -> RouterResult<String> { let redis_key = get_redis_locker_key(lookup_key.as_str()); let func = || async { metrics::CREATED_TOKENIZED_CARD.add(1, &[]); let payload_to_be_encrypted = api::TokenizePayloadRequest { value1: value1.clone(), value2: value2.clone().unwrap_or_default(), lookup_key: lookup_key.clone(), service_name: VAULT_SERVICE_NAME.to_string(), }; let payload = payload_to_be_encrypted .encode_to_string_of_json() .change_context(errors::ApiErrorResponse::InternalServerError)?; let encrypted_payload = GcmAes256 .encode_message(encryption_key.peek().as_ref(), payload.as_bytes()) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to encode redis temp locker data")?; let redis_conn = state .store .get_redis_conn() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to get redis connection")?; redis_conn .set_key_if_not_exists_with_expiry( &redis_key.as_str().into(), bytes::Bytes::from(encrypted_payload), Some(i64::from(consts::LOCKER_REDIS_EXPIRY_SECONDS)), ) .await .map(|_| lookup_key.clone()) .inspect_err(|error| { metrics::TEMP_LOCKER_FAILURES.add(1, &[]); logger::error!(?error, "Failed to store tokenized data in Redis"); }) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error from redis locker") }; match func().await { Ok(s) => { logger::info!( "Insert payload in redis locker successful with lookup key: {:?}", redis_key ); Ok(s) } Err(err) => { logger::error!("Redis Temp locker Failed: {:?}", err); Err(err) } } } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/vault.rs" role="context" start="989" end="1000"> pub async fn delete_locker_payment_method_by_lookup_key( state: &routes::SessionState, lookup_key: &Option<String>, ) { if let Some(lookup_key) = lookup_key { delete_tokenized_data(state, lookup_key) .await .map(|_| logger::info!("Card From locker deleted Successfully")) .map_err(|err| logger::error!("Error: Deleting Card From Redis Locker : {:?}", err)) .ok(); } } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/vault.rs" role="context" start="955" end="986"> pub async fn store_payout_method_data_in_locker( state: &routes::SessionState, token_id: Option<String>, payout_method: &api::PayoutMethodData, customer_id: Option<id_type::CustomerId>, merchant_key_store: &domain::MerchantKeyStore, ) -> RouterResult<String> { let value1 = payout_method .get_value1(customer_id.clone()) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error getting Value1 for locker")?; let value2 = payout_method .get_value2(customer_id) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error getting Value2 for locker")?; let lookup_key = token_id.unwrap_or_else(|| generate_id_with_default_len("temporary_token")); let lookup_key = create_tokenize( state, value1, Some(value2), lookup_key, merchant_key_store.key.get_inner(), ) .await?; // add_delete_tokenized_data_task(&*state.store, &lookup_key, pm).await?; // scheduler_metrics::TOKENIZED_DATA_COUNT.add(1, &[]); Ok(lookup_key) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/vault.rs" role="context" start="1141" end="1184"> pub async fn delete_tokenized_data( state: &routes::SessionState, lookup_key: &str, ) -> RouterResult<()> { let redis_key = get_redis_locker_key(lookup_key); let func = || async { metrics::DELETED_TOKENIZED_CARD.add(1, &[]); let redis_conn = state .store .get_redis_conn() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to get redis connection")?; let response = redis_conn.delete_key(&redis_key.as_str().into()).await; match response { Ok(redis_interface::DelReply::KeyDeleted) => Ok(()), Ok(redis_interface::DelReply::KeyNotDeleted) => { Err(errors::ApiErrorResponse::InternalServerError) .attach_printable("Token invalid or expired") } Err(err) => { metrics::TEMP_LOCKER_FAILURES.add(1, &[]); Err(errors::ApiErrorResponse::InternalServerError).attach_printable_lazy(|| { format!("Failed to delete from redis locker: {err:?}") }) } } }; match func().await { Ok(s) => { logger::info!( "Delete payload in redis locker successful with lookup key: {:?}", redis_key ); Ok(s) } Err(err) => { logger::error!("Redis Temp locker Failed: {:?}", err); Err(err) } } }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/payment_methods/migration.rs<|crate|> router anchor=new kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=1<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/payment_methods/migration.rs" role="context" start="170" end="177"> pub fn new() -> Self { Self { card_migrated: None, network_token_migrated: None, connector_mandate_details_migrated: None, network_transaction_migrated: None, } } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/migration.rs" role="context" start="183" end="185"> pub fn network_token_migrated(&mut self, network_token_migrated: Option<bool>) { self.network_token_migrated = network_token_migrated; } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/migration.rs" role="context" start="179" end="181"> pub fn card_migrated(&mut self, card_migrated: bool) { self.card_migrated = Some(card_migrated); } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/migration.rs" role="context" start="137" end="151"> fn validate_card_exp_year(year: String) -> Result<(), errors::ValidationError> { let year_str = year.to_string(); if year_str.len() == 2 || year_str.len() == 4 { year_str .parse::<u16>() .map_err(|_| errors::ValidationError::InvalidValue { message: "card_exp_year".to_string(), })?; Ok(()) } else { Err(errors::ValidationError::InvalidValue { message: "invalid card expiration year".to_string(), }) } } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/migration.rs" role="context" start="109" end="135"> pub fn validate_card_expiry( card_exp_month: &masking::Secret<String>, card_exp_year: &masking::Secret<String>, ) -> errors::CustomResult<(), errors::ApiErrorResponse> { let exp_month = card_exp_month .peek() .to_string() .parse::<u8>() .change_context(errors::ApiErrorResponse::InvalidDataValue { field_name: "card_exp_month", })?; ::cards::CardExpirationMonth::try_from(exp_month).change_context( errors::ApiErrorResponse::PreconditionFailed { message: "Invalid Expiry Month".to_string(), }, )?; let year_str = card_exp_year.peek().to_string(); validate_card_exp_year(year_str).change_context( errors::ApiErrorResponse::PreconditionFailed { message: "Invalid Expiry Year".to_string(), }, )?; Ok(()) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/migration.rs" role="context" start="74" end="85"> fn parse_csv(data: &[u8]) -> csv::Result<Vec<PaymentMethodRecord>> { let mut csv_reader = Reader::from_reader(data); let mut records = Vec::new(); let mut id_counter = 0; for result in csv_reader.deserialize() { let mut record: PaymentMethodRecord = result?; id_counter += 1; record.line_number = Some(id_counter); records.push(record); } Ok(records) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/migration.rs" role="context" start="209" end="211"> fn default() -> Self { Self::new() }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/api_keys.rs<|crate|> router anchor=new kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=1<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/api_keys.rs" role="context" start="59" end="63"> pub fn new(length: usize) -> Self { let env = router_env::env::prefix_for_env(); let key = common_utils::crypto::generate_cryptographically_secure_random_string(length); Self(format!("{env}_{key}").into()) } <file_sep path="hyperswitch/crates/router/src/core/api_keys.rs" role="context" start="58" end="58"> use common_utils::date_time; use router_env::{instrument, tracing}; <file_sep path="hyperswitch/crates/router/src/core/api_keys.rs" role="context" start="70" end="72"> pub fn prefix(&self) -> String { self.0.peek().chars().take(Self::PREFIX_LEN).collect() } <file_sep path="hyperswitch/crates/router/src/core/api_keys.rs" role="context" start="65" end="68"> pub fn new_key_id() -> common_utils::id_type::ApiKeyId { let env = router_env::env::prefix_for_env(); common_utils::id_type::ApiKeyId::generate_key_id(env) } <file_sep path="hyperswitch/crates/router/src/core/api_keys.rs" role="context" start="30" end="44"> pub fn get_hash_key( &self, ) -> errors::RouterResult<&'static StrongSecret<[u8; PlaintextApiKey::HASH_KEY_LEN]>> { HASH_KEY.get_or_try_init(|| { <[u8; PlaintextApiKey::HASH_KEY_LEN]>::try_from( hex::decode(self.hash_key.peek()) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("API key hash key has invalid hexadecimal data")? .as_slice(), ) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("The API hashing key has incorrect length") .map(StrongSecret::new) }) } <file_sep path="hyperswitch/crates/router/src/core/api_keys.rs" role="context" start="192" end="251"> pub async fn add_api_key_expiry_task( store: &dyn crate::db::StorageInterface, api_key: &ApiKey, expiry_reminder_days: Vec<u8>, ) -> Result<(), errors::ProcessTrackerError> { let current_time = date_time::now(); let schedule_time = expiry_reminder_days .first() .and_then(|expiry_reminder_day| { api_key.expires_at.map(|expires_at| { expires_at.saturating_sub(time::Duration::days(i64::from(*expiry_reminder_day))) }) }) .ok_or(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to obtain initial process tracker schedule time")?; if schedule_time <= current_time { return Ok(()); } let api_key_expiry_tracker = storage::ApiKeyExpiryTrackingData { key_id: api_key.key_id.clone(), merchant_id: api_key.merchant_id.clone(), api_key_name: api_key.name.clone(), prefix: api_key.prefix.clone(), // We need API key expiry too, because we need to decide on the schedule_time in // execute_workflow() where we won't be having access to the Api key object. api_key_expiry: api_key.expires_at, expiry_reminder_days: expiry_reminder_days.clone(), }; let process_tracker_id = generate_task_id_for_api_key_expiry_workflow(&api_key.key_id); let process_tracker_entry = storage::ProcessTrackerNew::new( process_tracker_id, API_KEY_EXPIRY_NAME, API_KEY_EXPIRY_RUNNER, [API_KEY_EXPIRY_TAG], api_key_expiry_tracker, None, schedule_time, common_types::consts::API_VERSION, ) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to construct API key expiry process tracker task")?; store .insert_process(process_tracker_entry) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable_lazy(|| { format!( "Failed while inserting API key expiry reminder to process_tracker: {:?}", api_key.key_id ) })?; metrics::TASKS_ADDED_COUNT.add(1, router_env::metric_attributes!(("flow", "ApiKeyExpiry"))); Ok(()) } <file_sep path="hyperswitch/crates/router/src/core/api_keys.rs" role="context" start="573" end="587"> async fn test_hashing_and_verification() { let settings = settings::Settings::new().expect("invalid settings"); let plaintext_api_key = PlaintextApiKey::new(consts::API_KEY_LENGTH); let hash_key = settings.api_keys.get_inner().get_hash_key().unwrap(); let hashed_api_key = plaintext_api_key.keyed_hash(hash_key.peek()); assert_ne!( plaintext_api_key.0.peek().as_bytes(), hashed_api_key.0.as_bytes() ); let new_hashed_api_key = plaintext_api_key.keyed_hash(hash_key.peek()); assert_eq!(hashed_api_key, new_hashed_api_key) }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/payment_link.rs<|crate|> router anchor=get_color_scheme_css kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/payment_link.rs" role="context" start="469" end="479"> fn get_color_scheme_css(payment_link_config: &PaymentLinkConfig) -> String { let background_primary_color = payment_link_config .background_colour .clone() .unwrap_or(payment_link_config.theme.clone()); format!( ":root {{ --primary-color: {background_primary_color}; }}" ) } <file_sep path="hyperswitch/crates/router/src/core/payment_link.rs" role="context" start="468" end="468"> use api_models::{ admin::PaymentLinkConfig, payments::{PaymentLinkData, PaymentLinkStatusWrap}, }; <file_sep path="hyperswitch/crates/router/src/core/payment_link.rs" role="context" start="493" end="505"> fn validate_sdk_requirements( currency: Option<api_models::enums::Currency>, client_secret: Option<String>, ) -> Result<(api_models::enums::Currency, String), errors::ApiErrorResponse> { let currency = currency.ok_or(errors::ApiErrorResponse::MissingRequiredField { field_name: "currency", })?; let client_secret = client_secret.ok_or(errors::ApiErrorResponse::MissingRequiredField { field_name: "client_secret", })?; Ok((currency, client_secret)) } <file_sep path="hyperswitch/crates/router/src/core/payment_link.rs" role="context" start="481" end="491"> fn get_meta_tags_html(payment_details: &api_models::payments::PaymentLinkDetails) -> String { format!( r#"<meta property="og:title" content="Payment request from {0}"/> <meta property="og:description" content="{1}"/>"#, payment_details.merchant_name.clone(), payment_details .merchant_description .clone() .unwrap_or_default() ) } <file_sep path="hyperswitch/crates/router/src/core/payment_link.rs" role="context" start="462" end="467"> fn get_js_script(payment_details: &PaymentLinkData) -> RouterResult<String> { let payment_details_str = serde_json::to_string(payment_details) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to serialize PaymentLinkData")?; Ok(format!("window.__PAYMENT_DETAILS = {payment_details_str};")) } <file_sep path="hyperswitch/crates/router/src/core/payment_link.rs" role="context" start="411" end="456"> pub async fn initiate_payment_link_flow( state: SessionState, merchant_account: domain::MerchantAccount, key_store: domain::MerchantKeyStore, merchant_id: common_utils::id_type::MerchantId, payment_id: common_utils::id_type::PaymentId, ) -> RouterResponse<services::PaymentLinkFormData> { let (_, payment_details, payment_link_config) = form_payment_link_data(&state, merchant_account, key_store, merchant_id, payment_id) .await?; let css_script = get_color_scheme_css(&payment_link_config); let js_script = get_js_script(&payment_details)?; match payment_details { PaymentLinkData::PaymentLinkStatusDetails(status_details) => { let payment_link_error_data = services::PaymentLinkStatusData { js_script, css_script, }; logger::info!( "payment link data, for building payment link status page {:?}", status_details ); Ok(services::ApplicationResponse::PaymentLinkForm(Box::new( services::api::PaymentLinkAction::PaymentLinkStatus(payment_link_error_data), ))) } PaymentLinkData::PaymentLinkDetails(payment_details) => { let html_meta_tags = get_meta_tags_html(&payment_details); let payment_link_data = services::PaymentLinkFormData { js_script, sdk_url: state.conf.payment_link.sdk_url.clone(), css_script, html_meta_tags, }; logger::info!( "payment link data, for building open payment link {:?}", payment_link_data ); Ok(services::ApplicationResponse::PaymentLinkForm(Box::new( services::api::PaymentLinkAction::PaymentLinkFormData(payment_link_data), ))) } } } <file_sep path="hyperswitch/crates/router/src/core/payment_link.rs" role="context" start="308" end="409"> pub async fn initiate_secure_payment_link_flow( state: SessionState, merchant_account: domain::MerchantAccount, key_store: domain::MerchantKeyStore, merchant_id: common_utils::id_type::MerchantId, payment_id: common_utils::id_type::PaymentId, request_headers: &header::HeaderMap, ) -> RouterResponse<services::PaymentLinkFormData> { let (payment_link, payment_link_details, payment_link_config) = form_payment_link_data(&state, merchant_account, key_store, merchant_id, payment_id) .await?; validator::validate_secure_payment_link_render_request( request_headers, &payment_link, &payment_link_config, )?; let css_script = get_color_scheme_css(&payment_link_config); match payment_link_details { PaymentLinkData::PaymentLinkStatusDetails(ref status_details) => { let js_script = get_js_script(&payment_link_details)?; let payment_link_error_data = services::PaymentLinkStatusData { js_script, css_script, }; logger::info!( "payment link data, for building payment link status page {:?}", status_details ); Ok(services::ApplicationResponse::PaymentLinkForm(Box::new( services::api::PaymentLinkAction::PaymentLinkStatus(payment_link_error_data), ))) } PaymentLinkData::PaymentLinkDetails(link_details) => { let secure_payment_link_details = api_models::payments::SecurePaymentLinkDetails { enabled_saved_payment_method: payment_link_config.enabled_saved_payment_method, hide_card_nickname_field: payment_link_config.hide_card_nickname_field, show_card_form_by_default: payment_link_config.show_card_form_by_default, payment_link_details: *link_details.to_owned(), payment_button_text: payment_link_config.payment_button_text, custom_message_for_card_terms: payment_link_config.custom_message_for_card_terms, payment_button_colour: payment_link_config.payment_button_colour, skip_status_screen: payment_link_config.skip_status_screen, background_colour: payment_link_config.background_colour, payment_button_text_colour: payment_link_config.payment_button_text_colour, sdk_ui_rules: payment_link_config.sdk_ui_rules, payment_link_ui_rules: payment_link_config.payment_link_ui_rules, enable_button_only_on_form_ready: payment_link_config .enable_button_only_on_form_ready, }; let js_script = format!( "window.__PAYMENT_DETAILS = {}", serde_json::to_string(&secure_payment_link_details) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to serialize PaymentLinkData")? ); let html_meta_tags = get_meta_tags_html(&link_details); let payment_link_data = services::PaymentLinkFormData { js_script, sdk_url: state.conf.payment_link.sdk_url.clone(), css_script, html_meta_tags, }; let allowed_domains = payment_link_config .allowed_domains .clone() .ok_or(report!(errors::ApiErrorResponse::InternalServerError)) .attach_printable_lazy(|| { format!( "Invalid list of allowed_domains found - {:?}", payment_link_config.allowed_domains.clone() ) })?; if allowed_domains.is_empty() { return Err(report!(errors::ApiErrorResponse::InternalServerError)) .attach_printable_lazy(|| { format!( "Invalid list of allowed_domains found - {:?}", payment_link_config.allowed_domains.clone() ) }); } let link_data = GenericLinks { allowed_domains, data: GenericLinksData::SecurePaymentLink(payment_link_data), locale: DEFAULT_LOCALE.to_string(), }; logger::info!( "payment link data, for building secure payment link {:?}", link_data ); Ok(services::ApplicationResponse::GenericLinkForm(Box::new( link_data, ))) } } } <file_sep path="hyperswitch/crates/router/src/core/payment_link.rs" role="context" start="756" end="923"> pub async fn get_payment_link_status( state: SessionState, merchant_account: domain::MerchantAccount, key_store: domain::MerchantKeyStore, merchant_id: common_utils::id_type::MerchantId, payment_id: common_utils::id_type::PaymentId, ) -> RouterResponse<services::PaymentLinkFormData> { let db = &*state.store; let key_manager_state = &(&state).into(); let payment_intent = db .find_payment_intent_by_payment_id_merchant_id( key_manager_state, &payment_id, &merchant_id, &key_store, merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::PaymentNotFound)?; let attempt_id = payment_intent.active_attempt.get_id().clone(); let payment_attempt = db .find_payment_attempt_by_payment_id_merchant_id_attempt_id( &payment_intent.payment_id, &merchant_id, &attempt_id.clone(), merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::PaymentNotFound)?; let payment_link_id = payment_intent .payment_link_id .get_required_value("payment_link_id") .change_context(errors::ApiErrorResponse::PaymentLinkNotFound)?; let merchant_name_from_merchant_account = merchant_account .merchant_name .clone() .map(|merchant_name| merchant_name.into_inner().peek().to_owned()) .unwrap_or_default(); let payment_link = db .find_payment_link_by_payment_link_id(&payment_link_id) .await .to_not_found_response(errors::ApiErrorResponse::PaymentLinkNotFound)?; let payment_link_config = if let Some(pl_config_value) = payment_link.payment_link_config { extract_payment_link_config(pl_config_value)? } else { PaymentLinkConfig { theme: DEFAULT_BACKGROUND_COLOR.to_string(), logo: DEFAULT_MERCHANT_LOGO.to_string(), seller_name: merchant_name_from_merchant_account, sdk_layout: DEFAULT_SDK_LAYOUT.to_owned(), display_sdk_only: DEFAULT_DISPLAY_SDK_ONLY, enabled_saved_payment_method: DEFAULT_ENABLE_SAVED_PAYMENT_METHOD, hide_card_nickname_field: DEFAULT_HIDE_CARD_NICKNAME_FIELD, show_card_form_by_default: DEFAULT_SHOW_CARD_FORM, allowed_domains: DEFAULT_ALLOWED_DOMAINS, transaction_details: None, background_image: None, details_layout: None, branding_visibility: None, payment_button_text: None, custom_message_for_card_terms: None, payment_button_colour: None, skip_status_screen: None, background_colour: None, payment_button_text_colour: None, sdk_ui_rules: None, payment_link_ui_rules: None, enable_button_only_on_form_ready: DEFAULT_ENABLE_BUTTON_ONLY_ON_FORM_READY, } }; let currency = payment_intent .currency .ok_or(errors::ApiErrorResponse::MissingRequiredField { field_name: "currency", })?; let required_conversion_type = StringMajorUnitForCore; let amount = required_conversion_type .convert(payment_attempt.get_total_amount(), currency) .change_context(errors::ApiErrorResponse::AmountConversionFailed { amount_type: "StringMajorUnit", })?; // converting first letter of merchant name to upperCase let merchant_name = capitalize_first_char(&payment_link_config.seller_name); let css_script = get_color_scheme_css(&payment_link_config); let profile_id = payment_link .profile_id .or(payment_intent.profile_id) .ok_or(errors::ApiErrorResponse::InternalServerError) .attach_printable("Profile id missing in payment link and payment intent")?; let business_profile = db .find_business_profile_by_profile_id(key_manager_state, &key_store, &profile_id) .await .to_not_found_response(errors::ApiErrorResponse::ProfileNotFound { id: profile_id.get_string_repr().to_owned(), })?; let return_url = if let Some(payment_create_return_url) = payment_intent.return_url.clone() { payment_create_return_url } else { business_profile .return_url .ok_or(errors::ApiErrorResponse::MissingRequiredField { field_name: "return_url", })? }; let (unified_code, unified_message) = if let Some((code, message)) = payment_attempt .unified_code .as_ref() .zip(payment_attempt.unified_message.as_ref()) { (code.to_owned(), message.to_owned()) } else { ( consts::DEFAULT_UNIFIED_ERROR_CODE.to_owned(), consts::DEFAULT_UNIFIED_ERROR_MESSAGE.to_owned(), ) }; let unified_translated_message = helpers::get_unified_translation( &state, unified_code.to_owned(), unified_message.to_owned(), state.locale.clone(), ) .await .or(Some(unified_message)); let payment_details = api_models::payments::PaymentLinkStatusDetails { amount, currency, payment_id: payment_intent.payment_id, merchant_name, merchant_logo: payment_link_config.logo.clone(), created: payment_link.created_at, status: PaymentLinkStatusWrap::IntentStatus(payment_intent.status), error_code: payment_attempt.error_code, error_message: payment_attempt.error_message, redirect: true, theme: payment_link_config.theme.clone(), return_url, locale: Some(state.locale.clone()), transaction_details: payment_link_config.transaction_details, unified_code: Some(unified_code), unified_message: unified_translated_message, }; let js_script = get_js_script(&PaymentLinkData::PaymentLinkStatusDetails(Box::new( payment_details, )))?; let payment_link_status_data = services::PaymentLinkStatusData { js_script, css_script, }; Ok(services::ApplicationResponse::PaymentLinkForm(Box::new( services::api::PaymentLinkAction::PaymentLinkStatus(payment_link_status_data), ))) } <file_sep path="hyperswitch/crates/api_models/src/admin.rs" role="context" start="2939" end="2985"> pub struct PaymentLinkConfig { /// custom theme for the payment link pub theme: String, /// merchant display logo pub logo: String, /// Custom merchant name for payment link pub seller_name: String, /// Custom layout for sdk pub sdk_layout: String, /// Display only the sdk for payment link pub display_sdk_only: bool, /// Enable saved payment method option for payment link pub enabled_saved_payment_method: bool, /// Hide card nickname field option for payment link pub hide_card_nickname_field: bool, /// Show card form by default for payment link pub show_card_form_by_default: bool, /// A list of allowed domains (glob patterns) where this link can be embedded / opened from pub allowed_domains: Option<HashSet<String>>, /// Dynamic details related to merchant to be rendered in payment link pub transaction_details: Option<Vec<PaymentLinkTransactionDetails>>, /// Configurations for the background image for details section pub background_image: Option<PaymentLinkBackgroundImageConfig>, /// Custom layout for details section #[schema(value_type = Option<PaymentLinkDetailsLayout>, example = "layout1")] pub details_layout: Option<api_enums::PaymentLinkDetailsLayout>, /// Toggle for HyperSwitch branding visibility pub branding_visibility: Option<bool>, /// Text for payment link's handle confirm button pub payment_button_text: Option<String>, /// Text for customizing message for card terms pub custom_message_for_card_terms: Option<String>, /// Custom background colour for payment link's handle confirm button pub payment_button_colour: Option<String>, /// Skip the status screen after payment completion pub skip_status_screen: Option<bool>, /// Custom text colour for payment link's handle confirm button pub payment_button_text_colour: Option<String>, /// Custom background colour for the payment link pub background_colour: Option<String>, /// SDK configuration rules pub sdk_ui_rules: Option<HashMap<String, HashMap<String, String>>>, /// Payment link configuration rules pub payment_link_ui_rules: Option<HashMap<String, HashMap<String, String>>>, /// Flag to enable the button only when the payment form is ready for submission pub enable_button_only_on_form_ready: bool, }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/payment_link.rs<|crate|> router anchor=get_js_script kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/payment_link.rs" role="context" start="462" end="467"> fn get_js_script(payment_details: &PaymentLinkData) -> RouterResult<String> { let payment_details_str = serde_json::to_string(payment_details) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to serialize PaymentLinkData")?; Ok(format!("window.__PAYMENT_DETAILS = {payment_details_str};")) } <file_sep path="hyperswitch/crates/router/src/core/payment_link.rs" role="context" start="461" end="461"> use api_models::{ admin::PaymentLinkConfig, payments::{PaymentLinkData, PaymentLinkStatusWrap}, }; use super::{ errors::{self, RouterResult, StorageErrorExt}, payments::helpers, }; use crate::{ consts::{ self, DEFAULT_ALLOWED_DOMAINS, DEFAULT_BACKGROUND_COLOR, DEFAULT_DISPLAY_SDK_ONLY, DEFAULT_ENABLE_BUTTON_ONLY_ON_FORM_READY, DEFAULT_ENABLE_SAVED_PAYMENT_METHOD, DEFAULT_HIDE_CARD_NICKNAME_FIELD, DEFAULT_MERCHANT_LOGO, DEFAULT_PRODUCT_IMG, DEFAULT_SDK_LAYOUT, DEFAULT_SHOW_CARD_FORM, }, errors::RouterResponse, get_payment_link_config_value, get_payment_link_config_value_based_on_priority, routes::SessionState, services, types::{ api::payment_link::PaymentLinkResponseExt, domain, storage::{enums as storage_enums, payment_link::PaymentLink}, transformers::{ForeignFrom, ForeignInto}, }, }; <file_sep path="hyperswitch/crates/router/src/core/payment_link.rs" role="context" start="481" end="491"> fn get_meta_tags_html(payment_details: &api_models::payments::PaymentLinkDetails) -> String { format!( r#"<meta property="og:title" content="Payment request from {0}"/> <meta property="og:description" content="{1}"/>"#, payment_details.merchant_name.clone(), payment_details .merchant_description .clone() .unwrap_or_default() ) } <file_sep path="hyperswitch/crates/router/src/core/payment_link.rs" role="context" start="469" end="479"> fn get_color_scheme_css(payment_link_config: &PaymentLinkConfig) -> String { let background_primary_color = payment_link_config .background_colour .clone() .unwrap_or(payment_link_config.theme.clone()); format!( ":root {{ --primary-color: {background_primary_color}; }}" ) } <file_sep path="hyperswitch/crates/router/src/core/payment_link.rs" role="context" start="411" end="456"> pub async fn initiate_payment_link_flow( state: SessionState, merchant_account: domain::MerchantAccount, key_store: domain::MerchantKeyStore, merchant_id: common_utils::id_type::MerchantId, payment_id: common_utils::id_type::PaymentId, ) -> RouterResponse<services::PaymentLinkFormData> { let (_, payment_details, payment_link_config) = form_payment_link_data(&state, merchant_account, key_store, merchant_id, payment_id) .await?; let css_script = get_color_scheme_css(&payment_link_config); let js_script = get_js_script(&payment_details)?; match payment_details { PaymentLinkData::PaymentLinkStatusDetails(status_details) => { let payment_link_error_data = services::PaymentLinkStatusData { js_script, css_script, }; logger::info!( "payment link data, for building payment link status page {:?}", status_details ); Ok(services::ApplicationResponse::PaymentLinkForm(Box::new( services::api::PaymentLinkAction::PaymentLinkStatus(payment_link_error_data), ))) } PaymentLinkData::PaymentLinkDetails(payment_details) => { let html_meta_tags = get_meta_tags_html(&payment_details); let payment_link_data = services::PaymentLinkFormData { js_script, sdk_url: state.conf.payment_link.sdk_url.clone(), css_script, html_meta_tags, }; logger::info!( "payment link data, for building open payment link {:?}", payment_link_data ); Ok(services::ApplicationResponse::PaymentLinkForm(Box::new( services::api::PaymentLinkAction::PaymentLinkFormData(payment_link_data), ))) } } } <file_sep path="hyperswitch/crates/router/src/core/payment_link.rs" role="context" start="308" end="409"> pub async fn initiate_secure_payment_link_flow( state: SessionState, merchant_account: domain::MerchantAccount, key_store: domain::MerchantKeyStore, merchant_id: common_utils::id_type::MerchantId, payment_id: common_utils::id_type::PaymentId, request_headers: &header::HeaderMap, ) -> RouterResponse<services::PaymentLinkFormData> { let (payment_link, payment_link_details, payment_link_config) = form_payment_link_data(&state, merchant_account, key_store, merchant_id, payment_id) .await?; validator::validate_secure_payment_link_render_request( request_headers, &payment_link, &payment_link_config, )?; let css_script = get_color_scheme_css(&payment_link_config); match payment_link_details { PaymentLinkData::PaymentLinkStatusDetails(ref status_details) => { let js_script = get_js_script(&payment_link_details)?; let payment_link_error_data = services::PaymentLinkStatusData { js_script, css_script, }; logger::info!( "payment link data, for building payment link status page {:?}", status_details ); Ok(services::ApplicationResponse::PaymentLinkForm(Box::new( services::api::PaymentLinkAction::PaymentLinkStatus(payment_link_error_data), ))) } PaymentLinkData::PaymentLinkDetails(link_details) => { let secure_payment_link_details = api_models::payments::SecurePaymentLinkDetails { enabled_saved_payment_method: payment_link_config.enabled_saved_payment_method, hide_card_nickname_field: payment_link_config.hide_card_nickname_field, show_card_form_by_default: payment_link_config.show_card_form_by_default, payment_link_details: *link_details.to_owned(), payment_button_text: payment_link_config.payment_button_text, custom_message_for_card_terms: payment_link_config.custom_message_for_card_terms, payment_button_colour: payment_link_config.payment_button_colour, skip_status_screen: payment_link_config.skip_status_screen, background_colour: payment_link_config.background_colour, payment_button_text_colour: payment_link_config.payment_button_text_colour, sdk_ui_rules: payment_link_config.sdk_ui_rules, payment_link_ui_rules: payment_link_config.payment_link_ui_rules, enable_button_only_on_form_ready: payment_link_config .enable_button_only_on_form_ready, }; let js_script = format!( "window.__PAYMENT_DETAILS = {}", serde_json::to_string(&secure_payment_link_details) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to serialize PaymentLinkData")? ); let html_meta_tags = get_meta_tags_html(&link_details); let payment_link_data = services::PaymentLinkFormData { js_script, sdk_url: state.conf.payment_link.sdk_url.clone(), css_script, html_meta_tags, }; let allowed_domains = payment_link_config .allowed_domains .clone() .ok_or(report!(errors::ApiErrorResponse::InternalServerError)) .attach_printable_lazy(|| { format!( "Invalid list of allowed_domains found - {:?}", payment_link_config.allowed_domains.clone() ) })?; if allowed_domains.is_empty() { return Err(report!(errors::ApiErrorResponse::InternalServerError)) .attach_printable_lazy(|| { format!( "Invalid list of allowed_domains found - {:?}", payment_link_config.allowed_domains.clone() ) }); } let link_data = GenericLinks { allowed_domains, data: GenericLinksData::SecurePaymentLink(payment_link_data), locale: DEFAULT_LOCALE.to_string(), }; logger::info!( "payment link data, for building secure payment link {:?}", link_data ); Ok(services::ApplicationResponse::GenericLinkForm(Box::new( link_data, ))) } } } <file_sep path="hyperswitch/crates/router/src/core/payment_link.rs" role="context" start="756" end="923"> pub async fn get_payment_link_status( state: SessionState, merchant_account: domain::MerchantAccount, key_store: domain::MerchantKeyStore, merchant_id: common_utils::id_type::MerchantId, payment_id: common_utils::id_type::PaymentId, ) -> RouterResponse<services::PaymentLinkFormData> { let db = &*state.store; let key_manager_state = &(&state).into(); let payment_intent = db .find_payment_intent_by_payment_id_merchant_id( key_manager_state, &payment_id, &merchant_id, &key_store, merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::PaymentNotFound)?; let attempt_id = payment_intent.active_attempt.get_id().clone(); let payment_attempt = db .find_payment_attempt_by_payment_id_merchant_id_attempt_id( &payment_intent.payment_id, &merchant_id, &attempt_id.clone(), merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::PaymentNotFound)?; let payment_link_id = payment_intent .payment_link_id .get_required_value("payment_link_id") .change_context(errors::ApiErrorResponse::PaymentLinkNotFound)?; let merchant_name_from_merchant_account = merchant_account .merchant_name .clone() .map(|merchant_name| merchant_name.into_inner().peek().to_owned()) .unwrap_or_default(); let payment_link = db .find_payment_link_by_payment_link_id(&payment_link_id) .await .to_not_found_response(errors::ApiErrorResponse::PaymentLinkNotFound)?; let payment_link_config = if let Some(pl_config_value) = payment_link.payment_link_config { extract_payment_link_config(pl_config_value)? } else { PaymentLinkConfig { theme: DEFAULT_BACKGROUND_COLOR.to_string(), logo: DEFAULT_MERCHANT_LOGO.to_string(), seller_name: merchant_name_from_merchant_account, sdk_layout: DEFAULT_SDK_LAYOUT.to_owned(), display_sdk_only: DEFAULT_DISPLAY_SDK_ONLY, enabled_saved_payment_method: DEFAULT_ENABLE_SAVED_PAYMENT_METHOD, hide_card_nickname_field: DEFAULT_HIDE_CARD_NICKNAME_FIELD, show_card_form_by_default: DEFAULT_SHOW_CARD_FORM, allowed_domains: DEFAULT_ALLOWED_DOMAINS, transaction_details: None, background_image: None, details_layout: None, branding_visibility: None, payment_button_text: None, custom_message_for_card_terms: None, payment_button_colour: None, skip_status_screen: None, background_colour: None, payment_button_text_colour: None, sdk_ui_rules: None, payment_link_ui_rules: None, enable_button_only_on_form_ready: DEFAULT_ENABLE_BUTTON_ONLY_ON_FORM_READY, } }; let currency = payment_intent .currency .ok_or(errors::ApiErrorResponse::MissingRequiredField { field_name: "currency", })?; let required_conversion_type = StringMajorUnitForCore; let amount = required_conversion_type .convert(payment_attempt.get_total_amount(), currency) .change_context(errors::ApiErrorResponse::AmountConversionFailed { amount_type: "StringMajorUnit", })?; // converting first letter of merchant name to upperCase let merchant_name = capitalize_first_char(&payment_link_config.seller_name); let css_script = get_color_scheme_css(&payment_link_config); let profile_id = payment_link .profile_id .or(payment_intent.profile_id) .ok_or(errors::ApiErrorResponse::InternalServerError) .attach_printable("Profile id missing in payment link and payment intent")?; let business_profile = db .find_business_profile_by_profile_id(key_manager_state, &key_store, &profile_id) .await .to_not_found_response(errors::ApiErrorResponse::ProfileNotFound { id: profile_id.get_string_repr().to_owned(), })?; let return_url = if let Some(payment_create_return_url) = payment_intent.return_url.clone() { payment_create_return_url } else { business_profile .return_url .ok_or(errors::ApiErrorResponse::MissingRequiredField { field_name: "return_url", })? }; let (unified_code, unified_message) = if let Some((code, message)) = payment_attempt .unified_code .as_ref() .zip(payment_attempt.unified_message.as_ref()) { (code.to_owned(), message.to_owned()) } else { ( consts::DEFAULT_UNIFIED_ERROR_CODE.to_owned(), consts::DEFAULT_UNIFIED_ERROR_MESSAGE.to_owned(), ) }; let unified_translated_message = helpers::get_unified_translation( &state, unified_code.to_owned(), unified_message.to_owned(), state.locale.clone(), ) .await .or(Some(unified_message)); let payment_details = api_models::payments::PaymentLinkStatusDetails { amount, currency, payment_id: payment_intent.payment_id, merchant_name, merchant_logo: payment_link_config.logo.clone(), created: payment_link.created_at, status: PaymentLinkStatusWrap::IntentStatus(payment_intent.status), error_code: payment_attempt.error_code, error_message: payment_attempt.error_message, redirect: true, theme: payment_link_config.theme.clone(), return_url, locale: Some(state.locale.clone()), transaction_details: payment_link_config.transaction_details, unified_code: Some(unified_code), unified_message: unified_translated_message, }; let js_script = get_js_script(&PaymentLinkData::PaymentLinkStatusDetails(Box::new( payment_details, )))?; let payment_link_status_data = services::PaymentLinkStatusData { js_script, css_script, }; Ok(services::ApplicationResponse::PaymentLinkForm(Box::new( services::api::PaymentLinkAction::PaymentLinkStatus(payment_link_status_data), ))) } <file_sep path="hyperswitch/crates/router/src/core/errors.rs" role="context" start="31" end="31"> pub type RouterResult<T> = CustomResult<T, ApiErrorResponse>; <file_sep path="hyperswitch/crates/api_models/src/errors/types.rs" role="context" start="86" end="100"> pub enum ApiErrorResponse { Unauthorized(ApiError), ForbiddenCommonResource(ApiError), ForbiddenPrivateResource(ApiError), Conflict(ApiError), Gone(ApiError), Unprocessable(ApiError), InternalServerError(ApiError), NotImplemented(ApiError), ConnectorError(ApiError, #[serde(skip_serializing)] StatusCode), NotFound(ApiError), MethodNotAllowed(ApiError), BadRequest(ApiError), DomainError(ApiError), }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/payouts.rs<|crate|> router anchor=payouts_core kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="309" end="318"> pub async fn payouts_core( state: &SessionState, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, payout_data: &mut PayoutData, routing_algorithm: Option<serde_json::Value>, eligible_connectors: Option<Vec<api_enums::PayoutConnectors>>, ) -> RouterResult<()> { todo!() } <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="308" end="308"> use api_models::{self, enums as api_enums, payouts::PayoutLinkResponse}; use serde_json; use crate::types::domain::behaviour::Conversion; use crate::{ core::{ errors::{ self, ConnectorErrorExt, CustomResult, RouterResponse, RouterResult, StorageErrorExt, }, payments::{self, customers, helpers as payment_helpers}, utils as core_utils, }, db::StorageInterface, routes::SessionState, services, types::{ self, api::{self, payments as payment_api_types, payouts}, domain, storage::{self, PaymentRoutingInfo}, transformers::ForeignFrom, }, utils::{self, OptionExt}, }; <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="386" end="455"> pub async fn payouts_confirm_core( state: SessionState, merchant_account: domain::MerchantAccount, key_store: domain::MerchantKeyStore, req: payouts::PayoutCreateRequest, ) -> RouterResponse<payouts::PayoutCreateResponse> { let mut payout_data = make_payout_data( &state, &merchant_account, None, &key_store, &payouts::PayoutRequest::PayoutCreateRequest(Box::new(req.to_owned())), &state.locale, ) .await?; let payout_attempt = payout_data.payout_attempt.to_owned(); let status = payout_attempt.status; helpers::validate_payout_status_against_not_allowed_statuses( status, &[ storage_enums::PayoutStatus::Cancelled, storage_enums::PayoutStatus::Success, storage_enums::PayoutStatus::Failed, storage_enums::PayoutStatus::Pending, storage_enums::PayoutStatus::Ineligible, storage_enums::PayoutStatus::RequiresFulfillment, storage_enums::PayoutStatus::RequiresVendorAccountCreation, ], "confirm", )?; helpers::update_payouts_and_payout_attempt( &mut payout_data, &merchant_account, &req, &state, &key_store, ) .await?; let db = &*state.store; payout_data.payout_link = payout_data .payout_link .clone() .async_map(|pl| async move { let payout_link_update = storage::PayoutLinkUpdate::StatusUpdate { link_status: PayoutLinkStatus::Submitted, }; db.update_payout_link(pl, payout_link_update) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error updating payout links in db") }) .await .transpose()?; payouts_core( &state, &merchant_account, &key_store, &mut payout_data, req.routing.clone(), req.connector.clone(), ) .await?; response_handler(&state, &merchant_account, &payout_data).await } <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="321" end="383"> pub async fn payouts_create_core( state: SessionState, merchant_account: domain::MerchantAccount, key_store: domain::MerchantKeyStore, req: payouts::PayoutCreateRequest, ) -> RouterResponse<payouts::PayoutCreateResponse> { // Validate create request let (payout_id, payout_method_data, profile_id, customer, payment_method) = validator::validate_create_request(&state, &merchant_account, &req, &key_store).await?; // Create DB entries let mut payout_data = payout_create_db_entries( &state, &merchant_account, &key_store, &req, &payout_id, &profile_id, payout_method_data.as_ref(), &state.locale, customer.as_ref(), payment_method.clone(), ) .await?; let payout_attempt = payout_data.payout_attempt.to_owned(); let payout_type = payout_data.payouts.payout_type.to_owned(); // Persist payout method data in temp locker if req.payout_method_data.is_some() { let customer_id = payout_data .payouts .customer_id .clone() .get_required_value("customer_id when payout_method_data is provided")?; payout_data.payout_method_data = helpers::make_payout_method_data( &state, req.payout_method_data.as_ref(), payout_attempt.payout_token.as_deref(), &customer_id, &payout_attempt.merchant_id, payout_type, &key_store, Some(&mut payout_data), merchant_account.storage_scheme, ) .await?; } if let Some(true) = payout_data.payouts.confirm { payouts_core( &state, &merchant_account, &key_store, &mut payout_data, req.routing.clone(), req.connector.clone(), ) .await? }; response_handler(&state, &merchant_account, &payout_data).await } <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="274" end="305"> pub async fn payouts_core( state: &SessionState, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, payout_data: &mut PayoutData, routing_algorithm: Option<serde_json::Value>, eligible_connectors: Option<Vec<api_enums::PayoutConnectors>>, ) -> RouterResult<()> { let payout_attempt = &payout_data.payout_attempt; // Form connector data let connector_call_type = get_connector_choice( state, merchant_account, key_store, payout_attempt.connector.clone(), routing_algorithm, payout_data, eligible_connectors, ) .await?; // Call connector steps Box::pin(make_connector_decision( state, merchant_account, key_store, connector_call_type, payout_data, )) .await } <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="169" end="270"> pub async fn make_connector_decision( state: &SessionState, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, connector_call_type: api::ConnectorCallType, payout_data: &mut PayoutData, ) -> RouterResult<()> { match connector_call_type { api::ConnectorCallType::PreDetermined(connector_data) => { Box::pin(call_connector_payout( state, merchant_account, key_store, &connector_data, payout_data, )) .await?; #[cfg(feature = "payout_retry")] { let config_bool = retry::config_should_call_gsm_payout( &*state.store, merchant_account.get_id(), PayoutRetryType::SingleConnector, ) .await; if config_bool && payout_data.should_call_gsm() { Box::pin(retry::do_gsm_single_connector_actions( state, connector_data, payout_data, merchant_account, key_store, )) .await?; } } Ok(()) } api::ConnectorCallType::Retryable(connectors) => { let mut connectors = connectors.into_iter(); let connector_data = get_next_connector(&mut connectors)?; Box::pin(call_connector_payout( state, merchant_account, key_store, &connector_data, payout_data, )) .await?; #[cfg(feature = "payout_retry")] { let config_multiple_connector_bool = retry::config_should_call_gsm_payout( &*state.store, merchant_account.get_id(), PayoutRetryType::MultiConnector, ) .await; if config_multiple_connector_bool && payout_data.should_call_gsm() { Box::pin(retry::do_gsm_multiple_connector_actions( state, connectors, connector_data.clone(), payout_data, merchant_account, key_store, )) .await?; } let config_single_connector_bool = retry::config_should_call_gsm_payout( &*state.store, merchant_account.get_id(), PayoutRetryType::SingleConnector, ) .await; if config_single_connector_bool && payout_data.should_call_gsm() { Box::pin(retry::do_gsm_single_connector_actions( state, connector_data, payout_data, merchant_account, key_store, )) .await?; } } Ok(()) } _ => Err(errors::ApiErrorResponse::InternalServerError).attach_printable({ "only PreDetermined and Retryable ConnectorCallTypes are supported".to_string() })?, } } <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="68" end="81"> pub struct PayoutData { pub billing_address: Option<domain::Address>, pub business_profile: domain::Profile, pub customer_details: Option<domain::Customer>, pub merchant_connector_account: Option<payment_helpers::MerchantConnectorAccountType>, pub payouts: storage::Payouts, pub payout_attempt: storage::PayoutAttempt, pub payout_method_data: Option<payouts::PayoutMethodData>, pub profile_id: common_utils::id_type::ProfileId, pub should_terminate: bool, pub payout_link: Option<PayoutLink>, pub current_locale: String, pub payment_method: Option<PaymentMethod>, } <file_sep path="hyperswitch/crates/router/src/core/errors.rs" role="context" start="31" end="31"> pub type RouterResult<T> = CustomResult<T, ApiErrorResponse>; <file_sep path="hyperswitch/v2_compatible_migrations/2024-08-28-081757_drop_not_null_constraints_on_v1_columns/up.sql" role="context" start="5" end="21"> ALTER COLUMN org_id DROP NOT NULL; -- Create index on org_id in organization table -- This is done to mullify the effects of droping primary key for v1 CREATE INDEX idx_organization_org_id ON organization (org_id); ------------------------ Merchant Account ------------------- -- Drop not null in merchant_account table for v1 columns that are dropped in v2 ALTER TABLE merchant_account DROP CONSTRAINT merchant_account_pkey, ALTER COLUMN merchant_id DROP NOT NULL, ALTER COLUMN primary_business_details DROP NOT NULL, ALTER COLUMN is_recon_enabled DROP NOT NULL; -- This is done to mullify the effects of droping primary key for v1 CREATE INDEX idx_merchant_account_merchant_id ON merchant_account (merchant_id); <file_sep path="hyperswitch/crates/api_models/src/payment_methods.rs" role="context" start="1670" end="1670"> type Value = PaymentMethodListRequest; <file_sep path="hyperswitch/postman/collection-dir/powertranz/Flow Testcases/Happy Cases/Scenario1-Create payment with confirm true/Payments - Create/event.test.js" role="context" start="61" end="78"> "INFO - Unable to assign variable {{client_secret}}, as jsonData.client_secret is undefined.", ); } // Response body should have value "succeeded" for "status" if (jsonData?.status) { pm.test( "[POST]::/payments - Content check if value for 'status' matches 'succeeded'", function () { pm.expect(jsonData.status).to.eql("succeeded"); }, ); }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/payment_link.rs<|crate|> router anchor=capitalize_first_char kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=1<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/payment_link.rs" role="context" start="724" end="735"> fn capitalize_first_char(s: &str) -> String { if let Some(first_char) = s.chars().next() { let capitalized = first_char.to_uppercase(); let mut result = capitalized.to_string(); if let Some(remaining) = s.get(1..) { result.push_str(remaining); } result } else { s.to_owned() } } <file_sep path="hyperswitch/crates/router/src/core/payment_link.rs" role="context" start="745" end="753"> pub async fn get_payment_link_status( _state: SessionState, _merchant_account: domain::MerchantAccount, _key_store: domain::MerchantKeyStore, _merchant_id: common_utils::id_type::MerchantId, _payment_id: common_utils::id_type::PaymentId, ) -> RouterResponse<services::PaymentLinkFormData> { todo!() } <file_sep path="hyperswitch/crates/router/src/core/payment_link.rs" role="context" start="737" end="742"> fn check_payment_link_invalid_conditions( intent_status: storage_enums::IntentStatus, not_allowed_statuses: &[storage_enums::IntentStatus], ) -> bool { not_allowed_statuses.contains(&intent_status) } <file_sep path="hyperswitch/crates/router/src/core/payment_link.rs" role="context" start="603" end="722"> pub fn get_payment_link_config_based_on_priority( payment_create_link_config: Option<api_models::payments::PaymentCreatePaymentLinkConfig>, business_link_config: Option<diesel_models::business_profile::BusinessPaymentLinkConfig>, merchant_name: String, default_domain_name: String, payment_link_config_id: Option<String>, ) -> Result<(PaymentLinkConfig, String), error_stack::Report<errors::ApiErrorResponse>> { let (domain_name, business_theme_configs, allowed_domains, branding_visibility) = if let Some(business_config) = business_link_config { ( business_config .domain_name .clone() .map(|d_name| { logger::info!("domain name set to custom domain https://{:?}", d_name); format!("https://{}", d_name) }) .unwrap_or_else(|| default_domain_name.clone()), payment_link_config_id .and_then(|id| { business_config .business_specific_configs .as_ref() .and_then(|specific_configs| specific_configs.get(&id).cloned()) }) .or(business_config.default_config), business_config.allowed_domains, business_config.branding_visibility, ) } else { (default_domain_name, None, None, None) }; let ( theme, logo, seller_name, sdk_layout, display_sdk_only, enabled_saved_payment_method, hide_card_nickname_field, show_card_form_by_default, enable_button_only_on_form_ready, ) = get_payment_link_config_value!( payment_create_link_config, business_theme_configs, (theme, DEFAULT_BACKGROUND_COLOR.to_string()), (logo, DEFAULT_MERCHANT_LOGO.to_string()), (seller_name, merchant_name.clone()), (sdk_layout, DEFAULT_SDK_LAYOUT.to_owned()), (display_sdk_only, DEFAULT_DISPLAY_SDK_ONLY), ( enabled_saved_payment_method, DEFAULT_ENABLE_SAVED_PAYMENT_METHOD ), (hide_card_nickname_field, DEFAULT_HIDE_CARD_NICKNAME_FIELD), (show_card_form_by_default, DEFAULT_SHOW_CARD_FORM), ( enable_button_only_on_form_ready, DEFAULT_ENABLE_BUTTON_ONLY_ON_FORM_READY ) ); let ( details_layout, background_image, payment_button_text, custom_message_for_card_terms, payment_button_colour, skip_status_screen, background_colour, payment_button_text_colour, sdk_ui_rules, payment_link_ui_rules, ) = get_payment_link_config_value!( payment_create_link_config, business_theme_configs, (details_layout), (background_image, |background_image| background_image .foreign_into()), (payment_button_text), (custom_message_for_card_terms), (payment_button_colour), (skip_status_screen), (background_colour), (payment_button_text_colour), (sdk_ui_rules), (payment_link_ui_rules), ); let payment_link_config = PaymentLinkConfig { theme, logo, seller_name, sdk_layout, display_sdk_only, enabled_saved_payment_method, hide_card_nickname_field, show_card_form_by_default, allowed_domains, branding_visibility, skip_status_screen, transaction_details: payment_create_link_config.as_ref().and_then( |payment_link_config| payment_link_config.theme_config.transaction_details.clone(), ), details_layout, background_image, payment_button_text, custom_message_for_card_terms, payment_button_colour, background_colour, payment_button_text_colour, sdk_ui_rules, payment_link_ui_rules, enable_button_only_on_form_ready, }; Ok((payment_link_config, domain_name)) } <file_sep path="hyperswitch/crates/router/src/core/payment_link.rs" role="context" start="593" end="601"> pub fn extract_payment_link_config( pl_config: serde_json::Value, ) -> Result<PaymentLinkConfig, error_stack::Report<errors::ApiErrorResponse>> { serde_json::from_value::<PaymentLinkConfig>(pl_config).change_context( errors::ApiErrorResponse::InvalidDataValue { field_name: "payment_link_config", }, ) } <file_sep path="hyperswitch/crates/router/src/core/payment_link.rs" role="context" start="78" end="306"> pub async fn form_payment_link_data( state: &SessionState, merchant_account: domain::MerchantAccount, key_store: domain::MerchantKeyStore, merchant_id: common_utils::id_type::MerchantId, payment_id: common_utils::id_type::PaymentId, ) -> RouterResult<(PaymentLink, PaymentLinkData, PaymentLinkConfig)> { let db = &*state.store; let key_manager_state = &state.into(); let payment_intent = db .find_payment_intent_by_payment_id_merchant_id( &(state).into(), &payment_id, &merchant_id, &key_store, merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::PaymentNotFound)?; let payment_link_id = payment_intent .payment_link_id .get_required_value("payment_link_id") .change_context(errors::ApiErrorResponse::PaymentLinkNotFound)?; let merchant_name_from_merchant_account = merchant_account .merchant_name .clone() .map(|merchant_name| merchant_name.into_inner().peek().to_owned()) .unwrap_or_default(); let payment_link = db .find_payment_link_by_payment_link_id(&payment_link_id) .await .to_not_found_response(errors::ApiErrorResponse::PaymentLinkNotFound)?; let payment_link_config = if let Some(pl_config_value) = payment_link.payment_link_config.clone() { extract_payment_link_config(pl_config_value)? } else { PaymentLinkConfig { theme: DEFAULT_BACKGROUND_COLOR.to_string(), logo: DEFAULT_MERCHANT_LOGO.to_string(), seller_name: merchant_name_from_merchant_account, sdk_layout: DEFAULT_SDK_LAYOUT.to_owned(), display_sdk_only: DEFAULT_DISPLAY_SDK_ONLY, enabled_saved_payment_method: DEFAULT_ENABLE_SAVED_PAYMENT_METHOD, hide_card_nickname_field: DEFAULT_HIDE_CARD_NICKNAME_FIELD, show_card_form_by_default: DEFAULT_SHOW_CARD_FORM, allowed_domains: DEFAULT_ALLOWED_DOMAINS, transaction_details: None, background_image: None, details_layout: None, branding_visibility: None, payment_button_text: None, custom_message_for_card_terms: None, payment_button_colour: None, skip_status_screen: None, background_colour: None, payment_button_text_colour: None, sdk_ui_rules: None, payment_link_ui_rules: None, enable_button_only_on_form_ready: DEFAULT_ENABLE_BUTTON_ONLY_ON_FORM_READY, } }; let profile_id = payment_link .profile_id .clone() .or(payment_intent.profile_id) .ok_or(errors::ApiErrorResponse::InternalServerError) .attach_printable("Profile id missing in payment link and payment intent")?; let business_profile = db .find_business_profile_by_profile_id(key_manager_state, &key_store, &profile_id) .await .to_not_found_response(errors::ApiErrorResponse::ProfileNotFound { id: profile_id.get_string_repr().to_owned(), })?; let return_url = if let Some(payment_create_return_url) = payment_intent.return_url.clone() { payment_create_return_url } else { business_profile .return_url .ok_or(errors::ApiErrorResponse::MissingRequiredField { field_name: "return_url", })? }; let (currency, client_secret) = validate_sdk_requirements( payment_intent.currency, payment_intent.client_secret.clone(), )?; let required_conversion_type = StringMajorUnitForCore; let amount = required_conversion_type .convert(payment_intent.amount, currency) .change_context(errors::ApiErrorResponse::AmountConversionFailed { amount_type: "StringMajorUnit", })?; let order_details = validate_order_details(payment_intent.order_details.clone(), currency)?; let session_expiry = payment_link.fulfilment_time.unwrap_or_else(|| { payment_intent .created_at .saturating_add(time::Duration::seconds(DEFAULT_SESSION_EXPIRY)) }); // converting first letter of merchant name to upperCase let merchant_name = capitalize_first_char(&payment_link_config.seller_name); let payment_link_status = check_payment_link_status(session_expiry); let is_payment_link_terminal_state = check_payment_link_invalid_conditions( payment_intent.status, &[ storage_enums::IntentStatus::Cancelled, storage_enums::IntentStatus::Failed, storage_enums::IntentStatus::Processing, storage_enums::IntentStatus::RequiresCapture, storage_enums::IntentStatus::RequiresMerchantAction, storage_enums::IntentStatus::Succeeded, storage_enums::IntentStatus::PartiallyCaptured, storage_enums::IntentStatus::RequiresCustomerAction, ], ); if is_payment_link_terminal_state || payment_link_status == api_models::payments::PaymentLinkStatus::Expired { let status = match payment_link_status { api_models::payments::PaymentLinkStatus::Active => { logger::info!("displaying status page as the requested payment link has reached terminal state with payment status as {:?}", payment_intent.status); PaymentLinkStatusWrap::IntentStatus(payment_intent.status) } api_models::payments::PaymentLinkStatus::Expired => { if is_payment_link_terminal_state { logger::info!("displaying status page as the requested payment link has reached terminal state with payment status as {:?}", payment_intent.status); PaymentLinkStatusWrap::IntentStatus(payment_intent.status) } else { logger::info!( "displaying status page as the requested payment link has expired" ); PaymentLinkStatusWrap::PaymentLinkStatus( api_models::payments::PaymentLinkStatus::Expired, ) } } }; let attempt_id = payment_intent.active_attempt.get_id().clone(); let payment_attempt = db .find_payment_attempt_by_payment_id_merchant_id_attempt_id( &payment_intent.payment_id, &merchant_id, &attempt_id.clone(), merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::PaymentNotFound)?; let payment_details = api_models::payments::PaymentLinkStatusDetails { amount, currency, payment_id: payment_intent.payment_id, merchant_name, merchant_logo: payment_link_config.logo.clone(), created: payment_link.created_at, status, error_code: payment_attempt.error_code, error_message: payment_attempt.error_message, redirect: false, theme: payment_link_config.theme.clone(), return_url: return_url.clone(), locale: Some(state.clone().locale), transaction_details: payment_link_config.transaction_details.clone(), unified_code: payment_attempt.unified_code, unified_message: payment_attempt.unified_message, }; return Ok(( payment_link, PaymentLinkData::PaymentLinkStatusDetails(Box::new(payment_details)), payment_link_config, )); }; let payment_link_details = api_models::payments::PaymentLinkDetails { amount, currency, payment_id: payment_intent.payment_id, merchant_name, order_details, return_url, session_expiry, pub_key: merchant_account.publishable_key, client_secret, merchant_logo: payment_link_config.logo.clone(), max_items_visible_after_collapse: 3, theme: payment_link_config.theme.clone(), merchant_description: payment_intent.description, sdk_layout: payment_link_config.sdk_layout.clone(), display_sdk_only: payment_link_config.display_sdk_only, hide_card_nickname_field: payment_link_config.hide_card_nickname_field, show_card_form_by_default: payment_link_config.show_card_form_by_default, locale: Some(state.clone().locale), transaction_details: payment_link_config.transaction_details.clone(), background_image: payment_link_config.background_image.clone(), details_layout: payment_link_config.details_layout, branding_visibility: payment_link_config.branding_visibility, payment_button_text: payment_link_config.payment_button_text.clone(), custom_message_for_card_terms: payment_link_config.custom_message_for_card_terms.clone(), payment_button_colour: payment_link_config.payment_button_colour.clone(), skip_status_screen: payment_link_config.skip_status_screen, background_colour: payment_link_config.background_colour.clone(), payment_button_text_colour: payment_link_config.payment_button_text_colour.clone(), sdk_ui_rules: payment_link_config.sdk_ui_rules.clone(), payment_link_ui_rules: payment_link_config.payment_link_ui_rules.clone(), status: payment_intent.status, enable_button_only_on_form_ready: payment_link_config.enable_button_only_on_form_ready, }; Ok(( payment_link, PaymentLinkData::PaymentLinkDetails(Box::new(payment_link_details)), payment_link_config, )) } <file_sep path="hyperswitch/crates/router/src/core/payment_link.rs" role="context" start="537" end="591"> fn validate_order_details( order_details: Option<Vec<Secret<serde_json::Value>>>, currency: api_models::enums::Currency, ) -> Result< Option<Vec<api_models::payments::OrderDetailsWithStringAmount>>, error_stack::Report<errors::ApiErrorResponse>, > { let required_conversion_type = StringMajorUnitForCore; let order_details = order_details .map(|order_details| { order_details .iter() .map(|data| { data.to_owned() .parse_value("OrderDetailsWithAmount") .change_context(errors::ApiErrorResponse::InvalidDataValue { field_name: "OrderDetailsWithAmount", }) .attach_printable("Unable to parse OrderDetailsWithAmount") }) .collect::<Result<Vec<api_models::payments::OrderDetailsWithAmount>, _>>() }) .transpose()?; let updated_order_details = match order_details { Some(mut order_details) => { let mut order_details_amount_string_array: Vec< api_models::payments::OrderDetailsWithStringAmount, > = Vec::new(); for order in order_details.iter_mut() { let mut order_details_amount_string : api_models::payments::OrderDetailsWithStringAmount = Default::default(); if order.product_img_link.is_none() { order_details_amount_string.product_img_link = Some(DEFAULT_PRODUCT_IMG.to_string()) } else { order_details_amount_string .product_img_link .clone_from(&order.product_img_link) }; order_details_amount_string.amount = required_conversion_type .convert(order.amount, currency) .change_context(errors::ApiErrorResponse::AmountConversionFailed { amount_type: "StringMajorUnit", })?; order_details_amount_string.product_name = capitalize_first_char(&order.product_name.clone()); order_details_amount_string.quantity = order.quantity; order_details_amount_string_array.push(order_details_amount_string) } Some(order_details_amount_string_array) } None => None, }; Ok(updated_order_details) }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/payment_methods/cards.rs<|crate|> router anchor=get_or_insert_payment_method kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="366" end="375"> pub async fn get_or_insert_payment_method( _state: &routes::SessionState, _req: api::PaymentMethodCreate, _resp: &mut api::PaymentMethodResponse, _merchant_account: &domain::MerchantAccount, _customer_id: &id_type::CustomerId, _key_store: &domain::MerchantKeyStore, ) -> errors::RouterResult<domain::PaymentMethod> { todo!() } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="365" end="365"> .await } else { Err(err) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error while finding payment method") } } } } #[cfg(all(feature = "v2", feature = "payment_methods_v2"))] #[instrument(skip_all)] pub async fn get_or_insert_payment_method( _state: &routes::SessionState, _req: api::PaymentMethodCreate, _resp: &mut api::PaymentMethodResponse, _merchant_account: &domain::MerchantAccount, _customer_id: &id_type::CustomerId, _key_store: &domain::MerchantKeyStore, ) -> errors::RouterResult<domain::PaymentMethod> { todo!() } #[cfg(all( any(feature = "v1", feature = "v2"), <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="505" end="513"> pub async fn migrate_payment_method( _state: routes::SessionState, _req: api::PaymentMethodMigrate, _merchant_id: &id_type::MerchantId, _merchant_account: &domain::MerchantAccount, _key_store: &domain::MerchantKeyStore, ) -> errors::RouterResponse<api::PaymentMethodMigrateResponse> { todo!() } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="381" end="502"> pub async fn migrate_payment_method( state: routes::SessionState, req: api::PaymentMethodMigrate, merchant_id: &id_type::MerchantId, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, ) -> errors::RouterResponse<api::PaymentMethodMigrateResponse> { let mut req = req; let card_details = &req.card.get_required_value("card")?; let card_number_validation_result = cards::CardNumber::from_str(card_details.card_number.peek()); let card_bin_details = populate_bin_details_for_masked_card(card_details, &*state.store).await?; req.card = Some(api_models::payment_methods::MigrateCardDetail { card_issuing_country: card_bin_details.issuer_country.clone(), card_network: card_bin_details.card_network.clone(), card_issuer: card_bin_details.card_issuer.clone(), card_type: card_bin_details.card_type.clone(), ..card_details.clone() }); if let Some(connector_mandate_details) = &req.connector_mandate_details { helpers::validate_merchant_connector_ids_in_connector_mandate_details( &state, key_store, connector_mandate_details, merchant_id, card_bin_details.card_network.clone(), ) .await?; }; let should_require_connector_mandate_details = req.network_token.is_none(); let mut migration_status = migration::RecordMigrationStatusBuilder::new(); let resp = match card_number_validation_result { Ok(card_number) => { let payment_method_create_request = api::PaymentMethodCreate::get_payment_method_create_from_payment_method_migrate( card_number, &req, ); logger::debug!("Storing the card in locker and migrating the payment method"); get_client_secret_or_add_payment_method_for_migration( &state, payment_method_create_request, merchant_account, key_store, &mut migration_status, ) .await? } Err(card_validation_error) => { logger::debug!("Card number to be migrated is invalid, skip saving in locker {card_validation_error}"); skip_locker_call_and_migrate_payment_method( &state, &req, merchant_id.to_owned(), key_store, merchant_account, card_bin_details.clone(), should_require_connector_mandate_details, &mut migration_status, ) .await? } }; let payment_method_response = match resp { services::ApplicationResponse::Json(response) => response, _ => Err(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to fetch the payment method response")?, }; let pm_id = payment_method_response.payment_method_id.clone(); let network_token = req.network_token.clone(); let network_token_migrated = match network_token { Some(nt_detail) => { logger::debug!("Network token migration"); let network_token_requestor_ref_id = nt_detail.network_token_requestor_ref_id.clone(); let network_token_data = &nt_detail.network_token_data; Some( save_network_token_and_update_payment_method( &state, &req, key_store, merchant_account, network_token_data, network_token_requestor_ref_id, pm_id, ) .await .map_err(|err| logger::error!(?err, "Failed to save network token")) .ok() .unwrap_or_default(), ) } None => { logger::debug!("Network token data is not available"); None } }; migration_status.network_token_migrated(network_token_migrated); let migrate_status = migration_status.build(); Ok(services::ApplicationResponse::Json( api::PaymentMethodMigrateResponse { payment_method_response, card_migrated: migrate_status.card_migrated, network_token_migrated: migrate_status.network_token_migrated, connector_mandate_details_migrated: migrate_status.connector_mandate_details_migrated, network_transaction_id_migrated: migrate_status.network_transaction_migrated, }, )) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="284" end="362"> pub async fn get_or_insert_payment_method( state: &routes::SessionState, req: api::PaymentMethodCreate, resp: &mut api::PaymentMethodResponse, merchant_account: &domain::MerchantAccount, customer_id: &id_type::CustomerId, key_store: &domain::MerchantKeyStore, ) -> errors::RouterResult<domain::PaymentMethod> { let mut payment_method_id = resp.payment_method_id.clone(); let mut locker_id = None; let db = &*state.store; let key_manager_state = &(state.into()); let payment_method = { let existing_pm_by_pmid = db .find_payment_method( key_manager_state, key_store, &payment_method_id, merchant_account.storage_scheme, ) .await; if let Err(err) = existing_pm_by_pmid { if err.current_context().is_db_not_found() { locker_id = Some(payment_method_id.clone()); let existing_pm_by_locker_id = db .find_payment_method_by_locker_id( key_manager_state, key_store, &payment_method_id, merchant_account.storage_scheme, ) .await; match &existing_pm_by_locker_id { Ok(pm) => payment_method_id.clone_from(pm.get_id()), Err(_) => payment_method_id = generate_id(consts::ID_LENGTH, "pm"), }; existing_pm_by_locker_id } else { Err(err) } } else { existing_pm_by_pmid } }; payment_method_id.clone_into(&mut resp.payment_method_id); match payment_method { Ok(pm) => Ok(pm), Err(err) => { if err.current_context().is_db_not_found() { insert_payment_method( state, resp, &req, key_store, merchant_account.get_id(), customer_id, resp.metadata.clone().map(|val| val.expose()), None, locker_id, None, req.network_transaction_id.clone(), merchant_account.storage_scheme, None, None, None, None, ) .await } else { Err(err) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error while finding payment method") } } } } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="269" end="278"> pub fn store_default_payment_method( _req: &api::PaymentMethodCreate, _customer_id: &id_type::CustomerId, _merchant_id: &id_type::MerchantId, ) -> ( api::PaymentMethodResponse, Option<payment_methods::DataDuplicationCheck>, ) { todo!() } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="1248" end="1447"> pub async fn add_payment_method_data( state: routes::SessionState, req: api::PaymentMethodCreate, merchant_account: domain::MerchantAccount, key_store: domain::MerchantKeyStore, pm_id: String, ) -> errors::RouterResponse<api::PaymentMethodResponse> { let db = &*state.store; let pmd = req .payment_method_data .clone() .get_required_value("payment_method_data")?; req.payment_method.get_required_value("payment_method")?; let client_secret = req .client_secret .clone() .get_required_value("client_secret")?; let payment_method = db .find_payment_method( &((&state).into()), &key_store, pm_id.as_str(), merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::PaymentMethodNotFound) .attach_printable("Unable to find payment method")?; if payment_method.status != enums::PaymentMethodStatus::AwaitingData { return Err((errors::ApiErrorResponse::ClientSecretExpired).into()); } let customer_id = payment_method.customer_id.clone(); let customer = db .find_customer_by_customer_id_merchant_id( &(&state).into(), &customer_id, merchant_account.get_id(), &key_store, merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::CustomerNotFound)?; let client_secret_expired = authenticate_pm_client_secret_and_check_expiry(&client_secret, &payment_method)?; if client_secret_expired { return Err((errors::ApiErrorResponse::ClientSecretExpired).into()); }; let key_manager_state = (&state).into(); match pmd { api_models::payment_methods::PaymentMethodCreateData::Card(card) => { helpers::validate_card_expiry(&card.card_exp_month, &card.card_exp_year)?; let resp = Box::pin(add_card_to_locker( &state, req.clone(), &card, &customer_id, &merchant_account, None, )) .await .change_context(errors::ApiErrorResponse::InternalServerError); match resp { Ok((mut pm_resp, duplication_check)) => { if duplication_check.is_some() { let pm_update = storage::PaymentMethodUpdate::StatusUpdate { status: Some(enums::PaymentMethodStatus::Inactive), }; db.update_payment_method( &((&state).into()), &key_store, payment_method, pm_update, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to add payment method in db")?; get_or_insert_payment_method( &state, req.clone(), &mut pm_resp, &merchant_account, &customer_id, &key_store, ) .await?; return Ok(services::ApplicationResponse::Json(pm_resp)); } else { let locker_id = pm_resp.payment_method_id.clone(); pm_resp.payment_method_id.clone_from(&pm_id); pm_resp.client_secret = Some(client_secret.clone()); let card_isin = card.card_number.get_card_isin(); let card_info = db .get_card_info(card_isin.as_str()) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to get card info")?; let updated_card = CardDetailsPaymentMethod { issuer_country: card_info .as_ref() .and_then(|ci| ci.card_issuing_country.clone()), last4_digits: Some(card.card_number.get_last4()), expiry_month: Some(card.card_exp_month), expiry_year: Some(card.card_exp_year), nick_name: card.nick_name, card_holder_name: card.card_holder_name, card_network: card_info.as_ref().and_then(|ci| ci.card_network.clone()), card_isin: Some(card_isin), card_issuer: card_info.as_ref().and_then(|ci| ci.card_issuer.clone()), card_type: card_info.as_ref().and_then(|ci| ci.card_type.clone()), saved_to_locker: true, }; let pm_data_encrypted: Encryptable<Secret<serde_json::Value>> = create_encrypted_data( &key_manager_state, &key_store, PaymentMethodsData::Card(updated_card), ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to encrypt payment method data")?; let pm_update = storage::PaymentMethodUpdate::AdditionalDataUpdate { payment_method_data: Some(pm_data_encrypted.into()), status: Some(enums::PaymentMethodStatus::Active), locker_id: Some(locker_id), network_token_requestor_reference_id: None, payment_method: req.payment_method, payment_method_issuer: req.payment_method_issuer, payment_method_type: req.payment_method_type, network_token_locker_id: None, network_token_payment_method_data: None, }; db.update_payment_method( &((&state).into()), &key_store, payment_method, pm_update, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to add payment method in db")?; if customer.default_payment_method_id.is_none() { let _ = set_default_payment_method( &state, merchant_account.get_id(), key_store.clone(), &customer_id, pm_id, merchant_account.storage_scheme, ) .await .map_err(|error| { logger::error!( ?error, "Failed to set the payment method as default" ) }); } return Ok(services::ApplicationResponse::Json(pm_resp)); } } Err(e) => { let pm_update = storage::PaymentMethodUpdate::StatusUpdate { status: Some(enums::PaymentMethodStatus::Inactive), }; db.update_payment_method( &((&state).into()), &key_store, payment_method, pm_update, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to update payment method in db")?; return Err(e.attach_printable("Failed to add card to locker")); } } } } } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="1712" end="1981"> pub async fn save_migration_payment_method( state: &routes::SessionState, req: api::PaymentMethodCreate, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, migration_status: &mut migration::RecordMigrationStatusBuilder, ) -> errors::RouterResponse<api::PaymentMethodResponse> { req.validate()?; let db = &*state.store; let merchant_id = merchant_account.get_id(); let customer_id = req.customer_id.clone().get_required_value("customer_id")?; let payment_method = req.payment_method.get_required_value("payment_method")?; let key_manager_state = state.into(); let payment_method_billing_address: Option<Encryptable<Secret<serde_json::Value>>> = req .billing .clone() .async_map(|billing| create_encrypted_data(&key_manager_state, key_store, billing)) .await .transpose() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to encrypt Payment method billing address")?; let connector_mandate_details = req .connector_mandate_details .clone() .map(serde_json::to_value) .transpose() .change_context(errors::ApiErrorResponse::InternalServerError)?; let network_transaction_id = req.network_transaction_id.clone(); let response = match payment_method { #[cfg(feature = "payouts")] api_enums::PaymentMethod::BankTransfer => match req.bank_transfer.clone() { Some(bank) => add_bank_to_locker( state, req.clone(), merchant_account, key_store, &bank, &customer_id, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Add PaymentMethod Failed"), _ => Ok(store_default_payment_method( &req, &customer_id, merchant_id, )), }, api_enums::PaymentMethod::Card => match req.card.clone() { Some(card) => { let mut card_details = card; card_details = helpers::populate_bin_details_for_payment_method_create( card_details.clone(), db, ) .await; migration::validate_card_expiry( &card_details.card_exp_month, &card_details.card_exp_year, )?; Box::pin(add_card_to_locker( state, req.clone(), &card_details, &customer_id, merchant_account, None, )) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Add Card Failed") } _ => Ok(store_default_payment_method( &req, &customer_id, merchant_id, )), }, _ => Ok(store_default_payment_method( &req, &customer_id, merchant_id, )), }; let (mut resp, duplication_check) = response?; migration_status.card_migrated(true); match duplication_check { Some(duplication_check) => match duplication_check { payment_methods::DataDuplicationCheck::Duplicated => { let existing_pm = get_or_insert_payment_method( state, req.clone(), &mut resp, merchant_account, &customer_id, key_store, ) .await?; resp.client_secret = existing_pm.client_secret; } payment_methods::DataDuplicationCheck::MetaDataChanged => { if let Some(card) = req.card.clone() { let existing_pm = get_or_insert_payment_method( state, req.clone(), &mut resp, merchant_account, &customer_id, key_store, ) .await?; let client_secret = existing_pm.client_secret.clone(); delete_card_from_locker( state, &customer_id, merchant_id, existing_pm .locker_id .as_ref() .unwrap_or(&existing_pm.payment_method_id), ) .await?; let add_card_resp = add_card_hs( state, req.clone(), &card, &customer_id, merchant_account, api::enums::LockerChoice::HyperswitchCardVault, Some( existing_pm .locker_id .as_ref() .unwrap_or(&existing_pm.payment_method_id), ), ) .await; if let Err(err) = add_card_resp { logger::error!(vault_err=?err); db.delete_payment_method_by_merchant_id_payment_method_id( &(state.into()), key_store, merchant_id, &resp.payment_method_id, ) .await .to_not_found_response(errors::ApiErrorResponse::PaymentMethodNotFound)?; Err(report!(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed while updating card metadata changes"))? }; let existing_pm_data = get_card_details_without_locker_fallback(&existing_pm, state).await?; let updated_card = Some(api::CardDetailFromLocker { scheme: existing_pm.scheme.clone(), last4_digits: Some(card.card_number.get_last4()), issuer_country: card .card_issuing_country .or(existing_pm_data.issuer_country), card_isin: Some(card.card_number.get_card_isin()), card_number: Some(card.card_number), expiry_month: Some(card.card_exp_month), expiry_year: Some(card.card_exp_year), card_token: None, card_fingerprint: None, card_holder_name: card .card_holder_name .or(existing_pm_data.card_holder_name), nick_name: card.nick_name.or(existing_pm_data.nick_name), card_network: card.card_network.or(existing_pm_data.card_network), card_issuer: card.card_issuer.or(existing_pm_data.card_issuer), card_type: card.card_type.or(existing_pm_data.card_type), saved_to_locker: true, }); let updated_pmd = updated_card.as_ref().map(|card| { PaymentMethodsData::Card(CardDetailsPaymentMethod::from(card.clone())) }); let pm_data_encrypted: Option<Encryptable<Secret<serde_json::Value>>> = updated_pmd .async_map(|updated_pmd| { create_encrypted_data(&key_manager_state, key_store, updated_pmd) }) .await .transpose() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to encrypt payment method data")?; let pm_update = storage::PaymentMethodUpdate::PaymentMethodDataUpdate { payment_method_data: pm_data_encrypted.map(Into::into), }; db.update_payment_method( &(state.into()), key_store, existing_pm, pm_update, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to add payment method in db")?; resp.client_secret = client_secret; } } }, None => { let pm_metadata = resp.metadata.as_ref().map(|data| data.peek()); let locker_id = if resp.payment_method == Some(api_enums::PaymentMethod::Card) || resp.payment_method == Some(api_enums::PaymentMethod::BankTransfer) { Some(resp.payment_method_id) } else { None }; resp.payment_method_id = generate_id(consts::ID_LENGTH, "pm"); let pm = insert_payment_method( state, &resp, &req, key_store, merchant_id, &customer_id, pm_metadata.cloned(), None, locker_id, connector_mandate_details.clone(), network_transaction_id.clone(), merchant_account.storage_scheme, payment_method_billing_address, None, None, None, ) .await?; resp.client_secret = pm.client_secret; } } migration_status.card_migrated(true); migration_status.network_transaction_id_migrated( network_transaction_id.and_then(|val| (!val.is_empty_after_trim()).then_some(true)), ); migration_status.connector_mandate_details_migrated( connector_mandate_details .and_then(|val| if val == json!({}) { None } else { Some(true) }) .or_else(|| { req.connector_mandate_details .and_then(|val| (!val.0.is_empty()).then_some(false)) }), ); Ok(services::ApplicationResponse::Json(resp)) } <file_sep path="hyperswitch/v2_compatible_migrations/2024-08-28-081721_add_v2_columns/up.sql" role="context" start="54" end="70"> ADD COLUMN redirection_data JSONB, ADD COLUMN connector_payment_data TEXT, ADD COLUMN connector_token_details JSONB; -- Change the type of the column from JSON to JSONB ALTER TABLE merchant_connector_account ADD COLUMN IF NOT EXISTS feature_metadata JSONB; ALTER TABLE payment_methods ADD COLUMN IF NOT EXISTS locker_fingerprint_id VARCHAR(64), ADD COLUMN IF NOT EXISTS payment_method_type_v2 VARCHAR(64), ADD COLUMN IF NOT EXISTS payment_method_subtype VARCHAR(64); ALTER TABLE refund ADD COLUMN IF NOT EXISTS id VARCHAR(64), ADD COLUMN IF NOT EXISTS merchant_reference_id VARCHAR(64), ADD COLUMN IF NOT EXISTS connector_id VARCHAR(64); <file_sep path="hyperswitch/crates/api_models/src/payment_methods.rs" role="context" start="36" end="108"> pub struct PaymentMethodCreate { /// The type of payment method use for the payment. #[schema(value_type = PaymentMethod,example = "card")] pub payment_method: Option<api_enums::PaymentMethod>, /// This is a sub-category of payment method. #[schema(value_type = Option<PaymentMethodType>,example = "credit")] pub payment_method_type: Option<api_enums::PaymentMethodType>, /// The name of the bank/ provider issuing the payment method to the end user #[schema(example = "Citibank")] pub payment_method_issuer: Option<String>, /// A standard code representing the issuer of payment method #[schema(value_type = Option<PaymentMethodIssuerCode>,example = "jp_applepay")] pub payment_method_issuer_code: Option<api_enums::PaymentMethodIssuerCode>, /// Card Details #[schema(example = json!({ "card_number": "4111111145551142", "card_exp_month": "10", "card_exp_year": "25", "card_holder_name": "John Doe"}))] pub card: Option<CardDetail>, /// You can specify up to 50 keys, with key names up to 40 characters long and values up to 500 characters long. Metadata is useful for storing additional, structured information on an object. #[schema(value_type = Option<Object>,example = json!({ "city": "NY", "unit": "245" }))] pub metadata: Option<pii::SecretSerdeValue>, /// The unique identifier of the customer. #[schema(value_type = Option<String>, max_length = 64, min_length = 1, example = "cus_y3oqhf46pyzuxjbcn2giaqnb44")] pub customer_id: Option<id_type::CustomerId>, /// The card network #[schema(example = "Visa")] pub card_network: Option<String>, /// Payment method details from locker #[cfg(feature = "payouts")] #[schema(value_type = Option<Bank>)] pub bank_transfer: Option<payouts::Bank>, /// Payment method details from locker #[cfg(feature = "payouts")] #[schema(value_type = Option<Wallet>)] pub wallet: Option<payouts::Wallet>, /// For Client based calls, SDK will use the client_secret /// in order to call /payment_methods /// Client secret will be generated whenever a new /// payment method is created pub client_secret: Option<String>, /// Payment method data to be passed in case of client /// based flow pub payment_method_data: Option<PaymentMethodCreateData>, /// The billing details of the payment method #[schema(value_type = Option<Address>)] pub billing: Option<payments::Address>, #[serde(skip_deserializing)] /// The connector mandate details of the payment method, this is added only for cards migration /// api and is skipped during deserialization of the payment method create request as this /// it should not be passed in the request pub connector_mandate_details: Option<PaymentsMandateReference>, #[serde(skip_deserializing)] /// The transaction id of a CIT (customer initiated transaction) associated with the payment method, /// this is added only for cards migration api and is skipped during deserialization of the /// payment method create request as it should not be passed in the request pub network_transaction_id: Option<String>, }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/cards_info.rs<|crate|> router anchor=add_card_info kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/cards_info.rs" role="context" start="199" end="207"> async fn add_card_info(&self) -> RouterResult<card_info_models::CardInfo> { let db = self.state.store.as_ref(); let card_info = CardsInfoInterface::add_card_info(db, self.record.clone().foreign_into()) .await .to_duplicate_response(errors::ApiErrorResponse::GenericDuplicateError { message: "CardInfo with given key already exists in our records".to_string(), })?; Ok(card_info) } <file_sep path="hyperswitch/crates/router/src/core/cards_info.rs" role="context" start="198" end="198"> use diesel_models::cards_info as card_info_models; use rdkafka::message::ToBytes; use crate::{ core::{ errors::{self, RouterResponse, RouterResult, StorageErrorExt}, payments::helpers, }, db::cards_info::CardsInfoInterface, routes, services::ApplicationResponse, types::{ domain, transformers::{ForeignFrom, ForeignInto}, }, }; <file_sep path="hyperswitch/crates/router/src/core/cards_info.rs" role="context" start="243" end="248"> fn new() -> Self { Self { state: std::marker::PhantomData, card_info: None, } } <file_sep path="hyperswitch/crates/router/src/core/cards_info.rs" role="context" start="209" end="233"> async fn update_card_info(&self) -> RouterResult<card_info_models::CardInfo> { let db = self.state.store.as_ref(); let card_info = CardsInfoInterface::update_card_info( db, self.record.card_iin.clone(), card_info_models::UpdateCardInfo { card_issuer: self.record.card_issuer.clone(), card_network: self.record.card_network.clone(), card_type: self.record.card_type.clone(), card_subtype: self.record.card_subtype.clone(), card_issuing_country: self.record.card_issuing_country.clone(), bank_code_id: self.record.bank_code_id.clone(), bank_code: self.record.bank_code.clone(), country_code: self.record.country_code.clone(), last_updated: Some(common_utils::date_time::now()), last_updated_provider: self.record.last_updated_provider.clone(), }, ) .await .to_not_found_response(errors::ApiErrorResponse::GenericNotFoundError { message: "Card info with given key does not exist in our records".to_string(), }) .attach_printable("Failed while updating card info")?; Ok(card_info) } <file_sep path="hyperswitch/crates/router/src/core/cards_info.rs" role="context" start="190" end="197"> async fn fetch_card_info(&self) -> RouterResult<Option<card_info_models::CardInfo>> { let db = self.state.store.as_ref(); let maybe_card_info = db .get_card_info(&self.record.card_iin) .await .change_context(errors::ApiErrorResponse::InvalidCardIin)?; Ok(maybe_card_info) } <file_sep path="hyperswitch/crates/router/src/core/cards_info.rs" role="context" start="183" end="188"> fn new( state: &'a routes::SessionState, record: &'a cards_info_api_types::CardInfoUpdateRequest, ) -> Self { Self { state, record } } <file_sep path="hyperswitch/crates/router/src/core/cards_info.rs" role="context" start="62" end="73"> pub async fn create_card_info( state: routes::SessionState, card_info_request: cards_info_api_types::CardInfoCreateRequest, ) -> RouterResponse<cards_info_api_types::CardInfoResponse> { let db = state.store.as_ref(); CardsInfoInterface::add_card_info(db, card_info_request.foreign_into()) .await .to_duplicate_response(errors::ApiErrorResponse::GenericDuplicateError { message: "CardInfo with given key already exists in our records".to_string(), }) .map(|card_info| ApplicationResponse::Json(card_info.foreign_into())) } <file_sep path="hyperswitch/crates/router/src/core/errors.rs" role="context" start="31" end="31"> pub type RouterResult<T> = CustomResult<T, ApiErrorResponse>; <file_sep path="hyperswitch/crates/api_models/src/errors/types.rs" role="context" start="86" end="100"> pub enum ApiErrorResponse { Unauthorized(ApiError), ForbiddenCommonResource(ApiError), ForbiddenPrivateResource(ApiError), Conflict(ApiError), Gone(ApiError), Unprocessable(ApiError), InternalServerError(ApiError), NotImplemented(ApiError), ConnectorError(ApiError, #[serde(skip_serializing)] StatusCode), NotFound(ApiError), MethodNotAllowed(ApiError), BadRequest(ApiError), DomainError(ApiError), }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/routing.rs<|crate|> router anchor=fetch_routing_algo kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/routing.rs" role="context" start="123" end="133"> pub async fn fetch_routing_algo( merchant_id: &common_utils::id_type::MerchantId, algorithm_id: &common_utils::id_type::RoutingId, db: &dyn StorageInterface, ) -> RouterResult<Self> { let routing_algo = db .find_routing_algorithm_by_algorithm_id_merchant_id(algorithm_id, merchant_id) .await .change_context(errors::ApiErrorResponse::ResourceIdNotFound)?; Ok(Self(routing_algo)) } <file_sep path="hyperswitch/crates/router/src/core/routing.rs" role="context" start="122" end="122"> use common_utils::ext_traits::AsyncExt; use super::{ errors::RouterResult, payments::{ routing::{self as payments_routing}, OperationSessionGetters, }, }; use crate::{ core::{ errors::{self, CustomResult, RouterResponse, StorageErrorExt}, metrics, utils as core_utils, }, db::StorageInterface, routes::SessionState, services::api as service_api, types::{ api, domain, storage::{self, enums as storage_enums}, transformers::{ForeignInto, ForeignTryFrom}, }, utils::{self, OptionExt}, }; <file_sep path="hyperswitch/crates/router/src/core/routing.rs" role="context" start="170" end="242"> pub async fn create_routing_algorithm_under_profile( state: SessionState, merchant_account: domain::MerchantAccount, key_store: domain::MerchantKeyStore, authentication_profile_id: Option<common_utils::id_type::ProfileId>, request: routing_types::RoutingConfigRequest, transaction_type: enums::TransactionType, ) -> RouterResponse<routing_types::RoutingDictionaryRecord> { metrics::ROUTING_CREATE_REQUEST_RECEIVED.add(1, &[]); let db = &*state.store; let key_manager_state = &(&state).into(); let business_profile = core_utils::validate_and_get_business_profile( db, key_manager_state, &key_store, Some(&request.profile_id), merchant_account.get_id(), ) .await? .get_required_value("Profile")?; let merchant_id = merchant_account.get_id(); core_utils::validate_profile_id_from_auth_layer(authentication_profile_id, &business_profile)?; let all_mcas = state .store .find_merchant_connector_account_by_merchant_id_and_disabled_list( key_manager_state, merchant_id, true, &key_store, ) .await .change_context(errors::ApiErrorResponse::MerchantConnectorAccountNotFound { id: merchant_id.get_string_repr().to_owned(), })?; let name_mca_id_set = helpers::ConnectNameAndMCAIdForProfile( all_mcas.filter_by_profile(business_profile.get_id(), |mca| { (&mca.connector_name, mca.get_id()) }), ); let name_set = helpers::ConnectNameForProfile( all_mcas.filter_by_profile(business_profile.get_id(), |mca| &mca.connector_name), ); let algorithm_helper = helpers::RoutingAlgorithmHelpers { name_mca_id_set, name_set, routing_algorithm: &request.algorithm, }; algorithm_helper.validate_connectors_in_routing_config()?; let algo = RoutingAlgorithmUpdate::create_new_routing_algorithm( &request, merchant_account.get_id(), business_profile.get_id().to_owned(), transaction_type, ); let record = state .store .as_ref() .insert_routing_algorithm(algo.0) .await .to_not_found_response(errors::ApiErrorResponse::ResourceIdNotFound)?; let new_record = record.foreign_into(); metrics::ROUTING_CREATE_SUCCESS_RESPONSE.add(1, &[]); Ok(service_api::ApplicationResponse::Json(new_record)) } <file_sep path="hyperswitch/crates/router/src/core/routing.rs" role="context" start="136" end="167"> pub async fn retrieve_merchant_routing_dictionary( state: SessionState, merchant_account: domain::MerchantAccount, profile_id_list: Option<Vec<common_utils::id_type::ProfileId>>, query_params: RoutingRetrieveQuery, transaction_type: &enums::TransactionType, ) -> RouterResponse<routing_types::RoutingKind> { metrics::ROUTING_MERCHANT_DICTIONARY_RETRIEVE.add(1, &[]); let routing_metadata: Vec<diesel_models::routing_algorithm::RoutingProfileMetadata> = state .store .list_routing_algorithm_metadata_by_merchant_id_transaction_type( merchant_account.get_id(), transaction_type, i64::from(query_params.limit.unwrap_or_default()), i64::from(query_params.offset.unwrap_or_default()), ) .await .to_not_found_response(errors::ApiErrorResponse::ResourceIdNotFound)?; let routing_metadata = super::utils::filter_objects_based_on_profile_id_list(profile_id_list, routing_metadata); let result = routing_metadata .into_iter() .map(ForeignInto::foreign_into) .collect::<Vec<_>>(); metrics::ROUTING_MERCHANT_DICTIONARY_RETRIEVE_SUCCESS_RESPONSE.add(1, &[]); Ok(service_api::ApplicationResponse::Json( routing_types::RoutingKind::RoutingAlgorithm(result), )) } <file_sep path="hyperswitch/crates/router/src/core/routing.rs" role="context" start="101" end="122"> pub fn create_new_routing_algorithm( request: &routing_types::RoutingConfigRequest, merchant_id: &common_utils::id_type::MerchantId, profile_id: common_utils::id_type::ProfileId, transaction_type: enums::TransactionType, ) -> Self { let algorithm_id = common_utils::generate_routing_id_of_default_length(); let timestamp = common_utils::date_time::now(); let algo = RoutingAlgorithm { algorithm_id, profile_id, merchant_id: merchant_id.clone(), name: request.name.clone(), description: Some(request.description.clone()), kind: request.algorithm.get_kind().foreign_into(), algorithm_data: serde_json::json!(request.algorithm), created_at: timestamp, modified_at: timestamp, algorithm_for: transaction_type, }; Self(algo) } <file_sep path="hyperswitch/crates/router/src/core/routing.rs" role="context" start="75" end="93"> pub fn new( setup_mandate: Option<&'a mandates::MandateData>, payment_attempt: &'a storage::PaymentAttempt, payment_intent: &'a storage::PaymentIntent, payment_method_data: Option<&'a domain::PaymentMethodData>, address: &'a payment_address::PaymentAddress, recurring_details: Option<&'a mandates_api::RecurringDetails>, currency: storage_enums::Currency, ) -> Self { Self { setup_mandate, payment_attempt, payment_intent, payment_method_data, address, recurring_details, currency, } } <file_sep path="hyperswitch/crates/router/src/core/routing.rs" role="context" start="335" end="402"> pub async fn link_routing_config_under_profile( state: SessionState, merchant_account: domain::MerchantAccount, key_store: domain::MerchantKeyStore, profile_id: common_utils::id_type::ProfileId, algorithm_id: common_utils::id_type::RoutingId, transaction_type: &enums::TransactionType, ) -> RouterResponse<routing_types::RoutingDictionaryRecord> { metrics::ROUTING_LINK_CONFIG.add(1, &[]); let db = state.store.as_ref(); let key_manager_state = &(&state).into(); let routing_algorithm = RoutingAlgorithmUpdate::fetch_routing_algo(merchant_account.get_id(), &algorithm_id, db) .await?; utils::when(routing_algorithm.0.profile_id != profile_id, || { Err(errors::ApiErrorResponse::PreconditionFailed { message: "Profile Id is invalid for the routing config".to_string(), }) })?; let business_profile = core_utils::validate_and_get_business_profile( db, key_manager_state, &key_store, Some(&profile_id), merchant_account.get_id(), ) .await? .get_required_value("Profile")?; utils::when( routing_algorithm.0.algorithm_for != *transaction_type, || { Err(errors::ApiErrorResponse::PreconditionFailed { message: format!( "Cannot use {}'s routing algorithm for {} operation", routing_algorithm.0.algorithm_for, transaction_type ), }) }, )?; utils::when( business_profile.routing_algorithm_id == Some(algorithm_id.clone()) || business_profile.payout_routing_algorithm_id == Some(algorithm_id.clone()), || { Err(errors::ApiErrorResponse::PreconditionFailed { message: "Algorithm is already active".to_string(), }) }, )?; admin::ProfileWrapper::new(business_profile) .update_profile_and_invalidate_routing_config_for_active_algorithm_id_update( db, key_manager_state, &key_store, algorithm_id, transaction_type, ) .await?; metrics::ROUTING_LINK_CONFIG_SUCCESS_RESPONSE.add(1, &[]); Ok(service_api::ApplicationResponse::Json( routing_algorithm.0.foreign_into(), )) } <file_sep path="hyperswitch/crates/router/src/core/routing.rs" role="context" start="673" end="724"> pub async fn unlink_routing_config_under_profile( state: SessionState, merchant_account: domain::MerchantAccount, key_store: domain::MerchantKeyStore, profile_id: common_utils::id_type::ProfileId, transaction_type: &enums::TransactionType, ) -> RouterResponse<routing_types::RoutingDictionaryRecord> { metrics::ROUTING_UNLINK_CONFIG.add(1, &[]); let db = state.store.as_ref(); let key_manager_state = &(&state).into(); let business_profile = core_utils::validate_and_get_business_profile( db, key_manager_state, &key_store, Some(&profile_id), merchant_account.get_id(), ) .await? .get_required_value("Profile")?; let routing_algo_id = match transaction_type { enums::TransactionType::Payment => business_profile.routing_algorithm_id.clone(), #[cfg(feature = "payouts")] enums::TransactionType::Payout => business_profile.payout_routing_algorithm_id.clone(), }; if let Some(algorithm_id) = routing_algo_id { let record = RoutingAlgorithmUpdate::fetch_routing_algo( merchant_account.get_id(), &algorithm_id, db, ) .await?; let response = record.0.foreign_into(); admin::ProfileWrapper::new(business_profile) .update_profile_and_invalidate_routing_config_for_active_algorithm_id_update( db, key_manager_state, &key_store, algorithm_id, transaction_type, ) .await?; metrics::ROUTING_UNLINK_CONFIG_SUCCESS_RESPONSE.add(1, &[]); Ok(service_api::ApplicationResponse::Json(response)) } else { Err(errors::ApiErrorResponse::PreconditionFailed { message: "Algorithm is already inactive".to_string(), })? } } <file_sep path="hyperswitch/crates/router/tests/utils.rs" role="context" start="389" end="391"> pub struct MerchantId { merchant_id: common_utils::id_type::MerchantId, }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/routing/helpers.rs<|crate|> router anchor=new kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/routing/helpers.rs" role="context" start="1616" end="1634"> pub fn new( payment_method: Option<common_enums::PaymentMethod>, payment_method_type: Option<common_enums::PaymentMethodType>, authentication_type: Option<common_enums::AuthenticationType>, currency: Option<common_enums::Currency>, country: Option<common_enums::CountryAlpha2>, card_network: Option<String>, card_bin: Option<String>, ) -> Self { Self { payment_method, payment_method_type, authentication_type, currency, country, card_network, card_bin, } } <file_sep path="hyperswitch/crates/router/src/core/routing/helpers.rs" role="context" start="1636" end="1675"> pub fn get_string_val( &self, params: &Vec<routing_types::DynamicRoutingConfigParams>, ) -> String { let mut parts: Vec<String> = Vec::new(); for param in params { let val = match param { routing_types::DynamicRoutingConfigParams::PaymentMethod => self .payment_method .as_ref() .map_or(String::new(), |pm| pm.to_string()), routing_types::DynamicRoutingConfigParams::PaymentMethodType => self .payment_method_type .as_ref() .map_or(String::new(), |pmt| pmt.to_string()), routing_types::DynamicRoutingConfigParams::AuthenticationType => self .authentication_type .as_ref() .map_or(String::new(), |at| at.to_string()), routing_types::DynamicRoutingConfigParams::Currency => self .currency .as_ref() .map_or(String::new(), |cur| cur.to_string()), routing_types::DynamicRoutingConfigParams::Country => self .country .as_ref() .map_or(String::new(), |cn| cn.to_string()), routing_types::DynamicRoutingConfigParams::CardNetwork => { self.card_network.clone().unwrap_or_default() } routing_types::DynamicRoutingConfigParams::CardBin => { self.card_bin.clone().unwrap_or_default() } }; if !val.is_empty() { parts.push(val); } } parts.join(":") } <file_sep path="hyperswitch/crates/router/src/core/routing/helpers.rs" role="context" start="1519" end="1602"> pub async fn default_specific_dynamic_routing_setup( state: &SessionState, key_store: domain::MerchantKeyStore, business_profile: domain::Profile, feature_to_enable: routing_types::DynamicRoutingFeatures, mut dynamic_routing_algo_ref: routing_types::DynamicRoutingAlgorithmRef, dynamic_routing_type: routing_types::DynamicRoutingType, ) -> RouterResult<ApplicationResponse<routing_types::RoutingDictionaryRecord>> { let db = state.store.as_ref(); let key_manager_state = &state.into(); let profile_id = business_profile.get_id().clone(); let merchant_id = business_profile.merchant_id.clone(); let algorithm_id = common_utils::generate_routing_id_of_default_length(); let timestamp = common_utils::date_time::now(); let algo = match dynamic_routing_type { routing_types::DynamicRoutingType::SuccessRateBasedRouting => { let default_success_based_routing_config = routing_types::SuccessBasedRoutingConfig::default(); routing_algorithm::RoutingAlgorithm { algorithm_id: algorithm_id.clone(), profile_id: profile_id.clone(), merchant_id, name: SUCCESS_BASED_DYNAMIC_ROUTING_ALGORITHM.to_string(), description: None, kind: diesel_models::enums::RoutingAlgorithmKind::Dynamic, algorithm_data: serde_json::json!(default_success_based_routing_config), created_at: timestamp, modified_at: timestamp, algorithm_for: common_enums::TransactionType::Payment, } } routing_types::DynamicRoutingType::EliminationRouting => { let default_elimination_routing_config = routing_types::EliminationRoutingConfig::default(); routing_algorithm::RoutingAlgorithm { algorithm_id: algorithm_id.clone(), profile_id: profile_id.clone(), merchant_id, name: ELIMINATION_BASED_DYNAMIC_ROUTING_ALGORITHM.to_string(), description: None, kind: diesel_models::enums::RoutingAlgorithmKind::Dynamic, algorithm_data: serde_json::json!(default_elimination_routing_config), created_at: timestamp, modified_at: timestamp, algorithm_for: common_enums::TransactionType::Payment, } } routing_types::DynamicRoutingType::ContractBasedRouting => { return Err((errors::ApiErrorResponse::InvalidRequestData { message: "Contract routing cannot be set as default".to_string(), }) .into()) } }; let record = db .insert_routing_algorithm(algo) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to insert record in routing algorithm table")?; dynamic_routing_algo_ref.update_algorithm_id( algorithm_id, feature_to_enable, dynamic_routing_type, ); update_business_profile_active_dynamic_algorithm_ref( db, key_manager_state, &key_store, business_profile, dynamic_routing_algo_ref, ) .await?; let new_record = record.foreign_into(); core_metrics::ROUTING_CREATE_SUCCESS_RESPONSE.add( 1, router_env::metric_attributes!(("profile_id", profile_id.clone())), ); Ok(ApplicationResponse::Json(new_record)) } <file_sep path="hyperswitch/crates/router/src/core/routing/helpers.rs" role="context" start="1443" end="1515"> pub async fn enable_specific_routing_algorithm<A>( state: &SessionState, key_store: domain::MerchantKeyStore, business_profile: domain::Profile, feature_to_enable: routing_types::DynamicRoutingFeatures, mut dynamic_routing_algo_ref: routing_types::DynamicRoutingAlgorithmRef, dynamic_routing_type: routing_types::DynamicRoutingType, algo_type: Option<A>, ) -> RouterResult<ApplicationResponse<routing_types::RoutingDictionaryRecord>> where A: routing_types::DynamicRoutingAlgoAccessor + Clone + Debug, { // Algorithm wasn't created yet let Some(mut algo_type) = algo_type else { return default_specific_dynamic_routing_setup( state, key_store, business_profile, feature_to_enable, dynamic_routing_algo_ref, dynamic_routing_type, ) .await; }; // Algorithm was in disabled state let Some(algo_type_algorithm_id) = algo_type .clone() .get_algorithm_id_with_timestamp() .algorithm_id else { return default_specific_dynamic_routing_setup( state, key_store, business_profile, feature_to_enable, dynamic_routing_algo_ref, dynamic_routing_type, ) .await; }; let db = state.store.as_ref(); let profile_id = business_profile.get_id().clone(); let algo_type_enabled_features = algo_type.get_enabled_features(); if *algo_type_enabled_features == feature_to_enable { // algorithm already has the required feature return Err(errors::ApiErrorResponse::PreconditionFailed { message: format!("{} is already enabled", dynamic_routing_type), } .into()); }; *algo_type_enabled_features = feature_to_enable; dynamic_routing_algo_ref.update_enabled_features(dynamic_routing_type, feature_to_enable); update_business_profile_active_dynamic_algorithm_ref( db, &state.into(), &key_store, business_profile, dynamic_routing_algo_ref.clone(), ) .await?; let routing_algorithm = db .find_routing_algorithm_by_profile_id_algorithm_id(&profile_id, &algo_type_algorithm_id) .await .to_not_found_response(errors::ApiErrorResponse::ResourceIdNotFound)?; let updated_routing_record = routing_algorithm.foreign_into(); core_metrics::ROUTING_CREATE_SUCCESS_RESPONSE.add( 1, router_env::metric_attributes!(("profile_id", profile_id.clone())), ); Ok(ApplicationResponse::Json(updated_routing_record)) } <file_sep path="hyperswitch/crates/router/src/core/routing/helpers.rs" role="context" start="59" end="101"> pub async fn get_merchant_default_config( db: &dyn StorageInterface, // Cannot make this as merchant id domain type because, we are passing profile id also here merchant_id: &str, transaction_type: &storage::enums::TransactionType, ) -> RouterResult<Vec<routing_types::RoutableConnectorChoice>> { let key = get_default_config_key(merchant_id, transaction_type); let maybe_config = db.find_config_by_key(&key).await; match maybe_config { Ok(config) => config .config .parse_struct("Vec<RoutableConnectors>") .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Merchant default config has invalid structure"), Err(e) if e.current_context().is_db_not_found() => { let new_config_conns = Vec::<routing_types::RoutableConnectorChoice>::new(); let serialized = new_config_conns .encode_to_string_of_json() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable( "Error while creating and serializing new merchant default config", )?; let new_config = configs::ConfigNew { key, config: serialized, }; db.insert_config(new_config) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error inserting new default routing config into DB")?; Ok(new_config_conns) } Err(e) => Err(e) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error fetching default config for merchant"), } } <file_sep path="hyperswitch/crates/router/src/core/routing/helpers.rs" role="context" start="1231" end="1393"> pub async fn disable_dynamic_routing_algorithm( state: &SessionState, key_store: domain::MerchantKeyStore, business_profile: domain::Profile, dynamic_routing_algo_ref: routing_types::DynamicRoutingAlgorithmRef, dynamic_routing_type: routing_types::DynamicRoutingType, ) -> RouterResult<ApplicationResponse<routing_types::RoutingDictionaryRecord>> { let db = state.store.as_ref(); let key_manager_state = &state.into(); let profile_id = business_profile.get_id().clone(); let (algorithm_id, dynamic_routing_algorithm, cache_entries_to_redact) = match dynamic_routing_type { routing_types::DynamicRoutingType::SuccessRateBasedRouting => { let Some(algorithm_ref) = dynamic_routing_algo_ref.success_based_algorithm else { Err(errors::ApiErrorResponse::PreconditionFailed { message: "Success rate based routing is already disabled".to_string(), })? }; let Some(algorithm_id) = algorithm_ref.algorithm_id_with_timestamp.algorithm_id else { Err(errors::ApiErrorResponse::PreconditionFailed { message: "Algorithm is already inactive".to_string(), })? }; let cache_key = format!( "{}_{}", business_profile.get_id().get_string_repr(), algorithm_id.get_string_repr() ); let cache_entries_to_redact = vec![cache::CacheKind::SuccessBasedDynamicRoutingCache( cache_key.into(), )]; ( algorithm_id, routing_types::DynamicRoutingAlgorithmRef { success_based_algorithm: Some(routing_types::SuccessBasedAlgorithm { algorithm_id_with_timestamp: routing_types::DynamicAlgorithmWithTimestamp::new(None), enabled_feature: routing_types::DynamicRoutingFeatures::None, }), elimination_routing_algorithm: dynamic_routing_algo_ref .elimination_routing_algorithm, contract_based_routing: dynamic_routing_algo_ref.contract_based_routing, dynamic_routing_volume_split: dynamic_routing_algo_ref .dynamic_routing_volume_split, }, cache_entries_to_redact, ) } routing_types::DynamicRoutingType::EliminationRouting => { let Some(algorithm_ref) = dynamic_routing_algo_ref.elimination_routing_algorithm else { Err(errors::ApiErrorResponse::PreconditionFailed { message: "Elimination routing is already disabled".to_string(), })? }; let Some(algorithm_id) = algorithm_ref.algorithm_id_with_timestamp.algorithm_id else { Err(errors::ApiErrorResponse::PreconditionFailed { message: "Algorithm is already inactive".to_string(), })? }; let cache_key = format!( "{}_{}", business_profile.get_id().get_string_repr(), algorithm_id.get_string_repr() ); let cache_entries_to_redact = vec![cache::CacheKind::EliminationBasedDynamicRoutingCache( cache_key.into(), )]; ( algorithm_id, routing_types::DynamicRoutingAlgorithmRef { success_based_algorithm: dynamic_routing_algo_ref.success_based_algorithm, dynamic_routing_volume_split: dynamic_routing_algo_ref .dynamic_routing_volume_split, elimination_routing_algorithm: Some( routing_types::EliminationRoutingAlgorithm { algorithm_id_with_timestamp: routing_types::DynamicAlgorithmWithTimestamp::new(None), enabled_feature: routing_types::DynamicRoutingFeatures::None, }, ), contract_based_routing: dynamic_routing_algo_ref.contract_based_routing, }, cache_entries_to_redact, ) } routing_types::DynamicRoutingType::ContractBasedRouting => { let Some(algorithm_ref) = dynamic_routing_algo_ref.contract_based_routing else { Err(errors::ApiErrorResponse::PreconditionFailed { message: "Contract routing is already disabled".to_string(), })? }; let Some(algorithm_id) = algorithm_ref.algorithm_id_with_timestamp.algorithm_id else { Err(errors::ApiErrorResponse::PreconditionFailed { message: "Algorithm is already inactive".to_string(), })? }; let cache_key = format!( "{}_{}", business_profile.get_id().get_string_repr(), algorithm_id.get_string_repr() ); let cache_entries_to_redact = vec![cache::CacheKind::ContractBasedDynamicRoutingCache( cache_key.into(), )]; ( algorithm_id, routing_types::DynamicRoutingAlgorithmRef { success_based_algorithm: dynamic_routing_algo_ref.success_based_algorithm, elimination_routing_algorithm: dynamic_routing_algo_ref .elimination_routing_algorithm, dynamic_routing_volume_split: dynamic_routing_algo_ref .dynamic_routing_volume_split, contract_based_routing: Some(routing_types::ContractRoutingAlgorithm { algorithm_id_with_timestamp: routing_types::DynamicAlgorithmWithTimestamp::new(None), enabled_feature: routing_types::DynamicRoutingFeatures::None, }), }, cache_entries_to_redact, ) } }; // redact cache for dynamic routing config let _ = cache::redact_from_redis_and_publish( state.store.get_cache_store().as_ref(), cache_entries_to_redact, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable( "unable to publish into the redact channel for evicting the dynamic routing config cache", )?; let record = db .find_routing_algorithm_by_profile_id_algorithm_id(business_profile.get_id(), &algorithm_id) .await .to_not_found_response(errors::ApiErrorResponse::ResourceIdNotFound)?; let response = record.foreign_into(); update_business_profile_active_dynamic_algorithm_ref( db, key_manager_state, &key_store, business_profile, dynamic_routing_algorithm, ) .await?; core_metrics::ROUTING_UNLINK_CONFIG_SUCCESS_RESPONSE.add( 1, router_env::metric_attributes!(("profile_id", profile_id)), ); Ok(ApplicationResponse::Json(response)) } <file_sep path="hyperswitch/v2_compatible_migrations/2024-08-28-081721_add_v2_columns/up.sql" role="context" start="54" end="70"> ADD COLUMN redirection_data JSONB, ADD COLUMN connector_payment_data TEXT, ADD COLUMN connector_token_details JSONB; -- Change the type of the column from JSON to JSONB ALTER TABLE merchant_connector_account ADD COLUMN IF NOT EXISTS feature_metadata JSONB; ALTER TABLE payment_methods ADD COLUMN IF NOT EXISTS locker_fingerprint_id VARCHAR(64), ADD COLUMN IF NOT EXISTS payment_method_type_v2 VARCHAR(64), ADD COLUMN IF NOT EXISTS payment_method_subtype VARCHAR(64); ALTER TABLE refund ADD COLUMN IF NOT EXISTS id VARCHAR(64), ADD COLUMN IF NOT EXISTS merchant_reference_id VARCHAR(64), ADD COLUMN IF NOT EXISTS connector_id VARCHAR(64);
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/payouts/retry.rs<|crate|> router anchor=do_retry kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/payouts/retry.rs" role="context" start="228" end="247"> pub async fn do_retry( state: &routes::SessionState, connector: api::ConnectorData, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, payout_data: &mut PayoutData, ) -> RouterResult<()> { metrics::AUTO_RETRY_PAYOUT_COUNT.add(1, &[]); modify_trackers(state, &connector, merchant_account, payout_data).await?; Box::pin(call_connector_payout( state, merchant_account, key_store, &connector, payout_data, )) .await } <file_sep path="hyperswitch/crates/router/src/core/payouts/retry.rs" role="context" start="227" end="227"> use super::{call_connector_payout, PayoutData}; use crate::{ core::{ errors::{self, RouterResult, StorageErrorExt}, payouts, }, db::StorageInterface, routes::{self, app, metrics}, types::{api, domain, storage}, utils, }; <file_sep path="hyperswitch/crates/router/src/core/payouts/retry.rs" role="context" start="323" end="339"> pub async fn config_should_call_gsm_payout( db: &dyn StorageInterface, merchant_id: &common_utils::id_type::MerchantId, retry_type: PayoutRetryType, ) -> bool { let key = merchant_id.get_should_call_gsm_payout_key(retry_type); let config = db .find_config_by_key_unwrap_or(key.as_str(), Some("false".to_string())) .await; match config { Ok(conf) => conf.config == "true", Err(error) => { logger::error!(?error); false } } } <file_sep path="hyperswitch/crates/router/src/core/payouts/retry.rs" role="context" start="250" end="321"> pub async fn modify_trackers( state: &routes::SessionState, connector: &api::ConnectorData, merchant_account: &domain::MerchantAccount, payout_data: &mut PayoutData, ) -> RouterResult<()> { let new_attempt_count = payout_data.payouts.attempt_count + 1; let db = &*state.store; // update payout table's attempt count let payouts = payout_data.payouts.to_owned(); let updated_payouts = storage::PayoutsUpdate::AttemptCountUpdate { attempt_count: new_attempt_count, }; let payout_id = payouts.payout_id.clone(); payout_data.payouts = db .update_payout( &payout_data.payouts, updated_payouts, &payout_data.payout_attempt, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error updating payouts")?; let payout_attempt_id = utils::get_payout_attempt_id(payout_id.to_owned(), payout_data.payouts.attempt_count); let payout_attempt_req = storage::PayoutAttemptNew { payout_attempt_id: payout_attempt_id.to_string(), payout_id: payout_id.to_owned(), customer_id: payout_data.payout_attempt.customer_id.to_owned(), connector: Some(connector.connector_name.to_string()), merchant_id: payout_data.payout_attempt.merchant_id.to_owned(), address_id: payout_data.payout_attempt.address_id.to_owned(), business_country: payout_data.payout_attempt.business_country.to_owned(), business_label: payout_data.payout_attempt.business_label.to_owned(), payout_token: payout_data.payout_attempt.payout_token.to_owned(), profile_id: payout_data.payout_attempt.profile_id.to_owned(), connector_payout_id: None, status: common_enums::PayoutStatus::default(), is_eligible: None, error_message: None, error_code: None, created_at: common_utils::date_time::now(), last_modified_at: common_utils::date_time::now(), merchant_connector_id: None, routing_info: None, unified_code: None, unified_message: None, additional_payout_method_data: payout_data .payout_attempt .additional_payout_method_data .to_owned(), }; payout_data.payout_attempt = db .insert_payout_attempt( payout_attempt_req, &payouts, merchant_account.storage_scheme, ) .await .to_duplicate_response(errors::ApiErrorResponse::DuplicatePayout { payout_id }) .attach_printable("Error inserting payouts in db")?; payout_data.merchant_connector_account = None; Ok(()) } <file_sep path="hyperswitch/crates/router/src/core/payouts/retry.rs" role="context" start="205" end="224"> pub fn get_gsm_decision( option_gsm: Option<storage::gsm::GatewayStatusMap>, ) -> api_models::gsm::GsmDecision { let option_gsm_decision = option_gsm .and_then(|gsm| { api_models::gsm::GsmDecision::from_str(gsm.decision.as_str()) .map_err(|err| { let api_error = report!(err).change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("gsm decision parsing failed"); logger::warn!(get_gsm_decision_parse_error=?api_error, "error fetching gsm decision"); api_error }) .ok() }); if option_gsm_decision.is_some() { metrics::AUTO_PAYOUT_RETRY_GSM_MATCH_COUNT.add(1, &[]); } option_gsm_decision.unwrap_or_default() } <file_sep path="hyperswitch/crates/router/src/core/payouts/retry.rs" role="context" start="185" end="202"> pub async fn get_gsm( state: &app::SessionState, original_connector_data: &api::ConnectorData, payout_data: &PayoutData, ) -> RouterResult<Option<storage::gsm::GatewayStatusMap>> { let error_code = payout_data.payout_attempt.error_code.to_owned(); let error_message = payout_data.payout_attempt.error_message.to_owned(); let connector_name = Some(original_connector_data.connector_name.to_string()); Ok(payouts::helpers::get_gsm_record( state, error_code, error_message, connector_name, common_utils::consts::PAYOUT_FLOW_STR, ) .await) } <file_sep path="hyperswitch/crates/router/src/core/payouts/retry.rs" role="context" start="24" end="87"> pub async fn do_gsm_multiple_connector_actions( state: &app::SessionState, mut connectors: IntoIter<api::ConnectorData>, original_connector_data: api::ConnectorData, payout_data: &mut PayoutData, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, ) -> RouterResult<()> { let mut retries = None; metrics::AUTO_PAYOUT_RETRY_ELIGIBLE_REQUEST_COUNT.add(1, &[]); let mut connector = original_connector_data; loop { let gsm = get_gsm(state, &connector, payout_data).await?; match get_gsm_decision(gsm) { api_models::gsm::GsmDecision::Retry => { retries = get_retries( state, retries, merchant_account.get_id(), PayoutRetryType::MultiConnector, ) .await; if retries.is_none() || retries == Some(0) { metrics::AUTO_PAYOUT_RETRY_EXHAUSTED_COUNT.add(1, &[]); logger::info!("retries exhausted for auto_retry payout"); break; } if connectors.len() == 0 { logger::info!("connectors exhausted for auto_retry payout"); metrics::AUTO_PAYOUT_RETRY_EXHAUSTED_COUNT.add(1, &[]); break; } connector = super::get_next_connector(&mut connectors)?; Box::pin(do_retry( &state.clone(), connector.to_owned(), merchant_account, key_store, payout_data, )) .await?; retries = retries.map(|i| i - 1); } api_models::gsm::GsmDecision::Requeue => { Err(report!(errors::ApiErrorResponse::NotImplemented { message: errors::NotImplementedMessage::Reason( "Requeue not implemented".to_string(), ), }))? } api_models::gsm::GsmDecision::DoDefault => break, } } Ok(()) } <file_sep path="hyperswitch/crates/router/src/core/payouts/retry.rs" role="context" start="91" end="151"> pub async fn do_gsm_single_connector_actions( state: &app::SessionState, original_connector_data: api::ConnectorData, payout_data: &mut PayoutData, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, ) -> RouterResult<()> { let mut retries = None; metrics::AUTO_PAYOUT_RETRY_ELIGIBLE_REQUEST_COUNT.add(1, &[]); let mut previous_gsm = None; // to compare previous status loop { let gsm = get_gsm(state, &original_connector_data, payout_data).await?; // if the error config is same as previous, we break out of the loop if let Ordering::Equal = gsm.cmp(&previous_gsm) { break; } previous_gsm.clone_from(&gsm); match get_gsm_decision(gsm) { api_models::gsm::GsmDecision::Retry => { retries = get_retries( state, retries, merchant_account.get_id(), PayoutRetryType::SingleConnector, ) .await; if retries.is_none() || retries == Some(0) { metrics::AUTO_PAYOUT_RETRY_EXHAUSTED_COUNT.add(1, &[]); logger::info!("retries exhausted for auto_retry payment"); break; } Box::pin(do_retry( &state.clone(), original_connector_data.to_owned(), merchant_account, key_store, payout_data, )) .await?; retries = retries.map(|i| i - 1); } api_models::gsm::GsmDecision::Requeue => { Err(report!(errors::ApiErrorResponse::NotImplemented { message: errors::NotImplementedMessage::Reason( "Requeue not implemented".to_string(), ), }))? } api_models::gsm::GsmDecision::DoDefault => break, } } Ok(()) } <file_sep path="hyperswitch/v2_compatible_migrations/2024-08-28-081757_drop_not_null_constraints_on_v1_columns/up.sql" role="context" start="5" end="21"> ALTER COLUMN org_id DROP NOT NULL; -- Create index on org_id in organization table -- This is done to mullify the effects of droping primary key for v1 CREATE INDEX idx_organization_org_id ON organization (org_id); ------------------------ Merchant Account ------------------- -- Drop not null in merchant_account table for v1 columns that are dropped in v2 ALTER TABLE merchant_account DROP CONSTRAINT merchant_account_pkey, ALTER COLUMN merchant_id DROP NOT NULL, ALTER COLUMN primary_business_details DROP NOT NULL, ALTER COLUMN is_recon_enabled DROP NOT NULL; -- This is done to mullify the effects of droping primary key for v1 CREATE INDEX idx_merchant_account_merchant_id ON merchant_account (merchant_id); <file_sep path="hyperswitch/postman/collection-dir/powertranz/Flow Testcases/Happy Cases/Scenario1-Create payment with confirm true/Payments - Create/event.test.js" role="context" start="61" end="78"> "INFO - Unable to assign variable {{client_secret}}, as jsonData.client_secret is undefined.", ); } // Response body should have value "succeeded" for "status" if (jsonData?.status) { pm.test( "[POST]::/payments - Content check if value for 'status' matches 'succeeded'", function () { pm.expect(jsonData.status).to.eql("succeeded"); }, ); }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/payment_methods/cards.rs<|crate|> router anchor=get_card_bin_and_last4_digits_for_masked_card kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=1<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="1005" end="1023"> pub fn get_card_bin_and_last4_digits_for_masked_card( masked_card_number: &str, ) -> Result<(String, String), cards::CardNumberValidationErr> { let last4_digits = masked_card_number .chars() .rev() .take(4) .collect::<String>() .chars() .rev() .collect::<String>(); let card_isin = masked_card_number.chars().take(6).collect::<String>(); cards::validate::validate_card_number_chars(&card_isin) .and_then(|_| cards::validate::validate_card_number_chars(&last4_digits))?; Ok((card_isin, last4_digits)) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="1004" end="1004"> use std::{ collections::{HashMap, HashSet}, fmt::Debug, str::FromStr, }; <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="1114" end="1212"> pub async fn get_client_secret_or_add_payment_method_for_migration( state: &routes::SessionState, req: api::PaymentMethodCreate, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, migration_status: &mut migration::RecordMigrationStatusBuilder, ) -> errors::RouterResponse<api::PaymentMethodResponse> { let merchant_id = merchant_account.get_id(); let customer_id = req.customer_id.clone().get_required_value("customer_id")?; #[cfg(not(feature = "payouts"))] let condition = req.card.is_some(); #[cfg(feature = "payouts")] let condition = req.card.is_some() || req.bank_transfer.is_some() || req.wallet.is_some(); let key_manager_state = state.into(); let payment_method_billing_address: Option<Encryptable<Secret<serde_json::Value>>> = req .billing .clone() .async_map(|billing| create_encrypted_data(&key_manager_state, key_store, billing)) .await .transpose() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to encrypt Payment method billing address")?; let connector_mandate_details = req .connector_mandate_details .clone() .map(serde_json::to_value) .transpose() .change_context(errors::ApiErrorResponse::InternalServerError)?; if condition { Box::pin(save_migration_payment_method( state, req, merchant_account, key_store, migration_status, )) .await } else { let payment_method_id = generate_id(consts::ID_LENGTH, "pm"); let res = create_payment_method( state, &req, &customer_id, payment_method_id.as_str(), None, merchant_id, None, None, None, key_store, connector_mandate_details.clone(), Some(enums::PaymentMethodStatus::AwaitingData), None, merchant_account.storage_scheme, payment_method_billing_address, None, None, None, None, ) .await?; migration_status.connector_mandate_details_migrated( connector_mandate_details .clone() .and_then(|val| (val != json!({})).then_some(true)) .or_else(|| { req.connector_mandate_details .clone() .and_then(|val| (!val.0.is_empty()).then_some(false)) }), ); //card is not migrated in this case migration_status.card_migrated(false); if res.status == enums::PaymentMethodStatus::AwaitingData { add_payment_method_status_update_task( &*state.store, &res, enums::PaymentMethodStatus::AwaitingData, enums::PaymentMethodStatus::Inactive, merchant_id, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable( "Failed to add payment method status update task in process tracker", )?; } Ok(services::api::ApplicationResponse::Json( api::PaymentMethodResponse::foreign_from((None, res)), )) } } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="1030" end="1107"> pub async fn get_client_secret_or_add_payment_method( state: &routes::SessionState, req: api::PaymentMethodCreate, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, ) -> errors::RouterResponse<api::PaymentMethodResponse> { let merchant_id = merchant_account.get_id(); let customer_id = req.customer_id.clone().get_required_value("customer_id")?; #[cfg(not(feature = "payouts"))] let condition = req.card.is_some(); #[cfg(feature = "payouts")] let condition = req.card.is_some() || req.bank_transfer.is_some() || req.wallet.is_some(); let key_manager_state = state.into(); let payment_method_billing_address: Option<Encryptable<Secret<serde_json::Value>>> = req .billing .clone() .async_map(|billing| create_encrypted_data(&key_manager_state, key_store, billing)) .await .transpose() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to encrypt Payment method billing address")?; let connector_mandate_details = req .connector_mandate_details .clone() .map(serde_json::to_value) .transpose() .change_context(errors::ApiErrorResponse::InternalServerError)?; if condition { Box::pin(add_payment_method(state, req, merchant_account, key_store)).await } else { let payment_method_id = generate_id(consts::ID_LENGTH, "pm"); let res = create_payment_method( state, &req, &customer_id, payment_method_id.as_str(), None, merchant_id, None, None, None, key_store, connector_mandate_details, Some(enums::PaymentMethodStatus::AwaitingData), None, merchant_account.storage_scheme, payment_method_billing_address, None, None, None, None, ) .await?; if res.status == enums::PaymentMethodStatus::AwaitingData { add_payment_method_status_update_task( &*state.store, &res, enums::PaymentMethodStatus::AwaitingData, enums::PaymentMethodStatus::Inactive, merchant_id, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable( "Failed to add payment method status update task in process tracker", )?; } Ok(services::api::ApplicationResponse::Json( api::PaymentMethodResponse::foreign_from((None, res)), )) } } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="994" end="1003"> pub async fn skip_locker_call_and_migrate_payment_method( _state: routes::SessionState, _req: &api::PaymentMethodMigrate, _merchant_id: id_type::MerchantId, _key_store: &domain::MerchantKeyStore, _merchant_account: &domain::MerchantAccount, _card: api_models::payment_methods::CardDetailFromLocker, ) -> errors::RouterResponse<api::PaymentMethodResponse> { todo!() } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="883" end="986"> pub async fn save_network_token_and_update_payment_method( state: &routes::SessionState, req: &api::PaymentMethodMigrate, key_store: &domain::MerchantKeyStore, merchant_account: &domain::MerchantAccount, network_token_data: &api_models::payment_methods::MigrateNetworkTokenData, network_token_requestor_ref_id: String, pm_id: String, ) -> errors::RouterResult<bool> { let payment_method_create_request = api::PaymentMethodCreate::get_payment_method_create_from_payment_method_migrate( network_token_data.network_token_number.clone(), req, ); let customer_id = req.customer_id.clone().get_required_value("customer_id")?; let network_token_details = api::CardDetail { card_number: network_token_data.network_token_number.clone(), card_exp_month: network_token_data.network_token_exp_month.clone(), card_exp_year: network_token_data.network_token_exp_year.clone(), card_holder_name: network_token_data.card_holder_name.clone(), nick_name: network_token_data.nick_name.clone(), card_issuing_country: network_token_data.card_issuing_country.clone(), card_network: network_token_data.card_network.clone(), card_issuer: network_token_data.card_issuer.clone(), card_type: network_token_data.card_type.clone(), }; logger::debug!( "Adding network token to locker for customer_id: {:?}", customer_id ); let token_resp = Box::pin(add_card_to_locker( state, payment_method_create_request.clone(), &network_token_details, &customer_id, merchant_account, None, )) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Add Network Token failed"); let key_manager_state = &state.into(); match token_resp { Ok(resp) => { logger::debug!("Network token added to locker"); let (token_pm_resp, _duplication_check) = resp; let pm_token_details = token_pm_resp .card .as_ref() .map(|card| PaymentMethodsData::Card(CardDetailsPaymentMethod::from(card.clone()))); let pm_network_token_data_encrypted = pm_token_details .async_map(|pm_card| create_encrypted_data(key_manager_state, key_store, pm_card)) .await .transpose() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to encrypt payment method data")?; let pm_update = storage::PaymentMethodUpdate::NetworkTokenDataUpdate { network_token_requestor_reference_id: Some(network_token_requestor_ref_id), network_token_locker_id: Some(token_pm_resp.payment_method_id), network_token_payment_method_data: pm_network_token_data_encrypted.map(Into::into), }; let db = &*state.store; let existing_pm = db .find_payment_method( &state.into(), key_store, &pm_id, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable(format!( "Failed to fetch payment method for existing pm_id: {:?} in db", pm_id ))?; db.update_payment_method( &state.into(), key_store, existing_pm, pm_update, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable(format!( "Failed to update payment method for existing pm_id: {:?} in db", pm_id ))?; logger::debug!("Network token added to locker and payment method updated"); Ok(true) } Err(err) => { logger::debug!("Network token added to locker failed {:?}", err); Ok(false) } } } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="641" end="710"> fn foreign_try_from( (card_details, card_info): ( &api_models::payment_methods::MigrateCardDetail, Option<diesel_models::CardInfo>, ), ) -> Result<Self, Self::Error> { let (card_isin, last4_digits) = get_card_bin_and_last4_digits_for_masked_card(card_details.card_number.peek()) .change_context(errors::ApiErrorResponse::InvalidRequestData { message: "Invalid card number".to_string(), })?; if let Some(card_bin_info) = card_info { Ok(Self { last4_digits: Some(last4_digits.clone()), issuer_country: card_details .card_issuing_country .as_ref() .map(|c| api_enums::CountryAlpha2::from_str(c)) .transpose() .ok() .flatten() .or(card_bin_info .card_issuing_country .as_ref() .map(|c| api_enums::CountryAlpha2::from_str(c)) .transpose() .ok() .flatten()), card_number: None, expiry_month: Some(card_details.card_exp_month.clone()), expiry_year: Some(card_details.card_exp_year.clone()), card_fingerprint: None, card_holder_name: card_details.card_holder_name.clone(), nick_name: card_details.nick_name.clone(), card_isin: Some(card_isin.clone()), card_issuer: card_details .card_issuer .clone() .or(card_bin_info.card_issuer), card_network: card_details .card_network .clone() .or(card_bin_info.card_network), card_type: card_details.card_type.clone().or(card_bin_info.card_type), saved_to_locker: false, }) } else { Ok(Self { last4_digits: Some(last4_digits.clone()), issuer_country: card_details .card_issuing_country .as_ref() .map(|c| api_enums::CountryAlpha2::from_str(c)) .transpose() .ok() .flatten(), card_number: None, expiry_month: Some(card_details.card_exp_month.clone()), expiry_year: Some(card_details.card_exp_year.clone()), card_fingerprint: None, card_holder_name: card_details.card_holder_name.clone(), nick_name: card_details.nick_name.clone(), card_isin: Some(card_isin.clone()), card_issuer: card_details.card_issuer.clone(), card_network: card_details.card_network.clone(), card_type: card_details.card_type.clone(), saved_to_locker: false, }) } } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="566" end="630"> fn foreign_try_from( (card_details, card_info): ( &api_models::payment_methods::MigrateCardDetail, Option<diesel_models::CardInfo>, ), ) -> Result<Self, Self::Error> { let (card_isin, last4_digits) = get_card_bin_and_last4_digits_for_masked_card(card_details.card_number.peek()) .change_context(errors::ApiErrorResponse::InvalidRequestData { message: "Invalid card number".to_string(), })?; if let Some(card_bin_info) = card_info { Ok(Self { scheme: card_details .card_network .clone() .or(card_bin_info.card_network.clone()) .map(|card_network| card_network.to_string()), last4_digits: Some(last4_digits.clone()), issuer_country: card_details .card_issuing_country .clone() .or(card_bin_info.card_issuing_country), card_number: None, expiry_month: Some(card_details.card_exp_month.clone()), expiry_year: Some(card_details.card_exp_year.clone()), card_token: None, card_fingerprint: None, card_holder_name: card_details.card_holder_name.clone(), nick_name: card_details.nick_name.clone(), card_isin: Some(card_isin.clone()), card_issuer: card_details .card_issuer .clone() .or(card_bin_info.card_issuer), card_network: card_details .card_network .clone() .or(card_bin_info.card_network), card_type: card_details.card_type.clone().or(card_bin_info.card_type), saved_to_locker: false, }) } else { Ok(Self { scheme: card_details .card_network .clone() .map(|card_network| card_network.to_string()), last4_digits: Some(last4_digits.clone()), issuer_country: card_details.card_issuing_country.clone(), card_number: None, expiry_month: Some(card_details.card_exp_month.clone()), expiry_year: Some(card_details.card_exp_year.clone()), card_token: None, card_fingerprint: None, card_holder_name: card_details.card_holder_name.clone(), nick_name: card_details.nick_name.clone(), card_isin: Some(card_isin.clone()), card_issuer: card_details.card_issuer.clone(), card_network: card_details.card_network.clone(), card_type: card_details.card_type.clone(), saved_to_locker: false, }) } }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/payments/helpers.rs<|crate|> router anchor=get_handle_response_url kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="3174" end="3194"> pub fn get_handle_response_url( payment_id: id_type::PaymentId, business_profile: &domain::Profile, response: &api::PaymentsResponse, connector: String, ) -> RouterResult<api::RedirectionResponse> { let payments_return_url = response.return_url.as_ref(); let redirection_response = make_pg_redirect_response(payment_id, response, connector); let return_url = make_merchant_url_with_response( business_profile, redirection_response, payments_return_url, response.client_secret.as_ref(), response.manual_retry_allowed, ) .attach_printable("Failed to make merchant url with response")?; make_url_with_signature(&return_url, business_profile) } <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="3173" end="3173"> utils::when(!(1..=PAYMENTS_LIST_MAX_LIMIT_V2).contains(&limit), || { Err(errors::ApiErrorResponse::InvalidRequestData { message: format!( "limit should be in between 1 and {}", PAYMENTS_LIST_MAX_LIMIT_V2 ), }) })?; Ok(()) } #[cfg(feature = "v1")] pub fn get_handle_response_url( payment_id: id_type::PaymentId, business_profile: &domain::Profile, response: &api::PaymentsResponse, connector: String, ) -> RouterResult<api::RedirectionResponse> { let payments_return_url = response.return_url.as_ref(); let redirection_response = make_pg_redirect_response(payment_id, response, connector); let return_url = make_merchant_url_with_response( business_profile, redirection_response, <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="3260" end="3280"> pub async fn make_ephemeral_key( state: SessionState, customer_id: id_type::CustomerId, merchant_id: id_type::MerchantId, ) -> errors::RouterResponse<ephemeral_key::EphemeralKey> { let store = &state.store; let id = utils::generate_id(consts::ID_LENGTH, "eki"); let secret = format!("epk_{}", &Uuid::new_v4().simple().to_string()); let ek = ephemeral_key::EphemeralKeyNew { id, customer_id, merchant_id: merchant_id.to_owned(), secret, }; let ek = store .create_ephemeral_key(ek, state.conf.eph_key.validity) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to create ephemeral key")?; Ok(services::ApplicationResponse::Json(ek)) } <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="3197" end="3257"> pub fn make_merchant_url_with_response( business_profile: &domain::Profile, redirection_response: api::PgRedirectResponse, request_return_url: Option<&String>, client_secret: Option<&masking::Secret<String>>, manual_retry_allowed: Option<bool>, ) -> RouterResult<String> { // take return url if provided in the request else use merchant return url let url = request_return_url .or(business_profile.return_url.as_ref()) .get_required_value("return_url")?; let status_check = redirection_response.status; let payment_client_secret = client_secret .ok_or(errors::ApiErrorResponse::InternalServerError) .attach_printable("Expected client secret to be `Some`")?; let payment_id = redirection_response.payment_id.get_string_repr().to_owned(); let merchant_url_with_response = if business_profile.redirect_to_merchant_with_http_post { url::Url::parse_with_params( url, &[ ("status", status_check.to_string()), ("payment_id", payment_id), ( "payment_intent_client_secret", payment_client_secret.peek().to_string(), ), ( "manual_retry_allowed", manual_retry_allowed.unwrap_or(false).to_string(), ), ], ) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to parse the url with param")? } else { let amount = redirection_response.amount.get_required_value("amount")?; url::Url::parse_with_params( url, &[ ("status", status_check.to_string()), ("payment_id", payment_id), ( "payment_intent_client_secret", payment_client_secret.peek().to_string(), ), ("amount", amount.to_string()), ( "manual_retry_allowed", manual_retry_allowed.unwrap_or(false).to_string(), ), ], ) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to parse the url with param")? }; Ok(merchant_url_with_response.to_string()) } <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="3157" end="3171"> pub(super) fn validate_payment_list_request_for_joins( limit: u32, ) -> CustomResult<(), errors::ApiErrorResponse> { use common_utils::consts::PAYMENTS_LIST_MAX_LIMIT_V2; utils::when(!(1..=PAYMENTS_LIST_MAX_LIMIT_V2).contains(&limit), || { Err(errors::ApiErrorResponse::InvalidRequestData { message: format!( "limit should be in between 1 and {}", PAYMENTS_LIST_MAX_LIMIT_V2 ), }) })?; Ok(()) } <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="3138" end="3155"> pub(super) fn validate_payment_list_request( req: &api::PaymentListConstraints, ) -> CustomResult<(), errors::ApiErrorResponse> { use common_utils::consts::PAYMENTS_LIST_MAX_LIMIT_V1; utils::when( req.limit > PAYMENTS_LIST_MAX_LIMIT_V1 || req.limit < 1, || { Err(errors::ApiErrorResponse::InvalidRequestData { message: format!( "limit should be in between 1 and {}", PAYMENTS_LIST_MAX_LIMIT_V1 ), }) }, )?; Ok(()) } <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="3388" end="3400"> pub fn make_pg_redirect_response( payment_id: id_type::PaymentId, response: &api::PaymentsResponse, connector: String, ) -> api::PgRedirectResponse { api::PgRedirectResponse { payment_id, status: response.status, gateway_id: connector, customer_id: response.customer_id.to_owned(), amount: Some(response.amount), } } <file_sep path="hyperswitch/crates/router/src/routes/app.rs" role="context" start="1906" end="1906"> pub struct Profile; <file_sep path="hyperswitch/crates/api_models/src/payments.rs" role="context" start="4748" end="5106"> pub struct PaymentsResponse { /// Unique identifier for the payment. This ensures idempotency for multiple payments /// that have been done by a single merchant. #[schema( min_length = 30, max_length = 30, example = "pay_mbabizu24mvu3mela5njyhpit4", value_type = String, )] pub payment_id: id_type::PaymentId, /// This is an identifier for the merchant account. This is inferred from the API key /// provided during the request #[schema(max_length = 255, example = "merchant_1668273825", value_type = String)] pub merchant_id: id_type::MerchantId, #[schema(value_type = IntentStatus, example = "failed", default = "requires_confirmation")] pub status: api_enums::IntentStatus, /// The payment amount. Amount for the payment in lowest denomination of the currency. (i.e) in cents for USD denomination, in paisa for INR denomination etc., #[schema(value_type = i64, example = 6540)] pub amount: MinorUnit, /// The payment net amount. net_amount = amount + surcharge_details.surcharge_amount + surcharge_details.tax_amount + shipping_cost + order_tax_amount, /// If no surcharge_details, shipping_cost, order_tax_amount, net_amount = amount #[schema(value_type = i64, example = 6540)] pub net_amount: MinorUnit, /// The shipping cost for the payment. #[schema(value_type = Option<i64>, example = 6540)] pub shipping_cost: Option<MinorUnit>, /// The maximum amount that could be captured from the payment #[schema(value_type = i64, minimum = 100, example = 6540)] pub amount_capturable: MinorUnit, /// The amount which is already captured from the payment, this helps in the cases where merchants can't capture all capturable amount at once. #[schema(value_type = Option<i64>, example = 6540)] pub amount_received: Option<MinorUnit>, /// The connector used for the payment #[schema(example = "stripe")] pub connector: Option<String>, /// It's a token used for client side verification. #[schema(value_type = Option<String>, example = "pay_U42c409qyHwOkWo3vK60_secret_el9ksDkiB8hi6j9N78yo")] pub client_secret: Option<Secret<String>>, /// Time when the payment was created #[schema(example = "2022-09-10T10:11:12Z")] #[serde(with = "common_utils::custom_serde::iso8601::option")] pub created: Option<PrimitiveDateTime>, /// The currency of the amount of the payment #[schema(value_type = Currency, example = "USD")] pub currency: String, /// The identifier for the customer object. If not provided the customer ID will be autogenerated. /// This field will be deprecated soon. Please refer to `customer.id` #[schema( max_length = 64, min_length = 1, example = "cus_y3oqhf46pyzuxjbcn2giaqnb44", deprecated, value_type = Option<String>, )] pub customer_id: Option<id_type::CustomerId>, pub customer: Option<CustomerDetailsResponse>, /// A description of the payment #[schema(example = "It's my first payment request")] pub description: Option<String>, /// List of refunds that happened on this intent, as same payment intent can have multiple refund requests depending on the nature of order #[schema(value_type = Option<Vec<RefundResponse>>)] pub refunds: Option<Vec<refunds::RefundResponse>>, /// List of disputes that happened on this intent #[schema(value_type = Option<Vec<DisputeResponsePaymentsRetrieve>>)] pub disputes: Option<Vec<disputes::DisputeResponsePaymentsRetrieve>>, /// List of attempts that happened on this intent #[schema(value_type = Option<Vec<PaymentAttemptResponse>>)] #[serde(skip_serializing_if = "Option::is_none")] pub attempts: Option<Vec<PaymentAttemptResponse>>, /// List of captures done on latest attempt #[schema(value_type = Option<Vec<CaptureResponse>>)] #[serde(skip_serializing_if = "Option::is_none")] pub captures: Option<Vec<CaptureResponse>>, /// A unique identifier to link the payment to a mandate, can be used instead of payment_method_data, in case of setting up recurring payments #[schema(max_length = 255, example = "mandate_iwer89rnjef349dni3")] pub mandate_id: Option<String>, /// Provided mandate information for creating a mandate pub mandate_data: Option<MandateData>, /// Indicates that you intend to make future payments with this Payment’s payment method. Providing this parameter will attach the payment method to the Customer, if present, after the Payment is confirmed and any required actions from the user are complete. #[schema(value_type = Option<FutureUsage>, example = "off_session")] pub setup_future_usage: Option<api_enums::FutureUsage>, /// Set to true to indicate that the customer is not in your checkout flow during this payment, and therefore is unable to authenticate. This parameter is intended for scenarios where you collect card details and charge them later. This parameter can only be used with confirm=true. #[schema(example = true)] pub off_session: Option<bool>, /// A timestamp (ISO 8601 code) that determines when the payment should be captured. /// Providing this field will automatically set `capture` to true #[schema(example = "2022-09-10T10:11:12Z")] #[serde(with = "common_utils::custom_serde::iso8601::option")] #[remove_in(PaymentsCreateResponseOpenApi)] pub capture_on: Option<PrimitiveDateTime>, /// This is the instruction for capture/ debit the money from the users' card. On the other hand authorization refers to blocking the amount on the users' payment method. #[schema(value_type = Option<CaptureMethod>, example = "automatic")] pub capture_method: Option<api_enums::CaptureMethod>, /// The payment method that is to be used #[schema(value_type = PaymentMethod, example = "bank_transfer")] pub payment_method: Option<api_enums::PaymentMethod>, /// The payment method information provided for making a payment #[schema(value_type = Option<PaymentMethodDataResponseWithBilling>, example = "bank_transfer")] #[serde(serialize_with = "serialize_payment_method_data_response")] pub payment_method_data: Option<PaymentMethodDataResponseWithBilling>, /// Provide a reference to a stored payment method #[schema(example = "187282ab-40ef-47a9-9206-5099ba31e432")] pub payment_token: Option<String>, /// The shipping address for the payment pub shipping: Option<Address>, /// The billing address for the payment pub billing: Option<Address>, /// Information about the product , quantity and amount for connectors. (e.g. Klarna) #[schema(value_type = Option<Vec<OrderDetailsWithAmount>>, example = r#"[{ "product_name": "gillete creme", "quantity": 15, "amount" : 900 }]"#)] pub order_details: Option<Vec<pii::SecretSerdeValue>>, /// description: The customer's email address /// This field will be deprecated soon. Please refer to `customer.email` object #[schema(max_length = 255, value_type = Option<String>, example = "johntest@test.com", deprecated)] pub email: crypto::OptionalEncryptableEmail, /// description: The customer's name /// This field will be deprecated soon. Please refer to `customer.name` object #[schema(value_type = Option<String>, max_length = 255, example = "John Test", deprecated)] pub name: crypto::OptionalEncryptableName, /// The customer's phone number /// This field will be deprecated soon. Please refer to `customer.phone` object #[schema(value_type = Option<String>, max_length = 255, example = "9123456789", deprecated)] pub phone: crypto::OptionalEncryptablePhone, /// The URL to redirect after the completion of the operation #[schema(example = "https://hyperswitch.io")] pub return_url: Option<String>, /// The transaction authentication can be set to undergo payer authentication. By default, the authentication will be marked as NO_THREE_DS, as the 3DS method helps with more robust payer authentication #[schema(value_type = Option<AuthenticationType>, example = "no_three_ds", default = "three_ds")] pub authentication_type: Option<api_enums::AuthenticationType>, /// For non-card charges, you can use this value as the complete description that appears on your customers’ statements. Must contain at least one letter, maximum 22 characters. #[schema(max_length = 255, example = "Hyperswitch Router")] pub statement_descriptor_name: Option<String>, /// Provides information about a card payment that customers see on their statements. Concatenated with the prefix (shortened descriptor) or statement descriptor that’s set on the account to form the complete statement descriptor. Maximum 255 characters for the concatenated descriptor. #[schema(max_length = 255, example = "Payment for shoes purchase")] pub statement_descriptor_suffix: Option<String>, /// Additional information required for redirection pub next_action: Option<NextActionData>, /// If the payment was cancelled the reason will be provided here pub cancellation_reason: Option<String>, /// If there was an error while calling the connectors the code is received here #[schema(example = "E0001")] pub error_code: Option<String>, /// If there was an error while calling the connector the error message is received here #[schema(example = "Failed while verifying the card")] pub error_message: Option<String>, /// error code unified across the connectors is received here if there was an error while calling connector #[remove_in(PaymentsCreateResponseOpenApi)] pub unified_code: Option<String>, /// error message unified across the connectors is received here if there was an error while calling connector #[remove_in(PaymentsCreateResponseOpenApi)] pub unified_message: Option<String>, /// Payment Experience for the current payment #[schema(value_type = Option<PaymentExperience>, example = "redirect_to_url")] pub payment_experience: Option<api_enums::PaymentExperience>, /// Can be used to specify the Payment Method Type #[schema(value_type = Option<PaymentMethodType>, example = "gpay")] pub payment_method_type: Option<api_enums::PaymentMethodType>, /// The connector used for this payment along with the country and business details #[schema(example = "stripe_US_food")] pub connector_label: Option<String>, /// The business country of merchant for this payment #[schema(value_type = Option<CountryAlpha2>, example = "US")] pub business_country: Option<api_enums::CountryAlpha2>, /// The business label of merchant for this payment pub business_label: Option<String>, /// The business_sub_label for this payment pub business_sub_label: Option<String>, /// Allowed Payment Method Types for a given PaymentIntent #[schema(value_type = Option<Vec<PaymentMethodType>>)] pub allowed_payment_method_types: Option<serde_json::Value>, /// ephemeral_key for the customer_id mentioned pub ephemeral_key: Option<EphemeralKeyCreateResponse>, /// If true the payment can be retried with same or different payment method which means the confirm call can be made again. pub manual_retry_allowed: Option<bool>, /// A unique identifier for a payment provided by the connector #[schema(value_type = Option<String>, example = "993672945374576J")] pub connector_transaction_id: Option<String>, /// Frm message contains information about the frm response pub frm_message: Option<FrmMessage>, /// You can specify up to 50 keys, with key names up to 40 characters long and values up to 500 characters long. Metadata is useful for storing additional, structured information on an object. #[schema(value_type = Option<Object>, example = r#"{ "udf1": "some-value", "udf2": "some-value" }"#)] pub metadata: Option<serde_json::Value>, /// Additional data related to some connectors #[schema(value_type = Option<ConnectorMetadata>)] pub connector_metadata: Option<serde_json::Value>, // This is Value because it is fetched from DB and before putting in DB the type is validated /// Additional data that might be required by hyperswitch, to enable some specific features. #[schema(value_type = Option<FeatureMetadata>)] pub feature_metadata: Option<serde_json::Value>, // This is Value because it is fetched from DB and before putting in DB the type is validated /// reference(Identifier) to the payment at connector side #[schema(value_type = Option<String>, example = "993672945374576J")] pub reference_id: Option<String>, /// Details for Payment link pub payment_link: Option<PaymentLinkResponse>, /// The business profile that is associated with this payment #[schema(value_type = Option<String>)] pub profile_id: Option<id_type::ProfileId>, /// Details of surcharge applied on this payment pub surcharge_details: Option<RequestSurchargeDetails>, /// Total number of attempts associated with this payment pub attempt_count: i16, /// Denotes the action(approve or reject) taken by merchant in case of manual review. Manual review can occur when the transaction is marked as risky by the frm_processor, payment processor or when there is underpayment/over payment incase of crypto payment pub merchant_decision: Option<String>, /// Identifier of the connector ( merchant connector account ) which was chosen to make the payment #[schema(value_type = Option<String>)] pub merchant_connector_id: Option<id_type::MerchantConnectorAccountId>, /// If true, incremental authorization can be performed on this payment, in case the funds authorized initially fall short. pub incremental_authorization_allowed: Option<bool>, /// Total number of authorizations happened in an incremental_authorization payment pub authorization_count: Option<i32>, /// List of incremental authorizations happened to the payment pub incremental_authorizations: Option<Vec<IncrementalAuthorizationResponse>>, /// Details of external authentication pub external_authentication_details: Option<ExternalAuthenticationDetailsResponse>, /// Flag indicating if external 3ds authentication is made or not pub external_3ds_authentication_attempted: Option<bool>, /// Date Time for expiry of the payment #[schema(example = "2022-09-10T10:11:12Z")] #[serde(default, with = "common_utils::custom_serde::iso8601::option")] pub expires_on: Option<PrimitiveDateTime>, /// Payment Fingerprint, to identify a particular card. /// It is a 20 character long alphanumeric code. pub fingerprint: Option<String>, #[schema(value_type = Option<BrowserInformation>)] /// The browser information used for this payment pub browser_info: Option<serde_json::Value>, /// Identifier for Payment Method used for the payment pub payment_method_id: Option<String>, /// Payment Method Status, refers to the status of the payment method used for this payment. #[schema(value_type = Option<PaymentMethodStatus>)] pub payment_method_status: Option<common_enums::PaymentMethodStatus>, /// Date time at which payment was updated #[schema(example = "2022-09-10T10:11:12Z")] #[serde(default, with = "common_utils::custom_serde::iso8601::option")] pub updated: Option<PrimitiveDateTime>, /// Fee information to be charged on the payment being collected #[schema(value_type = Option<ConnectorChargeResponseData>)] pub split_payments: Option<common_types::payments::ConnectorChargeResponseData>, /// You can specify up to 50 keys, with key names up to 40 characters long and values up to 500 characters long. FRM Metadata is useful for storing additional, structured information on an object related to FRM. #[schema(value_type = Option<Object>, example = r#"{ "fulfillment_method" : "deliver", "coverage_request" : "fraud" }"#)] pub frm_metadata: Option<pii::SecretSerdeValue>, /// flag that indicates if extended authorization is applied on this payment or not #[schema(value_type = Option<bool>)] pub extended_authorization_applied: Option<ExtendedAuthorizationAppliedBool>, /// date and time after which this payment cannot be captured #[serde(default, with = "common_utils::custom_serde::iso8601::option")] pub capture_before: Option<PrimitiveDateTime>, /// Merchant's identifier for the payment/invoice. This will be sent to the connector /// if the connector provides support to accept multiple reference ids. /// In case the connector supports only one reference id, Hyperswitch's Payment ID will be sent as reference. #[schema( value_type = Option<String>, max_length = 255, example = "Custom_Order_id_123" )] pub merchant_order_reference_id: Option<String>, /// order tax amount calculated by tax connectors pub order_tax_amount: Option<MinorUnit>, /// Connector Identifier for the payment method pub connector_mandate_id: Option<String>, /// Method through which card was discovered #[schema(value_type = Option<CardDiscovery>, example = "manual")] pub card_discovery: Option<enums::CardDiscovery>, /// Indicates if 3ds challenge is forced pub force_3ds_challenge: Option<bool>, /// Indicates if 3ds challenge is triggered pub force_3ds_challenge_trigger: Option<bool>, /// Error code received from the issuer in case of failed payments pub issuer_error_code: Option<String>, /// Error message received from the issuer in case of failed payments pub issuer_error_message: Option<String>, }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/payments/helpers.rs<|crate|> router anchor=get_handle_response_url kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="3174" end="3194"> pub fn get_handle_response_url( payment_id: id_type::PaymentId, business_profile: &domain::Profile, response: &api::PaymentsResponse, connector: String, ) -> RouterResult<api::RedirectionResponse> { let payments_return_url = response.return_url.as_ref(); let redirection_response = make_pg_redirect_response(payment_id, response, connector); let return_url = make_merchant_url_with_response( business_profile, redirection_response, payments_return_url, response.client_secret.as_ref(), response.manual_retry_allowed, ) .attach_printable("Failed to make merchant url with response")?; make_url_with_signature(&return_url, business_profile) } <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="3173" end="3173"> utils::when(!(1..=PAYMENTS_LIST_MAX_LIMIT_V2).contains(&limit), || { Err(errors::ApiErrorResponse::InvalidRequestData { message: format!( "limit should be in between 1 and {}", PAYMENTS_LIST_MAX_LIMIT_V2 ), }) })?; Ok(()) } #[cfg(feature = "v1")] pub fn get_handle_response_url( payment_id: id_type::PaymentId, business_profile: &domain::Profile, response: &api::PaymentsResponse, connector: String, ) -> RouterResult<api::RedirectionResponse> { let payments_return_url = response.return_url.as_ref(); let redirection_response = make_pg_redirect_response(payment_id, response, connector); let return_url = make_merchant_url_with_response( business_profile, redirection_response, <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="3260" end="3280"> pub async fn make_ephemeral_key( state: SessionState, customer_id: id_type::CustomerId, merchant_id: id_type::MerchantId, ) -> errors::RouterResponse<ephemeral_key::EphemeralKey> { let store = &state.store; let id = utils::generate_id(consts::ID_LENGTH, "eki"); let secret = format!("epk_{}", &Uuid::new_v4().simple().to_string()); let ek = ephemeral_key::EphemeralKeyNew { id, customer_id, merchant_id: merchant_id.to_owned(), secret, }; let ek = store .create_ephemeral_key(ek, state.conf.eph_key.validity) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to create ephemeral key")?; Ok(services::ApplicationResponse::Json(ek)) } <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="3197" end="3257"> pub fn make_merchant_url_with_response( business_profile: &domain::Profile, redirection_response: api::PgRedirectResponse, request_return_url: Option<&String>, client_secret: Option<&masking::Secret<String>>, manual_retry_allowed: Option<bool>, ) -> RouterResult<String> { // take return url if provided in the request else use merchant return url let url = request_return_url .or(business_profile.return_url.as_ref()) .get_required_value("return_url")?; let status_check = redirection_response.status; let payment_client_secret = client_secret .ok_or(errors::ApiErrorResponse::InternalServerError) .attach_printable("Expected client secret to be `Some`")?; let payment_id = redirection_response.payment_id.get_string_repr().to_owned(); let merchant_url_with_response = if business_profile.redirect_to_merchant_with_http_post { url::Url::parse_with_params( url, &[ ("status", status_check.to_string()), ("payment_id", payment_id), ( "payment_intent_client_secret", payment_client_secret.peek().to_string(), ), ( "manual_retry_allowed", manual_retry_allowed.unwrap_or(false).to_string(), ), ], ) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to parse the url with param")? } else { let amount = redirection_response.amount.get_required_value("amount")?; url::Url::parse_with_params( url, &[ ("status", status_check.to_string()), ("payment_id", payment_id), ( "payment_intent_client_secret", payment_client_secret.peek().to_string(), ), ("amount", amount.to_string()), ( "manual_retry_allowed", manual_retry_allowed.unwrap_or(false).to_string(), ), ], ) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to parse the url with param")? }; Ok(merchant_url_with_response.to_string()) } <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="3157" end="3171"> pub(super) fn validate_payment_list_request_for_joins( limit: u32, ) -> CustomResult<(), errors::ApiErrorResponse> { use common_utils::consts::PAYMENTS_LIST_MAX_LIMIT_V2; utils::when(!(1..=PAYMENTS_LIST_MAX_LIMIT_V2).contains(&limit), || { Err(errors::ApiErrorResponse::InvalidRequestData { message: format!( "limit should be in between 1 and {}", PAYMENTS_LIST_MAX_LIMIT_V2 ), }) })?; Ok(()) } <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="3138" end="3155"> pub(super) fn validate_payment_list_request( req: &api::PaymentListConstraints, ) -> CustomResult<(), errors::ApiErrorResponse> { use common_utils::consts::PAYMENTS_LIST_MAX_LIMIT_V1; utils::when( req.limit > PAYMENTS_LIST_MAX_LIMIT_V1 || req.limit < 1, || { Err(errors::ApiErrorResponse::InvalidRequestData { message: format!( "limit should be in between 1 and {}", PAYMENTS_LIST_MAX_LIMIT_V1 ), }) }, )?; Ok(()) } <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="3388" end="3400"> pub fn make_pg_redirect_response( payment_id: id_type::PaymentId, response: &api::PaymentsResponse, connector: String, ) -> api::PgRedirectResponse { api::PgRedirectResponse { payment_id, status: response.status, gateway_id: connector, customer_id: response.customer_id.to_owned(), amount: Some(response.amount), } } <file_sep path="hyperswitch/crates/router/src/routes/app.rs" role="context" start="1906" end="1906"> pub struct Profile;
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/payment_methods/cards.rs<|crate|> router anchor=insert_payment_method kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="2048" end="2064"> pub async fn insert_payment_method( state: &routes::SessionState, resp: &api::PaymentMethodResponse, req: &api::PaymentMethodCreate, key_store: &domain::MerchantKeyStore, merchant_id: &id_type::MerchantId, customer_id: &id_type::CustomerId, pm_metadata: Option<serde_json::Value>, customer_acceptance: Option<serde_json::Value>, locker_id: Option<String>, connector_mandate_details: Option<serde_json::Value>, network_transaction_id: Option<String>, storage_scheme: MerchantStorageScheme, payment_method_billing_address: Option<Encryption>, ) -> errors::RouterResult<domain::PaymentMethod> { todo!() } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="2047" end="2047"> card.card_network .map(|card_network| card_network.to_string()) }), network_token_requestor_reference_id, network_token_locker_id, network_token_payment_method_data, ) .await } #[cfg(all(feature = "v2", feature = "payment_methods_v2"))] #[allow(clippy::too_many_arguments)] pub async fn insert_payment_method( state: &routes::SessionState, resp: &api::PaymentMethodResponse, req: &api::PaymentMethodCreate, key_store: &domain::MerchantKeyStore, merchant_id: &id_type::MerchantId, customer_id: &id_type::CustomerId, pm_metadata: Option<serde_json::Value>, customer_acceptance: Option<serde_json::Value>, locker_id: Option<String>, connector_mandate_details: Option<serde_json::Value>, network_transaction_id: Option<String>, storage_scheme: MerchantStorageScheme, <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="2299" end="2345"> pub fn validate_payment_method_update( card_updation_obj: CardDetailUpdate, existing_card_data: api::CardDetailFromLocker, ) -> bool { // Return true If any one of the below condition returns true, // If a field is not passed in the update request, return false. // If the field is present, it depends on the existing field data: // - If existing field data is not present, or if it is present and doesn't match // the update request data, then return true. // - Or else return false card_updation_obj .card_exp_month .map(|exp_month| exp_month.expose()) .is_some_and(|new_exp_month| { existing_card_data .expiry_month .map(|exp_month| exp_month.expose()) != Some(new_exp_month) }) || card_updation_obj .card_exp_year .map(|exp_year| exp_year.expose()) .is_some_and(|new_exp_year| { existing_card_data .expiry_year .map(|exp_year| exp_year.expose()) != Some(new_exp_year) }) || card_updation_obj .card_holder_name .map(|name| name.expose()) .is_some_and(|new_card_holder_name| { existing_card_data .card_holder_name .map(|name| name.expose()) != Some(new_card_holder_name) }) || card_updation_obj .nick_name .map(|nick_name| nick_name.expose()) .is_some_and(|new_nick_name| { existing_card_data .nick_name .map(|nick_name| nick_name.expose()) != Some(new_nick_name) }) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="2071" end="2293"> pub async fn update_customer_payment_method( state: routes::SessionState, merchant_account: domain::MerchantAccount, req: api::PaymentMethodUpdate, payment_method_id: &str, key_store: domain::MerchantKeyStore, ) -> errors::RouterResponse<api::PaymentMethodResponse> { // Currently update is supported only for cards if let Some(card_update) = req.card.clone() { let db = state.store.as_ref(); let pm = db .find_payment_method( &((&state).into()), &key_store, payment_method_id, merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::PaymentMethodNotFound)?; if let Some(cs) = &req.client_secret { let is_client_secret_expired = authenticate_pm_client_secret_and_check_expiry(cs, &pm)?; if is_client_secret_expired { return Err((errors::ApiErrorResponse::ClientSecretExpired).into()); }; }; if pm.status == enums::PaymentMethodStatus::AwaitingData { return Err(report!(errors::ApiErrorResponse::NotSupported { message: "Payment method is awaiting data so it cannot be updated".into() })); } if pm.payment_method_data.is_none() { return Err(report!(errors::ApiErrorResponse::GenericNotFoundError { message: "payment_method_data not found".to_string() })); } // Fetch the existing payment method data from db let existing_card_data = pm.payment_method_data .clone() .map(|x| x.into_inner().expose()) .map( |value| -> Result< PaymentMethodsData, error_stack::Report<errors::ApiErrorResponse>, > { value .parse_value::<PaymentMethodsData>("PaymentMethodsData") .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to deserialize payment methods data") }, ) .transpose()? .and_then(|pmd| match pmd { PaymentMethodsData::Card(crd) => Some(api::CardDetailFromLocker::from(crd)), _ => None, }) .ok_or(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to obtain decrypted card object from db")?; let is_card_updation_required = validate_payment_method_update(card_update.clone(), existing_card_data.clone()); let response = if is_card_updation_required { // Fetch the existing card data from locker for getting card number let card_data_from_locker = get_card_from_locker( &state, &pm.customer_id, &pm.merchant_id, pm.locker_id.as_ref().unwrap_or(&pm.payment_method_id), ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error getting card from locker")?; if card_update.card_exp_month.is_some() || card_update.card_exp_year.is_some() { helpers::validate_card_expiry( card_update .card_exp_month .as_ref() .unwrap_or(&card_data_from_locker.card_exp_month), card_update .card_exp_year .as_ref() .unwrap_or(&card_data_from_locker.card_exp_year), )?; } let updated_card_details = card_update.apply(card_data_from_locker.clone()); // Construct new payment method object from request let new_pm = api::PaymentMethodCreate { payment_method: pm.get_payment_method_type(), payment_method_type: pm.get_payment_method_subtype(), payment_method_issuer: pm.payment_method_issuer.clone(), payment_method_issuer_code: pm.payment_method_issuer_code, #[cfg(feature = "payouts")] bank_transfer: None, card: Some(updated_card_details.clone()), #[cfg(feature = "payouts")] wallet: None, metadata: None, customer_id: Some(pm.customer_id.clone()), client_secret: pm.client_secret.clone(), payment_method_data: None, card_network: None, billing: None, connector_mandate_details: None, network_transaction_id: None, }; new_pm.validate()?; // Delete old payment method from locker delete_card_from_locker( &state, &pm.customer_id, &pm.merchant_id, pm.locker_id.as_ref().unwrap_or(&pm.payment_method_id), ) .await?; // Add the updated payment method data to locker let (mut add_card_resp, _) = Box::pin(add_card_to_locker( &state, new_pm.clone(), &updated_card_details, &pm.customer_id, &merchant_account, Some(pm.locker_id.as_ref().unwrap_or(&pm.payment_method_id)), )) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to add updated payment method to locker")?; // Construct new updated card object. Consider a field if passed in request or else populate it with the existing value from existing_card_data let updated_card = Some(api::CardDetailFromLocker { scheme: existing_card_data.scheme, last4_digits: Some(card_data_from_locker.card_number.get_last4()), issuer_country: existing_card_data.issuer_country, card_number: existing_card_data.card_number, expiry_month: card_update .card_exp_month .or(existing_card_data.expiry_month), expiry_year: card_update.card_exp_year.or(existing_card_data.expiry_year), card_token: existing_card_data.card_token, card_fingerprint: existing_card_data.card_fingerprint, card_holder_name: card_update .card_holder_name .or(existing_card_data.card_holder_name), nick_name: card_update.nick_name.or(existing_card_data.nick_name), card_network: existing_card_data.card_network, card_isin: existing_card_data.card_isin, card_issuer: existing_card_data.card_issuer, card_type: existing_card_data.card_type, saved_to_locker: true, }); let updated_pmd = updated_card .as_ref() .map(|card| PaymentMethodsData::Card(CardDetailsPaymentMethod::from(card.clone()))); let key_manager_state = (&state).into(); let pm_data_encrypted: Option<Encryptable<Secret<serde_json::Value>>> = updated_pmd .async_map(|updated_pmd| { create_encrypted_data(&key_manager_state, &key_store, updated_pmd) }) .await .transpose() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to encrypt payment method data")?; let pm_update = storage::PaymentMethodUpdate::PaymentMethodDataUpdate { payment_method_data: pm_data_encrypted.map(Into::into), }; add_card_resp .payment_method_id .clone_from(&pm.payment_method_id); db.update_payment_method( &((&state).into()), &key_store, pm, pm_update, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to update payment method in db")?; add_card_resp } else { // Return existing payment method data as response without any changes api::PaymentMethodResponse { merchant_id: pm.merchant_id.to_owned(), customer_id: Some(pm.customer_id.clone()), payment_method_id: pm.payment_method_id.clone(), payment_method: pm.get_payment_method_type(), payment_method_type: pm.get_payment_method_subtype(), #[cfg(feature = "payouts")] bank_transfer: None, card: Some(existing_card_data), metadata: pm.metadata, created: Some(pm.created_at), recurring_enabled: false, installment_payment_enabled: false, payment_experience: Some(vec![api_models::enums::PaymentExperience::RedirectToUrl]), last_used_at: Some(common_utils::date_time::now()), client_secret: pm.client_secret.clone(), } }; Ok(services::ApplicationResponse::Json(response)) } else { Err(report!(errors::ApiErrorResponse::NotSupported { message: "Payment method update for the given payment method is not supported".into() })) } } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="1988" end="2044"> pub async fn insert_payment_method( state: &routes::SessionState, resp: &api::PaymentMethodResponse, req: &api::PaymentMethodCreate, key_store: &domain::MerchantKeyStore, merchant_id: &id_type::MerchantId, customer_id: &id_type::CustomerId, pm_metadata: Option<serde_json::Value>, customer_acceptance: Option<serde_json::Value>, locker_id: Option<String>, connector_mandate_details: Option<serde_json::Value>, network_transaction_id: Option<String>, storage_scheme: MerchantStorageScheme, payment_method_billing_address: crypto::OptionalEncryptableValue, network_token_requestor_reference_id: Option<String>, network_token_locker_id: Option<String>, network_token_payment_method_data: crypto::OptionalEncryptableValue, ) -> errors::RouterResult<domain::PaymentMethod> { let pm_card_details = resp .card .clone() .map(|card| PaymentMethodsData::Card(CardDetailsPaymentMethod::from(card.clone()))); let key_manager_state = state.into(); let pm_data_encrypted: crypto::OptionalEncryptableValue = pm_card_details .clone() .async_map(|pm_card| create_encrypted_data(&key_manager_state, key_store, pm_card)) .await .transpose() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to encrypt payment method data")?; create_payment_method( state, req, customer_id, &resp.payment_method_id, locker_id, merchant_id, pm_metadata, customer_acceptance, pm_data_encrypted, key_store, connector_mandate_details, None, network_transaction_id, storage_scheme, payment_method_billing_address, resp.card.clone().and_then(|card| { card.card_network .map(|card_network| card_network.to_string()) }), network_token_requestor_reference_id, network_token_locker_id, network_token_payment_method_data, ) .await } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="1712" end="1981"> pub async fn save_migration_payment_method( state: &routes::SessionState, req: api::PaymentMethodCreate, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, migration_status: &mut migration::RecordMigrationStatusBuilder, ) -> errors::RouterResponse<api::PaymentMethodResponse> { req.validate()?; let db = &*state.store; let merchant_id = merchant_account.get_id(); let customer_id = req.customer_id.clone().get_required_value("customer_id")?; let payment_method = req.payment_method.get_required_value("payment_method")?; let key_manager_state = state.into(); let payment_method_billing_address: Option<Encryptable<Secret<serde_json::Value>>> = req .billing .clone() .async_map(|billing| create_encrypted_data(&key_manager_state, key_store, billing)) .await .transpose() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to encrypt Payment method billing address")?; let connector_mandate_details = req .connector_mandate_details .clone() .map(serde_json::to_value) .transpose() .change_context(errors::ApiErrorResponse::InternalServerError)?; let network_transaction_id = req.network_transaction_id.clone(); let response = match payment_method { #[cfg(feature = "payouts")] api_enums::PaymentMethod::BankTransfer => match req.bank_transfer.clone() { Some(bank) => add_bank_to_locker( state, req.clone(), merchant_account, key_store, &bank, &customer_id, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Add PaymentMethod Failed"), _ => Ok(store_default_payment_method( &req, &customer_id, merchant_id, )), }, api_enums::PaymentMethod::Card => match req.card.clone() { Some(card) => { let mut card_details = card; card_details = helpers::populate_bin_details_for_payment_method_create( card_details.clone(), db, ) .await; migration::validate_card_expiry( &card_details.card_exp_month, &card_details.card_exp_year, )?; Box::pin(add_card_to_locker( state, req.clone(), &card_details, &customer_id, merchant_account, None, )) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Add Card Failed") } _ => Ok(store_default_payment_method( &req, &customer_id, merchant_id, )), }, _ => Ok(store_default_payment_method( &req, &customer_id, merchant_id, )), }; let (mut resp, duplication_check) = response?; migration_status.card_migrated(true); match duplication_check { Some(duplication_check) => match duplication_check { payment_methods::DataDuplicationCheck::Duplicated => { let existing_pm = get_or_insert_payment_method( state, req.clone(), &mut resp, merchant_account, &customer_id, key_store, ) .await?; resp.client_secret = existing_pm.client_secret; } payment_methods::DataDuplicationCheck::MetaDataChanged => { if let Some(card) = req.card.clone() { let existing_pm = get_or_insert_payment_method( state, req.clone(), &mut resp, merchant_account, &customer_id, key_store, ) .await?; let client_secret = existing_pm.client_secret.clone(); delete_card_from_locker( state, &customer_id, merchant_id, existing_pm .locker_id .as_ref() .unwrap_or(&existing_pm.payment_method_id), ) .await?; let add_card_resp = add_card_hs( state, req.clone(), &card, &customer_id, merchant_account, api::enums::LockerChoice::HyperswitchCardVault, Some( existing_pm .locker_id .as_ref() .unwrap_or(&existing_pm.payment_method_id), ), ) .await; if let Err(err) = add_card_resp { logger::error!(vault_err=?err); db.delete_payment_method_by_merchant_id_payment_method_id( &(state.into()), key_store, merchant_id, &resp.payment_method_id, ) .await .to_not_found_response(errors::ApiErrorResponse::PaymentMethodNotFound)?; Err(report!(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed while updating card metadata changes"))? }; let existing_pm_data = get_card_details_without_locker_fallback(&existing_pm, state).await?; let updated_card = Some(api::CardDetailFromLocker { scheme: existing_pm.scheme.clone(), last4_digits: Some(card.card_number.get_last4()), issuer_country: card .card_issuing_country .or(existing_pm_data.issuer_country), card_isin: Some(card.card_number.get_card_isin()), card_number: Some(card.card_number), expiry_month: Some(card.card_exp_month), expiry_year: Some(card.card_exp_year), card_token: None, card_fingerprint: None, card_holder_name: card .card_holder_name .or(existing_pm_data.card_holder_name), nick_name: card.nick_name.or(existing_pm_data.nick_name), card_network: card.card_network.or(existing_pm_data.card_network), card_issuer: card.card_issuer.or(existing_pm_data.card_issuer), card_type: card.card_type.or(existing_pm_data.card_type), saved_to_locker: true, }); let updated_pmd = updated_card.as_ref().map(|card| { PaymentMethodsData::Card(CardDetailsPaymentMethod::from(card.clone())) }); let pm_data_encrypted: Option<Encryptable<Secret<serde_json::Value>>> = updated_pmd .async_map(|updated_pmd| { create_encrypted_data(&key_manager_state, key_store, updated_pmd) }) .await .transpose() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to encrypt payment method data")?; let pm_update = storage::PaymentMethodUpdate::PaymentMethodDataUpdate { payment_method_data: pm_data_encrypted.map(Into::into), }; db.update_payment_method( &(state.into()), key_store, existing_pm, pm_update, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to add payment method in db")?; resp.client_secret = client_secret; } } }, None => { let pm_metadata = resp.metadata.as_ref().map(|data| data.peek()); let locker_id = if resp.payment_method == Some(api_enums::PaymentMethod::Card) || resp.payment_method == Some(api_enums::PaymentMethod::BankTransfer) { Some(resp.payment_method_id) } else { None }; resp.payment_method_id = generate_id(consts::ID_LENGTH, "pm"); let pm = insert_payment_method( state, &resp, &req, key_store, merchant_id, &customer_id, pm_metadata.cloned(), None, locker_id, connector_mandate_details.clone(), network_transaction_id.clone(), merchant_account.storage_scheme, payment_method_billing_address, None, None, None, ) .await?; resp.client_secret = pm.client_secret; } } migration_status.card_migrated(true); migration_status.network_transaction_id_migrated( network_transaction_id.and_then(|val| (!val.is_empty_after_trim()).then_some(true)), ); migration_status.connector_mandate_details_migrated( connector_mandate_details .and_then(|val| if val == json!({}) { None } else { Some(true) }) .or_else(|| { req.connector_mandate_details .and_then(|val| (!val.0.is_empty()).then_some(false)) }), ); Ok(services::ApplicationResponse::Json(resp)) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="284" end="362"> pub async fn get_or_insert_payment_method( state: &routes::SessionState, req: api::PaymentMethodCreate, resp: &mut api::PaymentMethodResponse, merchant_account: &domain::MerchantAccount, customer_id: &id_type::CustomerId, key_store: &domain::MerchantKeyStore, ) -> errors::RouterResult<domain::PaymentMethod> { let mut payment_method_id = resp.payment_method_id.clone(); let mut locker_id = None; let db = &*state.store; let key_manager_state = &(state.into()); let payment_method = { let existing_pm_by_pmid = db .find_payment_method( key_manager_state, key_store, &payment_method_id, merchant_account.storage_scheme, ) .await; if let Err(err) = existing_pm_by_pmid { if err.current_context().is_db_not_found() { locker_id = Some(payment_method_id.clone()); let existing_pm_by_locker_id = db .find_payment_method_by_locker_id( key_manager_state, key_store, &payment_method_id, merchant_account.storage_scheme, ) .await; match &existing_pm_by_locker_id { Ok(pm) => payment_method_id.clone_from(pm.get_id()), Err(_) => payment_method_id = generate_id(consts::ID_LENGTH, "pm"), }; existing_pm_by_locker_id } else { Err(err) } } else { existing_pm_by_pmid } }; payment_method_id.clone_into(&mut resp.payment_method_id); match payment_method { Ok(pm) => Ok(pm), Err(err) => { if err.current_context().is_db_not_found() { insert_payment_method( state, resp, &req, key_store, merchant_account.get_id(), customer_id, resp.metadata.clone().map(|val| val.expose()), None, locker_id, None, req.network_transaction_id.clone(), merchant_account.storage_scheme, None, None, None, None, ) .await } else { Err(err) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error while finding payment method") } } } } <file_sep path="hyperswitch/v2_compatible_migrations/2024-08-28-081721_add_v2_columns/up.sql" role="context" start="54" end="70"> ADD COLUMN redirection_data JSONB, ADD COLUMN connector_payment_data TEXT, ADD COLUMN connector_token_details JSONB; -- Change the type of the column from JSON to JSONB ALTER TABLE merchant_connector_account ADD COLUMN IF NOT EXISTS feature_metadata JSONB; ALTER TABLE payment_methods ADD COLUMN IF NOT EXISTS locker_fingerprint_id VARCHAR(64), ADD COLUMN IF NOT EXISTS payment_method_type_v2 VARCHAR(64), ADD COLUMN IF NOT EXISTS payment_method_subtype VARCHAR(64); ALTER TABLE refund ADD COLUMN IF NOT EXISTS id VARCHAR(64), ADD COLUMN IF NOT EXISTS merchant_reference_id VARCHAR(64), ADD COLUMN IF NOT EXISTS connector_id VARCHAR(64); <file_sep path="hyperswitch/crates/api_models/src/payment_methods.rs" role="context" start="1670" end="1670"> type Value = PaymentMethodListRequest;
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/admin.rs<|crate|> router anchor=create_and_insert_business_profile kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/admin.rs" role="context" start="3587" end="3609"> pub async fn create_and_insert_business_profile( state: &SessionState, request: api::ProfileCreate, merchant_account: domain::MerchantAccount, key_store: &domain::MerchantKeyStore, ) -> RouterResult<domain::Profile> { let business_profile_new = admin::create_profile_from_merchant_account(state, merchant_account, request, key_store) .await?; let profile_name = business_profile_new.profile_name.clone(); state .store .insert_business_profile(&state.into(), key_store, business_profile_new) .await .to_duplicate_response(errors::ApiErrorResponse::GenericDuplicateError { message: format!( "Business Profile with the profile_name {profile_name} already exists" ), }) .attach_printable("Failed to insert Business profile because of duplication error") } <file_sep path="hyperswitch/crates/router/src/core/admin.rs" role="context" start="3586" end="3586"> use api_models::{ admin::{self as admin_types}, enums as api_enums, routing as routing_types, }; use crate::{ consts, core::{ encryption::transfer_encryption_key, errors::{self, RouterResponse, RouterResult, StorageErrorExt}, payment_methods::{cards, transformers}, payments::helpers, pm_auth::helpers::PaymentAuthConnectorDataExt, routing, utils as core_utils, }, db::{AccountsStorageInterface, StorageInterface}, routes::{metrics, SessionState}, services::{ self, api::{self as service_api, client}, authentication, pm_auth as payment_initiation_service, }, types::{ self, api::{self, admin}, domain::{ self, types::{self as domain_types, AsyncLift}, }, storage::{self, enums::MerchantStorageScheme}, transformers::{ForeignInto, ForeignTryFrom, ForeignTryInto}, }, utils, }; <file_sep path="hyperswitch/crates/router/src/core/admin.rs" role="context" start="3822" end="3976"> async fn create_domain_model_from_request( self, state: &SessionState, key_store: &domain::MerchantKeyStore, merchant_id: &id_type::MerchantId, ) -> RouterResult<domain::Profile> { if let Some(session_expiry) = &self.session_expiry { helpers::validate_session_expiry(session_expiry.to_owned())?; } // Generate a unique profile id // TODO: the profile_id should be generated from the profile_name let profile_id = common_utils::generate_profile_id_of_default_length(); let profile_name = self.profile_name; let current_time = date_time::now(); let webhook_details = self.webhook_details.map(ForeignInto::foreign_into); let payment_response_hash_key = self .payment_response_hash_key .unwrap_or(common_utils::crypto::generate_cryptographically_secure_random_string(64)); let payment_link_config = self.payment_link_config.map(ForeignInto::foreign_into); let key_manager_state = state.into(); let outgoing_webhook_custom_http_headers = self .outgoing_webhook_custom_http_headers .async_map(|headers| { cards::create_encrypted_data(&key_manager_state, key_store, headers) }) .await .transpose() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to encrypt outgoing webhook custom HTTP headers")?; let payout_link_config = self .payout_link_config .map(|payout_conf| match payout_conf.config.validate() { Ok(_) => Ok(payout_conf.foreign_into()), Err(e) => Err(error_stack::report!( errors::ApiErrorResponse::InvalidRequestData { message: e.to_string() } )), }) .transpose()?; let key = key_store.key.clone().into_inner(); let key_manager_state = state.into(); let card_testing_secret_key = Some(Secret::new(utils::generate_id( consts::FINGERPRINT_SECRET_LENGTH, "fs", ))); let card_testing_guard_config = match self.card_testing_guard_config { Some(card_testing_guard_config) => Some(CardTestingGuardConfig::foreign_from( card_testing_guard_config, )), None => Some(CardTestingGuardConfig { is_card_ip_blocking_enabled: common_utils::consts::DEFAULT_CARD_IP_BLOCKING_STATUS, card_ip_blocking_threshold: common_utils::consts::DEFAULT_CARD_IP_BLOCKING_THRESHOLD, is_guest_user_card_blocking_enabled: common_utils::consts::DEFAULT_GUEST_USER_CARD_BLOCKING_STATUS, guest_user_card_blocking_threshold: common_utils::consts::DEFAULT_GUEST_USER_CARD_BLOCKING_THRESHOLD, is_customer_id_blocking_enabled: common_utils::consts::DEFAULT_CUSTOMER_ID_BLOCKING_STATUS, customer_id_blocking_threshold: common_utils::consts::DEFAULT_CUSTOMER_ID_BLOCKING_THRESHOLD, card_testing_guard_expiry: common_utils::consts::DEFAULT_CARD_TESTING_GUARD_EXPIRY_IN_SECS, }), }; Ok(domain::Profile::from(domain::ProfileSetter { id: profile_id, merchant_id: merchant_id.clone(), profile_name, created_at: current_time, modified_at: current_time, return_url: self.return_url, enable_payment_response_hash: self.enable_payment_response_hash.unwrap_or(true), payment_response_hash_key: Some(payment_response_hash_key), redirect_to_merchant_with_http_post: self .redirect_to_merchant_with_http_post .unwrap_or(true), webhook_details, metadata: self.metadata, is_recon_enabled: false, applepay_verified_domains: self.applepay_verified_domains, payment_link_config, session_expiry: self .session_expiry .map(i64::from) .or(Some(common_utils::consts::DEFAULT_SESSION_EXPIRY)), authentication_connector_details: self .authentication_connector_details .map(ForeignInto::foreign_into), payout_link_config, is_connector_agnostic_mit_enabled: self.is_connector_agnostic_mit_enabled, is_extended_card_info_enabled: None, extended_card_info_config: None, use_billing_as_payment_method_billing: self .use_billing_as_payment_method_billing .or(Some(true)), collect_shipping_details_from_wallet_connector: self .collect_shipping_details_from_wallet_connector_if_required .or(Some(false)), collect_billing_details_from_wallet_connector: self .collect_billing_details_from_wallet_connector_if_required .or(Some(false)), outgoing_webhook_custom_http_headers, always_collect_billing_details_from_wallet_connector: self .always_collect_billing_details_from_wallet_connector, always_collect_shipping_details_from_wallet_connector: self .always_collect_shipping_details_from_wallet_connector, routing_algorithm_id: None, frm_routing_algorithm_id: None, payout_routing_algorithm_id: None, order_fulfillment_time: self .order_fulfillment_time .map(|order_fulfillment_time| order_fulfillment_time.into_inner()) .or(Some(common_utils::consts::DEFAULT_ORDER_FULFILLMENT_TIME)), order_fulfillment_time_origin: self.order_fulfillment_time_origin, default_fallback_routing: None, should_collect_cvv_during_payment: None, tax_connector_id: self.tax_connector_id, is_tax_connector_enabled: self.is_tax_connector_enabled, is_network_tokenization_enabled: self.is_network_tokenization_enabled, is_click_to_pay_enabled: self.is_click_to_pay_enabled, authentication_product_ids: self.authentication_product_ids, three_ds_decision_manager_config: None, card_testing_guard_config, card_testing_secret_key: card_testing_secret_key .async_lift(|inner| async { domain_types::crypto_operation( &key_manager_state, common_utils::type_name!(domain::Profile), domain_types::CryptoOperation::EncryptOptional(inner), km_types::Identifier::Merchant(key_store.merchant_id.clone()), key.peek(), ) .await .and_then(|val| val.try_into_optionaloperation()) }) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("error while generating card testing secret key")?, is_clear_pan_retries_enabled: self.is_clear_pan_retries_enabled.unwrap_or_default(), is_debit_routing_enabled: self.is_debit_routing_enabled.unwrap_or_default(), merchant_business_country: self.merchant_business_country, })) } <file_sep path="hyperswitch/crates/router/src/core/admin.rs" role="context" start="3635" end="3819"> async fn create_domain_model_from_request( self, state: &SessionState, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, ) -> RouterResult<domain::Profile> { use common_utils::ext_traits::AsyncExt; if let Some(session_expiry) = &self.session_expiry { helpers::validate_session_expiry(session_expiry.to_owned())?; } if let Some(intent_fulfillment_expiry) = self.intent_fulfillment_time { helpers::validate_intent_fulfillment_expiry(intent_fulfillment_expiry)?; } if let Some(ref routing_algorithm) = self.routing_algorithm { let _: api_models::routing::RoutingAlgorithm = routing_algorithm .clone() .parse_value("RoutingAlgorithm") .change_context(errors::ApiErrorResponse::InvalidDataValue { field_name: "routing_algorithm", }) .attach_printable("Invalid routing algorithm given")?; } // Generate a unique profile id let profile_id = common_utils::generate_profile_id_of_default_length(); let profile_name = self.profile_name.unwrap_or("default".to_string()); let current_time = date_time::now(); let webhook_details = self.webhook_details.map(ForeignInto::foreign_into); let payment_response_hash_key = self .payment_response_hash_key .or(merchant_account.payment_response_hash_key.clone()) .unwrap_or(common_utils::crypto::generate_cryptographically_secure_random_string(64)); let payment_link_config = self.payment_link_config.map(ForeignInto::foreign_into); let key_manager_state = state.into(); let outgoing_webhook_custom_http_headers = self .outgoing_webhook_custom_http_headers .async_map(|headers| { cards::create_encrypted_data(&key_manager_state, key_store, headers) }) .await .transpose() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to encrypt outgoing webhook custom HTTP headers")?; let payout_link_config = self .payout_link_config .map(|payout_conf| match payout_conf.config.validate() { Ok(_) => Ok(payout_conf.foreign_into()), Err(e) => Err(error_stack::report!( errors::ApiErrorResponse::InvalidRequestData { message: e.to_string() } )), }) .transpose()?; let key = key_store.key.clone().into_inner(); let key_manager_state = state.into(); let card_testing_secret_key = Some(Secret::new(utils::generate_id( consts::FINGERPRINT_SECRET_LENGTH, "fs", ))); let card_testing_guard_config = match self.card_testing_guard_config { Some(card_testing_guard_config) => Some(CardTestingGuardConfig::foreign_from( card_testing_guard_config, )), None => Some(CardTestingGuardConfig { is_card_ip_blocking_enabled: common_utils::consts::DEFAULT_CARD_IP_BLOCKING_STATUS, card_ip_blocking_threshold: common_utils::consts::DEFAULT_CARD_IP_BLOCKING_THRESHOLD, is_guest_user_card_blocking_enabled: common_utils::consts::DEFAULT_GUEST_USER_CARD_BLOCKING_STATUS, guest_user_card_blocking_threshold: common_utils::consts::DEFAULT_GUEST_USER_CARD_BLOCKING_THRESHOLD, is_customer_id_blocking_enabled: common_utils::consts::DEFAULT_CUSTOMER_ID_BLOCKING_STATUS, customer_id_blocking_threshold: common_utils::consts::DEFAULT_CUSTOMER_ID_BLOCKING_THRESHOLD, card_testing_guard_expiry: common_utils::consts::DEFAULT_CARD_TESTING_GUARD_EXPIRY_IN_SECS, }), }; Ok(domain::Profile::from(domain::ProfileSetter { profile_id, merchant_id: merchant_account.get_id().clone(), profile_name, created_at: current_time, modified_at: current_time, return_url: self .return_url .map(|return_url| return_url.to_string()) .or(merchant_account.return_url.clone()), enable_payment_response_hash: self .enable_payment_response_hash .unwrap_or(merchant_account.enable_payment_response_hash), payment_response_hash_key: Some(payment_response_hash_key), redirect_to_merchant_with_http_post: self .redirect_to_merchant_with_http_post .unwrap_or(merchant_account.redirect_to_merchant_with_http_post), webhook_details: webhook_details.or(merchant_account.webhook_details.clone()), metadata: self.metadata, routing_algorithm: None, intent_fulfillment_time: self .intent_fulfillment_time .map(i64::from) .or(merchant_account.intent_fulfillment_time) .or(Some(common_utils::consts::DEFAULT_INTENT_FULFILLMENT_TIME)), frm_routing_algorithm: self .frm_routing_algorithm .or(merchant_account.frm_routing_algorithm.clone()), #[cfg(feature = "payouts")] payout_routing_algorithm: self .payout_routing_algorithm .or(merchant_account.payout_routing_algorithm.clone()), #[cfg(not(feature = "payouts"))] payout_routing_algorithm: None, is_recon_enabled: merchant_account.is_recon_enabled, applepay_verified_domains: self.applepay_verified_domains, payment_link_config, session_expiry: self .session_expiry .map(i64::from) .or(Some(common_utils::consts::DEFAULT_SESSION_EXPIRY)), authentication_connector_details: self .authentication_connector_details .map(ForeignInto::foreign_into), payout_link_config, is_connector_agnostic_mit_enabled: self.is_connector_agnostic_mit_enabled, is_extended_card_info_enabled: None, extended_card_info_config: None, use_billing_as_payment_method_billing: self .use_billing_as_payment_method_billing .or(Some(true)), collect_shipping_details_from_wallet_connector: self .collect_shipping_details_from_wallet_connector .or(Some(false)), collect_billing_details_from_wallet_connector: self .collect_billing_details_from_wallet_connector .or(Some(false)), outgoing_webhook_custom_http_headers, tax_connector_id: self.tax_connector_id, is_tax_connector_enabled: self.is_tax_connector_enabled, always_collect_billing_details_from_wallet_connector: self .always_collect_billing_details_from_wallet_connector, always_collect_shipping_details_from_wallet_connector: self .always_collect_shipping_details_from_wallet_connector, dynamic_routing_algorithm: None, is_network_tokenization_enabled: self.is_network_tokenization_enabled, is_auto_retries_enabled: self.is_auto_retries_enabled.unwrap_or_default(), max_auto_retries_enabled: self.max_auto_retries_enabled.map(i16::from), always_request_extended_authorization: self.always_request_extended_authorization, is_click_to_pay_enabled: self.is_click_to_pay_enabled, authentication_product_ids: self.authentication_product_ids, card_testing_guard_config, card_testing_secret_key: card_testing_secret_key .async_lift(|inner| async { domain_types::crypto_operation( &key_manager_state, common_utils::type_name!(domain::Profile), domain_types::CryptoOperation::EncryptOptional(inner), km_types::Identifier::Merchant(key_store.merchant_id.clone()), key.peek(), ) .await .and_then(|val| val.try_into_optionaloperation()) }) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("error while generating card testing secret key")?, is_clear_pan_retries_enabled: self.is_clear_pan_retries_enabled.unwrap_or_default(), force_3ds_challenge: self.force_3ds_challenge.unwrap_or_default(), is_debit_routing_enabled: self.is_debit_routing_enabled.unwrap_or_default(), merchant_business_country: self.merchant_business_country, })) } <file_sep path="hyperswitch/crates/router/src/core/admin.rs" role="context" start="3565" end="3584"> pub fn get_frm_config_as_secret( frm_configs: Option<Vec<api_models::admin::FrmConfigs>>, ) -> Option<Vec<Secret<serde_json::Value>>> { match frm_configs.as_ref() { Some(frm_value) => { let configs_for_frm_value: Vec<Secret<serde_json::Value>> = frm_value .iter() .map(|config| { config .encode_to_value() .change_context(errors::ApiErrorResponse::ConfigNotFound) .map(Secret::new) }) .collect::<Result<Vec<_>, _>>() .ok()?; Some(configs_for_frm_value) } None => None, } } <file_sep path="hyperswitch/crates/router/src/core/admin.rs" role="context" start="3531" end="3563"> pub async fn check_merchant_account_kv_status( state: SessionState, merchant_id: id_type::MerchantId, ) -> RouterResponse<api_models::admin::ToggleKVResponse> { let db = state.store.as_ref(); let key_manager_state = &(&state).into(); let key_store = db .get_merchant_key_store_by_merchant_id( key_manager_state, &merchant_id, &db.get_master_key().to_vec().into(), ) .await .to_not_found_response(errors::ApiErrorResponse::MerchantAccountNotFound)?; // check if the merchant account exists let merchant_account = db .find_merchant_account_by_merchant_id(key_manager_state, &merchant_id, &key_store) .await .to_not_found_response(errors::ApiErrorResponse::MerchantAccountNotFound)?; let kv_status = matches!( merchant_account.storage_scheme, MerchantStorageScheme::RedisKv ); Ok(service_api::ApplicationResponse::Json( api_models::admin::ToggleKVResponse { merchant_id: merchant_account.get_id().to_owned(), kv_enabled: kv_status, }, )) } <file_sep path="hyperswitch/crates/router/src/core/admin.rs" role="context" start="566" end="601"> async fn create_profiles_for_each_business_details( state: &SessionState, merchant_account: domain::MerchantAccount, primary_business_details: &Vec<admin_types::PrimaryBusinessDetails>, key_store: &domain::MerchantKeyStore, ) -> RouterResult<Vec<domain::Profile>> { let mut business_profiles_vector = Vec::with_capacity(primary_business_details.len()); // This must ideally be run in a transaction, // if there is an error in inserting some profile, because of unique constraints // the whole query must be rolled back for business_profile in primary_business_details { let profile_name = format!("{}_{}", business_profile.country, business_profile.business); let profile_create_request = api_models::admin::ProfileCreate { profile_name: Some(profile_name), ..Default::default() }; create_and_insert_business_profile( state, profile_create_request, merchant_account.clone(), key_store, ) .await .map_err(|profile_insert_error| { crate::logger::warn!("Profile already exists {profile_insert_error:?}"); }) .map(|business_profile| business_profiles_vector.push(business_profile)) .ok(); } Ok(business_profiles_vector) } <file_sep path="hyperswitch/crates/router/src/core/admin.rs" role="context" start="546" end="561"> async fn create_default_business_profile( &self, state: &SessionState, merchant_account: domain::MerchantAccount, key_store: &domain::MerchantKeyStore, ) -> RouterResult<domain::Profile> { let business_profile = create_and_insert_business_profile( state, api_models::admin::ProfileCreate::default(), merchant_account.clone(), key_store, ) .await?; Ok(business_profile) } <file_sep path="hyperswitch/crates/router/src/routes/app.rs" role="context" start="1906" end="1906"> pub struct Profile; <file_sep path="hyperswitch/v2_compatible_migrations/2024-08-28-081757_drop_not_null_constraints_on_v1_columns/up.sql" role="context" start="5" end="21"> ALTER COLUMN org_id DROP NOT NULL; -- Create index on org_id in organization table -- This is done to mullify the effects of droping primary key for v1 CREATE INDEX idx_organization_org_id ON organization (org_id); ------------------------ Merchant Account ------------------- -- Drop not null in merchant_account table for v1 columns that are dropped in v2 ALTER TABLE merchant_account DROP CONSTRAINT merchant_account_pkey, ALTER COLUMN merchant_id DROP NOT NULL, ALTER COLUMN primary_business_details DROP NOT NULL, ALTER COLUMN is_recon_enabled DROP NOT NULL; -- This is done to mullify the effects of droping primary key for v1 CREATE INDEX idx_merchant_account_merchant_id ON merchant_account (merchant_id); <file_sep path="hyperswitch/crates/api_models/src/errors/types.rs" role="context" start="86" end="100"> pub enum ApiErrorResponse { Unauthorized(ApiError), ForbiddenCommonResource(ApiError), ForbiddenPrivateResource(ApiError), Conflict(ApiError), Gone(ApiError), Unprocessable(ApiError), InternalServerError(ApiError), NotImplemented(ApiError), ConnectorError(ApiError, #[serde(skip_serializing)] StatusCode), NotFound(ApiError), MethodNotAllowed(ApiError), BadRequest(ApiError), DomainError(ApiError), }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/payments.rs<|crate|> router anchor=is_payment_method_tokenization_enabled_for_connector kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/payments.rs" role="context" start="4742" end="4768"> fn is_payment_method_tokenization_enabled_for_connector( state: &SessionState, connector_name: &str, payment_method: storage::enums::PaymentMethod, payment_method_type: Option<storage::enums::PaymentMethodType>, apple_pay_flow: &Option<domain::ApplePayFlow>, ) -> RouterResult<bool> { let connector_tokenization_filter = state.conf.tokenization.0.get(connector_name); Ok(connector_tokenization_filter .map(|connector_filter| { connector_filter .payment_method .clone() .contains(&payment_method) && is_payment_method_type_allowed_for_connector( payment_method_type, connector_filter.payment_method_type.clone(), ) && is_apple_pay_pre_decrypt_type_connector_tokenization( payment_method_type, apple_pay_flow, connector_filter.apple_pay_pre_decrypt_flow.clone(), ) }) .unwrap_or(false)) } <file_sep path="hyperswitch/crates/router/src/core/payments.rs" role="context" start="4741" end="4741"> use api_models::{ self, enums, mandates::RecurringDetails, payments::{self as payments_api}, }; pub use common_enums::enums::CallConnectorAction; use crate::{ configs::settings::{ApplePayPreDecryptFlow, PaymentMethodTypeTokenFilter}, connector::utils::missing_field_err, consts, core::{ errors::{self, CustomResult, RouterResponse, RouterResult}, payment_methods::{cards, network_tokenization}, payouts, routing::{self as core_routing}, utils::{self as core_utils}, }, db::StorageInterface, logger, routes::{app::ReqState, metrics, payment_methods::ParentPaymentMethodToken, SessionState}, services::{self, api::Authenticate, ConnectorRedirectResponse}, types::{ self as router_types, api::{self, ConnectorCallType, ConnectorCommon}, domain, storage::{self, enums as storage_enums, payment_attempt::PaymentAttemptExt}, transformers::ForeignTryInto, }, utils::{ self, add_apple_pay_flow_metrics, add_connector_http_status_code_metrics, Encode, OptionExt, ValueExt, }, workflows::payment_sync, }; <file_sep path="hyperswitch/crates/router/src/core/payments.rs" role="context" start="4787" end="4798"> fn decide_apple_pay_flow( state: &SessionState, payment_method_type: Option<enums::PaymentMethodType>, merchant_connector_account: Option<&helpers::MerchantConnectorAccountType>, ) -> Option<domain::ApplePayFlow> { payment_method_type.and_then(|pmt| match pmt { enums::PaymentMethodType::ApplePay => { check_apple_pay_metadata(state, merchant_connector_account) } _ => None, }) } <file_sep path="hyperswitch/crates/router/src/core/payments.rs" role="context" start="4770" end="4785"> fn is_apple_pay_pre_decrypt_type_connector_tokenization( payment_method_type: Option<storage::enums::PaymentMethodType>, apple_pay_flow: &Option<domain::ApplePayFlow>, apple_pay_pre_decrypt_flow_filter: Option<ApplePayPreDecryptFlow>, ) -> bool { match (payment_method_type, apple_pay_flow) { ( Some(storage::enums::PaymentMethodType::ApplePay), Some(domain::ApplePayFlow::Simplified(_)), ) => !matches!( apple_pay_pre_decrypt_flow_filter, Some(ApplePayPreDecryptFlow::NetworkTokenization) ), _ => true, } } <file_sep path="hyperswitch/crates/router/src/core/payments.rs" role="context" start="4703" end="4740"> pub async fn construct_profile_id_and_get_mca<'a, F, D>( state: &'a SessionState, merchant_account: &domain::MerchantAccount, payment_data: &D, connector_name: &str, merchant_connector_id: Option<&id_type::MerchantConnectorAccountId>, key_store: &domain::MerchantKeyStore, _should_validate: bool, ) -> RouterResult<helpers::MerchantConnectorAccountType> where F: Clone, D: OperationSessionGetters<F> + Send + Sync + Clone, { let profile_id = payment_data .get_payment_intent() .profile_id .as_ref() .get_required_value("profile_id") .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("profile_id is not set in payment_intent")? .clone(); #[cfg(feature = "v2")] let profile_id = payment_data.get_payment_intent().profile_id.clone(); let merchant_connector_account = helpers::get_merchant_connector_account( state, merchant_account.get_id(), payment_data.get_creds_identifier(), key_store, &profile_id, connector_name, merchant_connector_id, ) .await?; Ok(merchant_connector_account) } <file_sep path="hyperswitch/crates/router/src/core/payments.rs" role="context" start="4697" end="4699"> pub fn is_preprocessing_required_for_wallets(connector_name: String) -> bool { connector_name == *"trustpay" || connector_name == *"payme" } <file_sep path="hyperswitch/crates/router/src/core/payments.rs" role="context" start="5102" end="5244"> pub async fn get_connector_tokenization_action_when_confirm_true<F, Req, D>( state: &SessionState, operation: &BoxedOperation<'_, F, Req, D>, payment_data: &mut D, validate_result: &operations::ValidateResult, merchant_connector_account: &helpers::MerchantConnectorAccountType, merchant_key_store: &domain::MerchantKeyStore, customer: &Option<domain::Customer>, business_profile: &domain::Profile, should_retry_with_pan: bool, ) -> RouterResult<(D, TokenizationAction)> where F: Send + Clone, D: OperationSessionGetters<F> + OperationSessionSetters<F> + Send + Sync + Clone, { let connector = payment_data.get_payment_attempt().connector.to_owned(); let is_mandate = payment_data .get_mandate_id() .as_ref() .and_then(|inner| inner.mandate_reference_id.as_ref()) .map(|mandate_reference| match mandate_reference { api_models::payments::MandateReferenceId::ConnectorMandateId(_) => true, api_models::payments::MandateReferenceId::NetworkMandateId(_) | api_models::payments::MandateReferenceId::NetworkTokenWithNTI(_) => false, }) .unwrap_or(false); let payment_data_and_tokenization_action = match connector { Some(_) if is_mandate => ( payment_data.to_owned(), TokenizationAction::SkipConnectorTokenization, ), Some(connector) if is_operation_confirm(&operation) => { let payment_method = payment_data .get_payment_attempt() .payment_method .get_required_value("payment_method")?; let payment_method_type = payment_data.get_payment_attempt().payment_method_type; let apple_pay_flow = decide_apple_pay_flow(state, payment_method_type, Some(merchant_connector_account)); let is_connector_tokenization_enabled = is_payment_method_tokenization_enabled_for_connector( state, &connector, payment_method, payment_method_type, &apple_pay_flow, )?; add_apple_pay_flow_metrics( &apple_pay_flow, payment_data.get_payment_attempt().connector.clone(), payment_data.get_payment_attempt().merchant_id.clone(), ); let payment_method_action = decide_payment_method_tokenize_action( state, &connector, payment_method, payment_data.get_token(), is_connector_tokenization_enabled, apple_pay_flow, payment_method_type, merchant_connector_account, ) .await?; let connector_tokenization_action = match payment_method_action { TokenizationAction::TokenizeInRouter => { let (_operation, payment_method_data, pm_id) = operation .to_domain()? .make_pm_data( state, payment_data, validate_result.storage_scheme, merchant_key_store, customer, business_profile, should_retry_with_pan, ) .await?; payment_data.set_payment_method_data(payment_method_data); payment_data.set_payment_method_id_in_attempt(pm_id); TokenizationAction::SkipConnectorTokenization } TokenizationAction::TokenizeInConnector => TokenizationAction::TokenizeInConnector, TokenizationAction::TokenizeInConnectorAndRouter => { let (_operation, payment_method_data, pm_id) = operation .to_domain()? .make_pm_data( state, payment_data, validate_result.storage_scheme, merchant_key_store, customer, business_profile, should_retry_with_pan, ) .await?; payment_data.set_payment_method_data(payment_method_data); payment_data.set_payment_method_id_in_attempt(pm_id); TokenizationAction::TokenizeInConnector } TokenizationAction::ConnectorToken(token) => { payment_data.set_pm_token(token); TokenizationAction::SkipConnectorTokenization } TokenizationAction::SkipConnectorTokenization => { TokenizationAction::SkipConnectorTokenization } TokenizationAction::DecryptApplePayToken(payment_processing_details) => { TokenizationAction::DecryptApplePayToken(payment_processing_details) } TokenizationAction::TokenizeInConnectorAndApplepayPreDecrypt( payment_processing_details, ) => TokenizationAction::TokenizeInConnectorAndApplepayPreDecrypt( payment_processing_details, ), TokenizationAction::DecryptPazeToken(paze_payment_processing_details) => { TokenizationAction::DecryptPazeToken(paze_payment_processing_details) } TokenizationAction::DecryptGooglePayToken( google_pay_payment_processing_details, ) => { TokenizationAction::DecryptGooglePayToken(google_pay_payment_processing_details) } }; (payment_data.to_owned(), connector_tokenization_action) } _ => ( payment_data.to_owned(), TokenizationAction::SkipConnectorTokenization, ), }; Ok(payment_data_and_tokenization_action) } <file_sep path="hyperswitch/crates/router/src/core/payments.rs" role="context" start="4941" end="4953"> fn is_payment_method_type_allowed_for_connector( current_pm_type: Option<storage::enums::PaymentMethodType>, pm_type_filter: Option<PaymentMethodTypeTokenFilter>, ) -> bool { match (current_pm_type).zip(pm_type_filter) { Some((pm_type, type_filter)) => match type_filter { PaymentMethodTypeTokenFilter::AllAccepted => true, PaymentMethodTypeTokenFilter::EnableOnly(enabled) => enabled.contains(&pm_type), PaymentMethodTypeTokenFilter::DisableOnly(disabled) => !disabled.contains(&pm_type), }, None => true, // Allow all types if payment_method_type is not present } } <file_sep path="hyperswitch/v2_compatible_migrations/2024-08-28-081721_add_v2_columns/up.sql" role="context" start="54" end="70"> ADD COLUMN redirection_data JSONB, ADD COLUMN connector_payment_data TEXT, ADD COLUMN connector_token_details JSONB; -- Change the type of the column from JSON to JSONB ALTER TABLE merchant_connector_account ADD COLUMN IF NOT EXISTS feature_metadata JSONB; ALTER TABLE payment_methods ADD COLUMN IF NOT EXISTS locker_fingerprint_id VARCHAR(64), ADD COLUMN IF NOT EXISTS payment_method_type_v2 VARCHAR(64), ADD COLUMN IF NOT EXISTS payment_method_subtype VARCHAR(64); ALTER TABLE refund ADD COLUMN IF NOT EXISTS id VARCHAR(64), ADD COLUMN IF NOT EXISTS merchant_reference_id VARCHAR(64), ADD COLUMN IF NOT EXISTS connector_id VARCHAR(64); <file_sep path="hyperswitch/postman/collection-dir/powertranz/Flow Testcases/Happy Cases/Scenario1-Create payment with confirm true/Payments - Create/event.test.js" role="context" start="61" end="78"> "INFO - Unable to assign variable {{client_secret}}, as jsonData.client_secret is undefined.", ); } // Response body should have value "succeeded" for "status" if (jsonData?.status) { pm.test( "[POST]::/payments - Content check if value for 'status' matches 'succeeded'", function () { pm.expect(jsonData.status).to.eql("succeeded"); }, ); }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/payment_methods/cards.rs<|crate|> router anchor=authenticate_pm_client_secret_and_check_expiry kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="1215" end="1240"> pub fn authenticate_pm_client_secret_and_check_expiry( req_client_secret: &String, payment_method: &domain::PaymentMethod, ) -> errors::CustomResult<bool, errors::ApiErrorResponse> { let stored_client_secret = payment_method .client_secret .clone() .get_required_value("client_secret") .change_context(errors::ApiErrorResponse::MissingRequiredField { field_name: "client_secret", }) .attach_printable("client secret not found in db")?; if req_client_secret != &stored_client_secret { Err((errors::ApiErrorResponse::ClientSecretInvalid).into()) } else { let current_timestamp = common_utils::date_time::now(); let session_expiry = payment_method .created_at .saturating_add(time::Duration::seconds(consts::DEFAULT_SESSION_EXPIRY)); let expired = current_timestamp > session_expiry; Ok(expired) } } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="1214" end="1214"> .attach_printable( "Failed to add payment method status update task in process tracker", )?; } Ok(services::api::ApplicationResponse::Json( api::PaymentMethodResponse::foreign_from((None, res)), )) } } #[instrument(skip_all)] pub fn authenticate_pm_client_secret_and_check_expiry( req_client_secret: &String, payment_method: &domain::PaymentMethod, ) -> errors::CustomResult<bool, errors::ApiErrorResponse> { let stored_client_secret = payment_method .client_secret .clone() .get_required_value("client_secret") .change_context(errors::ApiErrorResponse::MissingRequiredField { field_name: "client_secret", }) .attach_printable("client secret not found in db")?; <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="1454" end="1705"> pub async fn add_payment_method( state: &routes::SessionState, req: api::PaymentMethodCreate, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, ) -> errors::RouterResponse<api::PaymentMethodResponse> { req.validate()?; let db = &*state.store; let merchant_id = merchant_account.get_id(); let customer_id = req.customer_id.clone().get_required_value("customer_id")?; let payment_method = req.payment_method.get_required_value("payment_method")?; let key_manager_state = state.into(); let payment_method_billing_address: Option<Encryptable<Secret<serde_json::Value>>> = req .billing .clone() .async_map(|billing| create_encrypted_data(&key_manager_state, key_store, billing)) .await .transpose() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to encrypt Payment method billing address")?; let connector_mandate_details = req .connector_mandate_details .clone() .map(serde_json::to_value) .transpose() .change_context(errors::ApiErrorResponse::InternalServerError)?; let response = match payment_method { #[cfg(feature = "payouts")] api_enums::PaymentMethod::BankTransfer => match req.bank_transfer.clone() { Some(bank) => add_bank_to_locker( state, req.clone(), merchant_account, key_store, &bank, &customer_id, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Add PaymentMethod Failed"), _ => Ok(store_default_payment_method( &req, &customer_id, merchant_id, )), }, api_enums::PaymentMethod::Card => match req.card.clone() { Some(card) => { let mut card_details = card; card_details = helpers::populate_bin_details_for_payment_method_create( card_details.clone(), db, ) .await; helpers::validate_card_expiry( &card_details.card_exp_month, &card_details.card_exp_year, )?; Box::pin(add_card_to_locker( state, req.clone(), &card_details, &customer_id, merchant_account, None, )) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Add Card Failed") } _ => Ok(store_default_payment_method( &req, &customer_id, merchant_id, )), }, _ => Ok(store_default_payment_method( &req, &customer_id, merchant_id, )), }; let (mut resp, duplication_check) = response?; match duplication_check { Some(duplication_check) => match duplication_check { payment_methods::DataDuplicationCheck::Duplicated => { let existing_pm = get_or_insert_payment_method( state, req.clone(), &mut resp, merchant_account, &customer_id, key_store, ) .await?; resp.client_secret = existing_pm.client_secret; } payment_methods::DataDuplicationCheck::MetaDataChanged => { if let Some(card) = req.card.clone() { let existing_pm = get_or_insert_payment_method( state, req.clone(), &mut resp, merchant_account, &customer_id, key_store, ) .await?; let client_secret = existing_pm.client_secret.clone(); delete_card_from_locker( state, &customer_id, merchant_id, existing_pm .locker_id .as_ref() .unwrap_or(&existing_pm.payment_method_id), ) .await?; let add_card_resp = add_card_hs( state, req.clone(), &card, &customer_id, merchant_account, api::enums::LockerChoice::HyperswitchCardVault, Some( existing_pm .locker_id .as_ref() .unwrap_or(&existing_pm.payment_method_id), ), ) .await; if let Err(err) = add_card_resp { logger::error!(vault_err=?err); db.delete_payment_method_by_merchant_id_payment_method_id( &(state.into()), key_store, merchant_id, &resp.payment_method_id, ) .await .to_not_found_response(errors::ApiErrorResponse::PaymentMethodNotFound)?; Err(report!(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed while updating card metadata changes"))? }; let existing_pm_data = get_card_details_without_locker_fallback(&existing_pm, state).await?; let updated_card = Some(api::CardDetailFromLocker { scheme: existing_pm.scheme.clone(), last4_digits: Some(card.card_number.get_last4()), issuer_country: card .card_issuing_country .or(existing_pm_data.issuer_country), card_isin: Some(card.card_number.get_card_isin()), card_number: Some(card.card_number), expiry_month: Some(card.card_exp_month), expiry_year: Some(card.card_exp_year), card_token: None, card_fingerprint: None, card_holder_name: card .card_holder_name .or(existing_pm_data.card_holder_name), nick_name: card.nick_name.or(existing_pm_data.nick_name), card_network: card.card_network.or(existing_pm_data.card_network), card_issuer: card.card_issuer.or(existing_pm_data.card_issuer), card_type: card.card_type.or(existing_pm_data.card_type), saved_to_locker: true, }); let updated_pmd = updated_card.as_ref().map(|card| { PaymentMethodsData::Card(CardDetailsPaymentMethod::from(card.clone())) }); let pm_data_encrypted: Option<Encryptable<Secret<serde_json::Value>>> = updated_pmd .async_map(|updated_pmd| { create_encrypted_data(&key_manager_state, key_store, updated_pmd) }) .await .transpose() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to encrypt payment method data")?; let pm_update = storage::PaymentMethodUpdate::PaymentMethodDataUpdate { payment_method_data: pm_data_encrypted.map(Into::into), }; db.update_payment_method( &(state.into()), key_store, existing_pm, pm_update, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to add payment method in db")?; resp.client_secret = client_secret; } } }, None => { let pm_metadata = resp.metadata.as_ref().map(|data| data.peek()); let locker_id = if resp.payment_method == Some(api_enums::PaymentMethod::Card) || resp.payment_method == Some(api_enums::PaymentMethod::BankTransfer) { Some(resp.payment_method_id) } else { None }; resp.payment_method_id = generate_id(consts::ID_LENGTH, "pm"); let pm = insert_payment_method( state, &resp, &req, key_store, merchant_id, &customer_id, pm_metadata.cloned(), None, locker_id, connector_mandate_details, req.network_transaction_id.clone(), merchant_account.storage_scheme, payment_method_billing_address, None, None, None, ) .await?; resp.client_secret = pm.client_secret; } } Ok(services::ApplicationResponse::Json(resp)) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="1248" end="1447"> pub async fn add_payment_method_data( state: routes::SessionState, req: api::PaymentMethodCreate, merchant_account: domain::MerchantAccount, key_store: domain::MerchantKeyStore, pm_id: String, ) -> errors::RouterResponse<api::PaymentMethodResponse> { let db = &*state.store; let pmd = req .payment_method_data .clone() .get_required_value("payment_method_data")?; req.payment_method.get_required_value("payment_method")?; let client_secret = req .client_secret .clone() .get_required_value("client_secret")?; let payment_method = db .find_payment_method( &((&state).into()), &key_store, pm_id.as_str(), merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::PaymentMethodNotFound) .attach_printable("Unable to find payment method")?; if payment_method.status != enums::PaymentMethodStatus::AwaitingData { return Err((errors::ApiErrorResponse::ClientSecretExpired).into()); } let customer_id = payment_method.customer_id.clone(); let customer = db .find_customer_by_customer_id_merchant_id( &(&state).into(), &customer_id, merchant_account.get_id(), &key_store, merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::CustomerNotFound)?; let client_secret_expired = authenticate_pm_client_secret_and_check_expiry(&client_secret, &payment_method)?; if client_secret_expired { return Err((errors::ApiErrorResponse::ClientSecretExpired).into()); }; let key_manager_state = (&state).into(); match pmd { api_models::payment_methods::PaymentMethodCreateData::Card(card) => { helpers::validate_card_expiry(&card.card_exp_month, &card.card_exp_year)?; let resp = Box::pin(add_card_to_locker( &state, req.clone(), &card, &customer_id, &merchant_account, None, )) .await .change_context(errors::ApiErrorResponse::InternalServerError); match resp { Ok((mut pm_resp, duplication_check)) => { if duplication_check.is_some() { let pm_update = storage::PaymentMethodUpdate::StatusUpdate { status: Some(enums::PaymentMethodStatus::Inactive), }; db.update_payment_method( &((&state).into()), &key_store, payment_method, pm_update, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to add payment method in db")?; get_or_insert_payment_method( &state, req.clone(), &mut pm_resp, &merchant_account, &customer_id, &key_store, ) .await?; return Ok(services::ApplicationResponse::Json(pm_resp)); } else { let locker_id = pm_resp.payment_method_id.clone(); pm_resp.payment_method_id.clone_from(&pm_id); pm_resp.client_secret = Some(client_secret.clone()); let card_isin = card.card_number.get_card_isin(); let card_info = db .get_card_info(card_isin.as_str()) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to get card info")?; let updated_card = CardDetailsPaymentMethod { issuer_country: card_info .as_ref() .and_then(|ci| ci.card_issuing_country.clone()), last4_digits: Some(card.card_number.get_last4()), expiry_month: Some(card.card_exp_month), expiry_year: Some(card.card_exp_year), nick_name: card.nick_name, card_holder_name: card.card_holder_name, card_network: card_info.as_ref().and_then(|ci| ci.card_network.clone()), card_isin: Some(card_isin), card_issuer: card_info.as_ref().and_then(|ci| ci.card_issuer.clone()), card_type: card_info.as_ref().and_then(|ci| ci.card_type.clone()), saved_to_locker: true, }; let pm_data_encrypted: Encryptable<Secret<serde_json::Value>> = create_encrypted_data( &key_manager_state, &key_store, PaymentMethodsData::Card(updated_card), ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to encrypt payment method data")?; let pm_update = storage::PaymentMethodUpdate::AdditionalDataUpdate { payment_method_data: Some(pm_data_encrypted.into()), status: Some(enums::PaymentMethodStatus::Active), locker_id: Some(locker_id), network_token_requestor_reference_id: None, payment_method: req.payment_method, payment_method_issuer: req.payment_method_issuer, payment_method_type: req.payment_method_type, network_token_locker_id: None, network_token_payment_method_data: None, }; db.update_payment_method( &((&state).into()), &key_store, payment_method, pm_update, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to add payment method in db")?; if customer.default_payment_method_id.is_none() { let _ = set_default_payment_method( &state, merchant_account.get_id(), key_store.clone(), &customer_id, pm_id, merchant_account.storage_scheme, ) .await .map_err(|error| { logger::error!( ?error, "Failed to set the payment method as default" ) }); } return Ok(services::ApplicationResponse::Json(pm_resp)); } } Err(e) => { let pm_update = storage::PaymentMethodUpdate::StatusUpdate { status: Some(enums::PaymentMethodStatus::Inactive), }; db.update_payment_method( &((&state).into()), &key_store, payment_method, pm_update, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to update payment method in db")?; return Err(e.attach_printable("Failed to add card to locker")); } } } } } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="1114" end="1212"> pub async fn get_client_secret_or_add_payment_method_for_migration( state: &routes::SessionState, req: api::PaymentMethodCreate, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, migration_status: &mut migration::RecordMigrationStatusBuilder, ) -> errors::RouterResponse<api::PaymentMethodResponse> { let merchant_id = merchant_account.get_id(); let customer_id = req.customer_id.clone().get_required_value("customer_id")?; #[cfg(not(feature = "payouts"))] let condition = req.card.is_some(); #[cfg(feature = "payouts")] let condition = req.card.is_some() || req.bank_transfer.is_some() || req.wallet.is_some(); let key_manager_state = state.into(); let payment_method_billing_address: Option<Encryptable<Secret<serde_json::Value>>> = req .billing .clone() .async_map(|billing| create_encrypted_data(&key_manager_state, key_store, billing)) .await .transpose() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to encrypt Payment method billing address")?; let connector_mandate_details = req .connector_mandate_details .clone() .map(serde_json::to_value) .transpose() .change_context(errors::ApiErrorResponse::InternalServerError)?; if condition { Box::pin(save_migration_payment_method( state, req, merchant_account, key_store, migration_status, )) .await } else { let payment_method_id = generate_id(consts::ID_LENGTH, "pm"); let res = create_payment_method( state, &req, &customer_id, payment_method_id.as_str(), None, merchant_id, None, None, None, key_store, connector_mandate_details.clone(), Some(enums::PaymentMethodStatus::AwaitingData), None, merchant_account.storage_scheme, payment_method_billing_address, None, None, None, None, ) .await?; migration_status.connector_mandate_details_migrated( connector_mandate_details .clone() .and_then(|val| (val != json!({})).then_some(true)) .or_else(|| { req.connector_mandate_details .clone() .and_then(|val| (!val.0.is_empty()).then_some(false)) }), ); //card is not migrated in this case migration_status.card_migrated(false); if res.status == enums::PaymentMethodStatus::AwaitingData { add_payment_method_status_update_task( &*state.store, &res, enums::PaymentMethodStatus::AwaitingData, enums::PaymentMethodStatus::Inactive, merchant_id, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable( "Failed to add payment method status update task in process tracker", )?; } Ok(services::api::ApplicationResponse::Json( api::PaymentMethodResponse::foreign_from((None, res)), )) } } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="1030" end="1107"> pub async fn get_client_secret_or_add_payment_method( state: &routes::SessionState, req: api::PaymentMethodCreate, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, ) -> errors::RouterResponse<api::PaymentMethodResponse> { let merchant_id = merchant_account.get_id(); let customer_id = req.customer_id.clone().get_required_value("customer_id")?; #[cfg(not(feature = "payouts"))] let condition = req.card.is_some(); #[cfg(feature = "payouts")] let condition = req.card.is_some() || req.bank_transfer.is_some() || req.wallet.is_some(); let key_manager_state = state.into(); let payment_method_billing_address: Option<Encryptable<Secret<serde_json::Value>>> = req .billing .clone() .async_map(|billing| create_encrypted_data(&key_manager_state, key_store, billing)) .await .transpose() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to encrypt Payment method billing address")?; let connector_mandate_details = req .connector_mandate_details .clone() .map(serde_json::to_value) .transpose() .change_context(errors::ApiErrorResponse::InternalServerError)?; if condition { Box::pin(add_payment_method(state, req, merchant_account, key_store)).await } else { let payment_method_id = generate_id(consts::ID_LENGTH, "pm"); let res = create_payment_method( state, &req, &customer_id, payment_method_id.as_str(), None, merchant_id, None, None, None, key_store, connector_mandate_details, Some(enums::PaymentMethodStatus::AwaitingData), None, merchant_account.storage_scheme, payment_method_billing_address, None, None, None, None, ) .await?; if res.status == enums::PaymentMethodStatus::AwaitingData { add_payment_method_status_update_task( &*state.store, &res, enums::PaymentMethodStatus::AwaitingData, enums::PaymentMethodStatus::Inactive, merchant_id, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable( "Failed to add payment method status update task in process tracker", )?; } Ok(services::api::ApplicationResponse::Json( api::PaymentMethodResponse::foreign_from((None, res)), )) } } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="2071" end="2293"> pub async fn update_customer_payment_method( state: routes::SessionState, merchant_account: domain::MerchantAccount, req: api::PaymentMethodUpdate, payment_method_id: &str, key_store: domain::MerchantKeyStore, ) -> errors::RouterResponse<api::PaymentMethodResponse> { // Currently update is supported only for cards if let Some(card_update) = req.card.clone() { let db = state.store.as_ref(); let pm = db .find_payment_method( &((&state).into()), &key_store, payment_method_id, merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::PaymentMethodNotFound)?; if let Some(cs) = &req.client_secret { let is_client_secret_expired = authenticate_pm_client_secret_and_check_expiry(cs, &pm)?; if is_client_secret_expired { return Err((errors::ApiErrorResponse::ClientSecretExpired).into()); }; }; if pm.status == enums::PaymentMethodStatus::AwaitingData { return Err(report!(errors::ApiErrorResponse::NotSupported { message: "Payment method is awaiting data so it cannot be updated".into() })); } if pm.payment_method_data.is_none() { return Err(report!(errors::ApiErrorResponse::GenericNotFoundError { message: "payment_method_data not found".to_string() })); } // Fetch the existing payment method data from db let existing_card_data = pm.payment_method_data .clone() .map(|x| x.into_inner().expose()) .map( |value| -> Result< PaymentMethodsData, error_stack::Report<errors::ApiErrorResponse>, > { value .parse_value::<PaymentMethodsData>("PaymentMethodsData") .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to deserialize payment methods data") }, ) .transpose()? .and_then(|pmd| match pmd { PaymentMethodsData::Card(crd) => Some(api::CardDetailFromLocker::from(crd)), _ => None, }) .ok_or(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to obtain decrypted card object from db")?; let is_card_updation_required = validate_payment_method_update(card_update.clone(), existing_card_data.clone()); let response = if is_card_updation_required { // Fetch the existing card data from locker for getting card number let card_data_from_locker = get_card_from_locker( &state, &pm.customer_id, &pm.merchant_id, pm.locker_id.as_ref().unwrap_or(&pm.payment_method_id), ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error getting card from locker")?; if card_update.card_exp_month.is_some() || card_update.card_exp_year.is_some() { helpers::validate_card_expiry( card_update .card_exp_month .as_ref() .unwrap_or(&card_data_from_locker.card_exp_month), card_update .card_exp_year .as_ref() .unwrap_or(&card_data_from_locker.card_exp_year), )?; } let updated_card_details = card_update.apply(card_data_from_locker.clone()); // Construct new payment method object from request let new_pm = api::PaymentMethodCreate { payment_method: pm.get_payment_method_type(), payment_method_type: pm.get_payment_method_subtype(), payment_method_issuer: pm.payment_method_issuer.clone(), payment_method_issuer_code: pm.payment_method_issuer_code, #[cfg(feature = "payouts")] bank_transfer: None, card: Some(updated_card_details.clone()), #[cfg(feature = "payouts")] wallet: None, metadata: None, customer_id: Some(pm.customer_id.clone()), client_secret: pm.client_secret.clone(), payment_method_data: None, card_network: None, billing: None, connector_mandate_details: None, network_transaction_id: None, }; new_pm.validate()?; // Delete old payment method from locker delete_card_from_locker( &state, &pm.customer_id, &pm.merchant_id, pm.locker_id.as_ref().unwrap_or(&pm.payment_method_id), ) .await?; // Add the updated payment method data to locker let (mut add_card_resp, _) = Box::pin(add_card_to_locker( &state, new_pm.clone(), &updated_card_details, &pm.customer_id, &merchant_account, Some(pm.locker_id.as_ref().unwrap_or(&pm.payment_method_id)), )) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to add updated payment method to locker")?; // Construct new updated card object. Consider a field if passed in request or else populate it with the existing value from existing_card_data let updated_card = Some(api::CardDetailFromLocker { scheme: existing_card_data.scheme, last4_digits: Some(card_data_from_locker.card_number.get_last4()), issuer_country: existing_card_data.issuer_country, card_number: existing_card_data.card_number, expiry_month: card_update .card_exp_month .or(existing_card_data.expiry_month), expiry_year: card_update.card_exp_year.or(existing_card_data.expiry_year), card_token: existing_card_data.card_token, card_fingerprint: existing_card_data.card_fingerprint, card_holder_name: card_update .card_holder_name .or(existing_card_data.card_holder_name), nick_name: card_update.nick_name.or(existing_card_data.nick_name), card_network: existing_card_data.card_network, card_isin: existing_card_data.card_isin, card_issuer: existing_card_data.card_issuer, card_type: existing_card_data.card_type, saved_to_locker: true, }); let updated_pmd = updated_card .as_ref() .map(|card| PaymentMethodsData::Card(CardDetailsPaymentMethod::from(card.clone()))); let key_manager_state = (&state).into(); let pm_data_encrypted: Option<Encryptable<Secret<serde_json::Value>>> = updated_pmd .async_map(|updated_pmd| { create_encrypted_data(&key_manager_state, &key_store, updated_pmd) }) .await .transpose() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to encrypt payment method data")?; let pm_update = storage::PaymentMethodUpdate::PaymentMethodDataUpdate { payment_method_data: pm_data_encrypted.map(Into::into), }; add_card_resp .payment_method_id .clone_from(&pm.payment_method_id); db.update_payment_method( &((&state).into()), &key_store, pm, pm_update, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to update payment method in db")?; add_card_resp } else { // Return existing payment method data as response without any changes api::PaymentMethodResponse { merchant_id: pm.merchant_id.to_owned(), customer_id: Some(pm.customer_id.clone()), payment_method_id: pm.payment_method_id.clone(), payment_method: pm.get_payment_method_type(), payment_method_type: pm.get_payment_method_subtype(), #[cfg(feature = "payouts")] bank_transfer: None, card: Some(existing_card_data), metadata: pm.metadata, created: Some(pm.created_at), recurring_enabled: false, installment_payment_enabled: false, payment_experience: Some(vec![api_models::enums::PaymentExperience::RedirectToUrl]), last_used_at: Some(common_utils::date_time::now()), client_secret: pm.client_secret.clone(), } }; Ok(services::ApplicationResponse::Json(response)) } else { Err(report!(errors::ApiErrorResponse::NotSupported { message: "Payment method update for the given payment method is not supported".into() })) } } <file_sep path="hyperswitch/v2_compatible_migrations/2024-08-28-081721_add_v2_columns/up.sql" role="context" start="54" end="70"> ADD COLUMN redirection_data JSONB, ADD COLUMN connector_payment_data TEXT, ADD COLUMN connector_token_details JSONB; -- Change the type of the column from JSON to JSONB ALTER TABLE merchant_connector_account ADD COLUMN IF NOT EXISTS feature_metadata JSONB; ALTER TABLE payment_methods ADD COLUMN IF NOT EXISTS locker_fingerprint_id VARCHAR(64), ADD COLUMN IF NOT EXISTS payment_method_type_v2 VARCHAR(64), ADD COLUMN IF NOT EXISTS payment_method_subtype VARCHAR(64); ALTER TABLE refund ADD COLUMN IF NOT EXISTS id VARCHAR(64), ADD COLUMN IF NOT EXISTS merchant_reference_id VARCHAR(64), ADD COLUMN IF NOT EXISTS connector_id VARCHAR(64);
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/routing/helpers.rs<|crate|> router anchor=update_business_profile_active_dynamic_algorithm_ref kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/routing/helpers.rs" role="context" start="264" end="288"> pub async fn update_business_profile_active_dynamic_algorithm_ref( db: &dyn StorageInterface, key_manager_state: &KeyManagerState, merchant_key_store: &domain::MerchantKeyStore, current_business_profile: domain::Profile, dynamic_routing_algorithm_ref: routing_types::DynamicRoutingAlgorithmRef, ) -> RouterResult<()> { let ref_val = dynamic_routing_algorithm_ref .encode_to_value() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to convert dynamic routing ref to value")?; let business_profile_update = domain::ProfileUpdate::DynamicRoutingAlgorithmUpdate { dynamic_routing_algorithm: Some(ref_val), }; db.update_profile_by_profile_id( key_manager_state, merchant_key_store, current_business_profile, business_profile_update, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to update dynamic routing algorithm ref in business profile")?; Ok(()) } <file_sep path="hyperswitch/crates/router/src/core/routing/helpers.rs" role="context" start="263" end="263"> use api_models::routing as routing_types; use common_utils::{ext_traits::Encode, id_type, types::keymanager::KeyManagerState}; use crate::db::errors::StorageErrorExt; use crate::types::domain::MerchantConnectorAccount; use crate::{ core::errors::{self, RouterResult}, db::StorageInterface, routes::SessionState, types::{domain, storage}, utils::StringExt, }; <file_sep path="hyperswitch/crates/router/src/core/routing/helpers.rs" role="context" start="341" end="388"> pub fn validate_connectors_in_routing_config(&self) -> RouterResult<()> { match self.routing_algorithm { routing_types::RoutingAlgorithm::Single(choice) => { self.connector_choice(choice)?; } routing_types::RoutingAlgorithm::Priority(list) => { for choice in list { self.connector_choice(choice)?; } } routing_types::RoutingAlgorithm::VolumeSplit(splits) => { for split in splits { self.connector_choice(&split.connector)?; } } routing_types::RoutingAlgorithm::Advanced(program) => { let check_connector_selection = |selection: &routing_types::ConnectorSelection| -> RouterResult<()> { match selection { routing_types::ConnectorSelection::VolumeSplit(splits) => { for split in splits { self.connector_choice(&split.connector)?; } } routing_types::ConnectorSelection::Priority(list) => { for choice in list { self.connector_choice(choice)?; } } } Ok(()) }; check_connector_selection(&program.default_selection)?; for rule in &program.rules { check_connector_selection(&rule.connector_selection)?; } } } Ok(()) } <file_sep path="hyperswitch/crates/router/src/core/routing/helpers.rs" role="context" start="310" end="339"> fn connector_choice( &self, choice: &routing_types::RoutableConnectorChoice, ) -> RouterResult<()> { if let Some(ref mca_id) = choice.merchant_connector_id { let connector_choice = common_enums::connector_enums::Connector::from(choice.connector); error_stack::ensure!( self.name_mca_id_set.0.contains(&(&connector_choice, mca_id.clone())), errors::ApiErrorResponse::InvalidRequestData { message: format!( "connector with name '{}' and merchant connector account id '{:?}' not found for the given profile", connector_choice, mca_id, ) } ); } else { let connector_choice = common_enums::connector_enums::Connector::from(choice.connector); error_stack::ensure!( self.name_set.0.contains(&connector_choice), errors::ApiErrorResponse::InvalidRequestData { message: format!( "connector with name '{}' not found for the given profile", connector_choice, ) } ); }; Ok(()) } <file_sep path="hyperswitch/crates/router/src/core/routing/helpers.rs" role="context" start="209" end="261"> pub async fn update_profile_active_algorithm_ref( db: &dyn StorageInterface, key_manager_state: &KeyManagerState, merchant_key_store: &domain::MerchantKeyStore, current_business_profile: domain::Profile, algorithm_id: routing_types::RoutingAlgorithmRef, transaction_type: &storage::enums::TransactionType, ) -> RouterResult<()> { let ref_val = algorithm_id .encode_to_value() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to convert routing ref to value")?; let merchant_id = current_business_profile.merchant_id.clone(); let profile_id = current_business_profile.get_id().to_owned(); let routing_cache_key = cache::CacheKind::Routing( format!( "routing_config_{}_{}", merchant_id.get_string_repr(), profile_id.get_string_repr(), ) .into(), ); let (routing_algorithm, payout_routing_algorithm) = match transaction_type { storage::enums::TransactionType::Payment => (Some(ref_val), None), #[cfg(feature = "payouts")] storage::enums::TransactionType::Payout => (None, Some(ref_val)), }; let business_profile_update = domain::ProfileUpdate::RoutingAlgorithmUpdate { routing_algorithm, payout_routing_algorithm, }; db.update_profile_by_profile_id( key_manager_state, merchant_key_store, current_business_profile, business_profile_update, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to update routing algorithm ref in business profile")?; cache::redact_from_redis_and_publish(db.get_cache_store().as_ref(), [routing_cache_key]) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to invalidate routing cache")?; Ok(()) } <file_sep path="hyperswitch/crates/router/src/core/routing/helpers.rs" role="context" start="155" end="206"> pub async fn update_merchant_active_algorithm_ref( state: &SessionState, key_store: &domain::MerchantKeyStore, config_key: cache::CacheKind<'_>, algorithm_id: routing_types::RoutingAlgorithmRef, ) -> RouterResult<()> { let ref_value = algorithm_id .encode_to_value() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed converting routing algorithm ref to json value")?; let merchant_account_update = storage::MerchantAccountUpdate::Update { merchant_name: None, merchant_details: None, return_url: None, webhook_details: None, sub_merchants_enabled: None, parent_merchant_id: None, enable_payment_response_hash: None, payment_response_hash_key: None, redirect_to_merchant_with_http_post: None, publishable_key: None, locker_id: None, metadata: None, routing_algorithm: Some(ref_value), primary_business_details: None, intent_fulfillment_time: None, frm_routing_algorithm: None, payout_routing_algorithm: None, default_profile: None, payment_link_config: None, pm_collect_link_config: None, }; let db = &*state.store; db.update_specific_fields_in_merchant( &state.into(), &key_store.merchant_id, merchant_account_update, key_store, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to update routing algorithm ref in merchant account")?; cache::redact_from_redis_and_publish(db.get_cache_store().as_ref(), [config_key]) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to invalidate the config cache")?; Ok(()) } <file_sep path="hyperswitch/crates/router/src/core/routing/helpers.rs" role="context" start="1519" end="1602"> pub async fn default_specific_dynamic_routing_setup( state: &SessionState, key_store: domain::MerchantKeyStore, business_profile: domain::Profile, feature_to_enable: routing_types::DynamicRoutingFeatures, mut dynamic_routing_algo_ref: routing_types::DynamicRoutingAlgorithmRef, dynamic_routing_type: routing_types::DynamicRoutingType, ) -> RouterResult<ApplicationResponse<routing_types::RoutingDictionaryRecord>> { let db = state.store.as_ref(); let key_manager_state = &state.into(); let profile_id = business_profile.get_id().clone(); let merchant_id = business_profile.merchant_id.clone(); let algorithm_id = common_utils::generate_routing_id_of_default_length(); let timestamp = common_utils::date_time::now(); let algo = match dynamic_routing_type { routing_types::DynamicRoutingType::SuccessRateBasedRouting => { let default_success_based_routing_config = routing_types::SuccessBasedRoutingConfig::default(); routing_algorithm::RoutingAlgorithm { algorithm_id: algorithm_id.clone(), profile_id: profile_id.clone(), merchant_id, name: SUCCESS_BASED_DYNAMIC_ROUTING_ALGORITHM.to_string(), description: None, kind: diesel_models::enums::RoutingAlgorithmKind::Dynamic, algorithm_data: serde_json::json!(default_success_based_routing_config), created_at: timestamp, modified_at: timestamp, algorithm_for: common_enums::TransactionType::Payment, } } routing_types::DynamicRoutingType::EliminationRouting => { let default_elimination_routing_config = routing_types::EliminationRoutingConfig::default(); routing_algorithm::RoutingAlgorithm { algorithm_id: algorithm_id.clone(), profile_id: profile_id.clone(), merchant_id, name: ELIMINATION_BASED_DYNAMIC_ROUTING_ALGORITHM.to_string(), description: None, kind: diesel_models::enums::RoutingAlgorithmKind::Dynamic, algorithm_data: serde_json::json!(default_elimination_routing_config), created_at: timestamp, modified_at: timestamp, algorithm_for: common_enums::TransactionType::Payment, } } routing_types::DynamicRoutingType::ContractBasedRouting => { return Err((errors::ApiErrorResponse::InvalidRequestData { message: "Contract routing cannot be set as default".to_string(), }) .into()) } }; let record = db .insert_routing_algorithm(algo) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to insert record in routing algorithm table")?; dynamic_routing_algo_ref.update_algorithm_id( algorithm_id, feature_to_enable, dynamic_routing_type, ); update_business_profile_active_dynamic_algorithm_ref( db, key_manager_state, &key_store, business_profile, dynamic_routing_algo_ref, ) .await?; let new_record = record.foreign_into(); core_metrics::ROUTING_CREATE_SUCCESS_RESPONSE.add( 1, router_env::metric_attributes!(("profile_id", profile_id.clone())), ); Ok(ApplicationResponse::Json(new_record)) } <file_sep path="hyperswitch/crates/router/src/core/routing/helpers.rs" role="context" start="1443" end="1515"> pub async fn enable_specific_routing_algorithm<A>( state: &SessionState, key_store: domain::MerchantKeyStore, business_profile: domain::Profile, feature_to_enable: routing_types::DynamicRoutingFeatures, mut dynamic_routing_algo_ref: routing_types::DynamicRoutingAlgorithmRef, dynamic_routing_type: routing_types::DynamicRoutingType, algo_type: Option<A>, ) -> RouterResult<ApplicationResponse<routing_types::RoutingDictionaryRecord>> where A: routing_types::DynamicRoutingAlgoAccessor + Clone + Debug, { // Algorithm wasn't created yet let Some(mut algo_type) = algo_type else { return default_specific_dynamic_routing_setup( state, key_store, business_profile, feature_to_enable, dynamic_routing_algo_ref, dynamic_routing_type, ) .await; }; // Algorithm was in disabled state let Some(algo_type_algorithm_id) = algo_type .clone() .get_algorithm_id_with_timestamp() .algorithm_id else { return default_specific_dynamic_routing_setup( state, key_store, business_profile, feature_to_enable, dynamic_routing_algo_ref, dynamic_routing_type, ) .await; }; let db = state.store.as_ref(); let profile_id = business_profile.get_id().clone(); let algo_type_enabled_features = algo_type.get_enabled_features(); if *algo_type_enabled_features == feature_to_enable { // algorithm already has the required feature return Err(errors::ApiErrorResponse::PreconditionFailed { message: format!("{} is already enabled", dynamic_routing_type), } .into()); }; *algo_type_enabled_features = feature_to_enable; dynamic_routing_algo_ref.update_enabled_features(dynamic_routing_type, feature_to_enable); update_business_profile_active_dynamic_algorithm_ref( db, &state.into(), &key_store, business_profile, dynamic_routing_algo_ref.clone(), ) .await?; let routing_algorithm = db .find_routing_algorithm_by_profile_id_algorithm_id(&profile_id, &algo_type_algorithm_id) .await .to_not_found_response(errors::ApiErrorResponse::ResourceIdNotFound)?; let updated_routing_record = routing_algorithm.foreign_into(); core_metrics::ROUTING_CREATE_SUCCESS_RESPONSE.add( 1, router_env::metric_attributes!(("profile_id", profile_id.clone())), ); Ok(ApplicationResponse::Json(updated_routing_record)) } <file_sep path="hyperswitch/crates/router/src/routes/app.rs" role="context" start="1906" end="1906"> pub struct Profile; <file_sep path="hyperswitch/migrations/2023-04-06-092008_create_merchant_ek/up.sql" role="context" start="1" end="6"> CREATE TABLE merchant_key_store( merchant_id VARCHAR(255) NOT NULL PRIMARY KEY, key bytea NOT NULL, created_at TIMESTAMP NOT NULL );
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/user/dashboard_metadata.rs<|crate|> router anchor=get_multiple_metadata kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/user/dashboard_metadata.rs" role="context" start="41" end="65"> pub async fn get_multiple_metadata( state: SessionState, user: UserFromToken, request: GetMultipleMetaDataPayload, _req_state: ReqState, ) -> UserResponse<Vec<api::GetMetaDataResponse>> { let metadata_keys: Vec<DBEnum> = request.results.into_iter().map(parse_get_request).collect(); let metadata = fetch_metadata(&state, &user, metadata_keys.clone()).await?; let mut response = Vec::with_capacity(metadata_keys.len()); for key in metadata_keys { let data = metadata.iter().find(|ele| ele.data_key == key); let resp; if data.is_none() && utils::is_backfill_required(key) { let backfill_data = backfill_metadata(&state, &user, &key).await?; resp = into_response(backfill_data.as_ref(), key)?; } else { resp = into_response(data, key)?; } response.push(resp); } Ok(ApplicationResponse::Json(response)) } <file_sep path="hyperswitch/crates/router/src/core/user/dashboard_metadata.rs" role="context" start="40" end="40"> use api_models::user::dashboard_metadata::{self as api, GetMultipleMetaDataPayload}; use diesel_models::{ enums::DashboardMetadata as DBEnum, user::dashboard_metadata::DashboardMetadata, }; use crate::{ core::errors::{UserErrors, UserResponse, UserResult}, routes::{app::ReqState, SessionState}, services::{authentication::UserFromToken, ApplicationResponse}, types::domain::{self, user::dashboard_metadata as types, MerchantKeyStore}, utils::user::dashboard_metadata as utils, }; use crate::{services::email::types as email_types, utils::user::theme as theme_utils}; <file_sep path="hyperswitch/crates/router/src/core/user/dashboard_metadata.rs" role="context" start="128" end="155"> fn parse_get_request(data_enum: api::GetMetaDataRequest) -> DBEnum { match data_enum { api::GetMetaDataRequest::ProductionAgreement => DBEnum::ProductionAgreement, api::GetMetaDataRequest::SetupProcessor => DBEnum::SetupProcessor, api::GetMetaDataRequest::ConfigureEndpoint => DBEnum::ConfigureEndpoint, api::GetMetaDataRequest::SetupComplete => DBEnum::SetupComplete, api::GetMetaDataRequest::FirstProcessorConnected => DBEnum::FirstProcessorConnected, api::GetMetaDataRequest::SecondProcessorConnected => DBEnum::SecondProcessorConnected, api::GetMetaDataRequest::ConfiguredRouting => DBEnum::ConfiguredRouting, api::GetMetaDataRequest::TestPayment => DBEnum::TestPayment, api::GetMetaDataRequest::IntegrationMethod => DBEnum::IntegrationMethod, api::GetMetaDataRequest::ConfigurationType => DBEnum::ConfigurationType, api::GetMetaDataRequest::IntegrationCompleted => DBEnum::IntegrationCompleted, api::GetMetaDataRequest::StripeConnected => DBEnum::StripeConnected, api::GetMetaDataRequest::PaypalConnected => DBEnum::PaypalConnected, api::GetMetaDataRequest::SPRoutingConfigured => DBEnum::SpRoutingConfigured, api::GetMetaDataRequest::Feedback => DBEnum::Feedback, api::GetMetaDataRequest::ProdIntent => DBEnum::ProdIntent, api::GetMetaDataRequest::SPTestPayment => DBEnum::SpTestPayment, api::GetMetaDataRequest::DownloadWoocom => DBEnum::DownloadWoocom, api::GetMetaDataRequest::ConfigureWoocom => DBEnum::ConfigureWoocom, api::GetMetaDataRequest::SetupWoocomWebhook => DBEnum::SetupWoocomWebhook, api::GetMetaDataRequest::IsMultipleConfiguration => DBEnum::IsMultipleConfiguration, api::GetMetaDataRequest::IsChangePasswordRequired => DBEnum::IsChangePasswordRequired, api::GetMetaDataRequest::OnboardingSurvey => DBEnum::OnboardingSurvey, api::GetMetaDataRequest::ReconStatus => DBEnum::ReconStatus, } } <file_sep path="hyperswitch/crates/router/src/core/user/dashboard_metadata.rs" role="context" start="67" end="126"> fn parse_set_request(data_enum: api::SetMetaDataRequest) -> UserResult<types::MetaData> { match data_enum { api::SetMetaDataRequest::ProductionAgreement(req) => { let ip_address = req .ip_address .ok_or(report!(UserErrors::InternalServerError)) .attach_printable("Error Getting Ip Address")?; Ok(types::MetaData::ProductionAgreement( types::ProductionAgreementValue { version: req.version, ip_address, timestamp: common_utils::date_time::now(), }, )) } api::SetMetaDataRequest::SetupProcessor(req) => Ok(types::MetaData::SetupProcessor(req)), api::SetMetaDataRequest::ConfigureEndpoint => Ok(types::MetaData::ConfigureEndpoint(true)), api::SetMetaDataRequest::SetupComplete => Ok(types::MetaData::SetupComplete(true)), api::SetMetaDataRequest::FirstProcessorConnected(req) => { Ok(types::MetaData::FirstProcessorConnected(req)) } api::SetMetaDataRequest::SecondProcessorConnected(req) => { Ok(types::MetaData::SecondProcessorConnected(req)) } api::SetMetaDataRequest::ConfiguredRouting(req) => { Ok(types::MetaData::ConfiguredRouting(req)) } api::SetMetaDataRequest::TestPayment(req) => Ok(types::MetaData::TestPayment(req)), api::SetMetaDataRequest::IntegrationMethod(req) => { Ok(types::MetaData::IntegrationMethod(req)) } api::SetMetaDataRequest::ConfigurationType(req) => { Ok(types::MetaData::ConfigurationType(req)) } api::SetMetaDataRequest::IntegrationCompleted => { Ok(types::MetaData::IntegrationCompleted(true)) } api::SetMetaDataRequest::SPRoutingConfigured(req) => { Ok(types::MetaData::SPRoutingConfigured(req)) } api::SetMetaDataRequest::Feedback(req) => Ok(types::MetaData::Feedback(req)), api::SetMetaDataRequest::ProdIntent(req) => Ok(types::MetaData::ProdIntent(req)), api::SetMetaDataRequest::SPTestPayment => Ok(types::MetaData::SPTestPayment(true)), api::SetMetaDataRequest::DownloadWoocom => Ok(types::MetaData::DownloadWoocom(true)), api::SetMetaDataRequest::ConfigureWoocom => Ok(types::MetaData::ConfigureWoocom(true)), api::SetMetaDataRequest::SetupWoocomWebhook => { Ok(types::MetaData::SetupWoocomWebhook(true)) } api::SetMetaDataRequest::IsMultipleConfiguration => { Ok(types::MetaData::IsMultipleConfiguration(true)) } api::SetMetaDataRequest::IsChangePasswordRequired => { Ok(types::MetaData::IsChangePasswordRequired(true)) } api::SetMetaDataRequest::OnboardingSurvey(req) => { Ok(types::MetaData::OnboardingSurvey(req)) } api::SetMetaDataRequest::ReconStatus(req) => Ok(types::MetaData::ReconStatus(req)), } } <file_sep path="hyperswitch/crates/router/src/core/user/dashboard_metadata.rs" role="context" start="27" end="39"> pub async fn set_metadata( state: SessionState, user: UserFromToken, request: api::SetMetaDataRequest, _req_state: ReqState, ) -> UserResponse<()> { let metadata_value = parse_set_request(request)?; let metadata_key = DBEnum::from(&metadata_value); insert_metadata(&state, user, metadata_key, metadata_value).await?; Ok(ApplicationResponse::StatusOk) } <file_sep path="hyperswitch/crates/router/src/core/user/dashboard_metadata.rs" role="context" start="157" end="242"> fn into_response( data: Option<&DashboardMetadata>, data_type: DBEnum, ) -> UserResult<api::GetMetaDataResponse> { match data_type { DBEnum::ProductionAgreement => Ok(api::GetMetaDataResponse::ProductionAgreement( data.is_some(), )), DBEnum::SetupProcessor => { let resp = utils::deserialize_to_response(data)?; Ok(api::GetMetaDataResponse::SetupProcessor(resp)) } DBEnum::ConfigureEndpoint => { Ok(api::GetMetaDataResponse::ConfigureEndpoint(data.is_some())) } DBEnum::SetupComplete => Ok(api::GetMetaDataResponse::SetupComplete(data.is_some())), DBEnum::FirstProcessorConnected => { let resp = utils::deserialize_to_response(data)?; Ok(api::GetMetaDataResponse::FirstProcessorConnected(resp)) } DBEnum::SecondProcessorConnected => { let resp = utils::deserialize_to_response(data)?; Ok(api::GetMetaDataResponse::SecondProcessorConnected(resp)) } DBEnum::ConfiguredRouting => { let resp = utils::deserialize_to_response(data)?; Ok(api::GetMetaDataResponse::ConfiguredRouting(resp)) } DBEnum::TestPayment => { let resp = utils::deserialize_to_response(data)?; Ok(api::GetMetaDataResponse::TestPayment(resp)) } DBEnum::IntegrationMethod => { let resp = utils::deserialize_to_response(data)?; Ok(api::GetMetaDataResponse::IntegrationMethod(resp)) } DBEnum::ConfigurationType => { let resp = utils::deserialize_to_response(data)?; Ok(api::GetMetaDataResponse::ConfigurationType(resp)) } DBEnum::IntegrationCompleted => Ok(api::GetMetaDataResponse::IntegrationCompleted( data.is_some(), )), DBEnum::StripeConnected => { let resp = utils::deserialize_to_response(data)?; Ok(api::GetMetaDataResponse::StripeConnected(resp)) } DBEnum::PaypalConnected => { let resp = utils::deserialize_to_response(data)?; Ok(api::GetMetaDataResponse::PaypalConnected(resp)) } DBEnum::SpRoutingConfigured => { let resp = utils::deserialize_to_response(data)?; Ok(api::GetMetaDataResponse::SPRoutingConfigured(resp)) } DBEnum::Feedback => { let resp = utils::deserialize_to_response(data)?; Ok(api::GetMetaDataResponse::Feedback(resp)) } DBEnum::ProdIntent => { let resp = utils::deserialize_to_response(data)?; Ok(api::GetMetaDataResponse::ProdIntent(resp)) } DBEnum::SpTestPayment => Ok(api::GetMetaDataResponse::SPTestPayment(data.is_some())), DBEnum::DownloadWoocom => Ok(api::GetMetaDataResponse::DownloadWoocom(data.is_some())), DBEnum::ConfigureWoocom => Ok(api::GetMetaDataResponse::ConfigureWoocom(data.is_some())), DBEnum::SetupWoocomWebhook => { Ok(api::GetMetaDataResponse::SetupWoocomWebhook(data.is_some())) } DBEnum::IsMultipleConfiguration => Ok(api::GetMetaDataResponse::IsMultipleConfiguration( data.is_some(), )), DBEnum::IsChangePasswordRequired => Ok(api::GetMetaDataResponse::IsChangePasswordRequired( data.is_some(), )), DBEnum::OnboardingSurvey => { let resp = utils::deserialize_to_response(data)?; Ok(api::GetMetaDataResponse::OnboardingSurvey(resp)) } DBEnum::ReconStatus => { let resp = utils::deserialize_to_response(data)?; Ok(api::GetMetaDataResponse::ReconStatus(resp)) } } } <file_sep path="hyperswitch/crates/router/src/core/user/dashboard_metadata.rs" role="context" start="663" end="772"> pub async fn backfill_metadata( state: &SessionState, user: &UserFromToken, key: &DBEnum, ) -> UserResult<Option<DashboardMetadata>> { let key_store = state .store .get_merchant_key_store_by_merchant_id( &state.into(), &user.merchant_id, &state.store.get_master_key().to_vec().into(), ) .await .change_context(UserErrors::InternalServerError)?; match key { DBEnum::StripeConnected => { let mca = if let Some(stripe_connected) = get_merchant_connector_account_by_name( state, &user.merchant_id, api_models::enums::RoutableConnectors::Stripe .to_string() .as_str(), &key_store, ) .await? { stripe_connected } else if let Some(stripe_test_connected) = get_merchant_connector_account_by_name( state, &user.merchant_id, //TODO: Use Enum with proper feature flag "stripe_test", &key_store, ) .await? { stripe_test_connected } else { return Ok(None); }; #[cfg(feature = "v1")] let processor_name = mca.connector_name.clone(); #[cfg(feature = "v2")] let processor_name = mca.connector_name.to_string().clone(); Some( insert_metadata( state, user.to_owned(), DBEnum::StripeConnected, types::MetaData::StripeConnected(api::ProcessorConnected { processor_id: mca.get_id(), processor_name, }), ) .await, ) .transpose() } DBEnum::PaypalConnected => { let mca = if let Some(paypal_connected) = get_merchant_connector_account_by_name( state, &user.merchant_id, api_models::enums::RoutableConnectors::Paypal .to_string() .as_str(), &key_store, ) .await? { paypal_connected } else if let Some(paypal_test_connected) = get_merchant_connector_account_by_name( state, &user.merchant_id, //TODO: Use Enum with proper feature flag "paypal_test", &key_store, ) .await? { paypal_test_connected } else { return Ok(None); }; #[cfg(feature = "v1")] let processor_name = mca.connector_name.clone(); #[cfg(feature = "v2")] let processor_name = mca.connector_name.to_string().clone(); Some( insert_metadata( state, user.to_owned(), DBEnum::PaypalConnected, types::MetaData::PaypalConnected(api::ProcessorConnected { processor_id: mca.get_id(), processor_name, }), ) .await, ) .transpose() } _ => Ok(None), } } <file_sep path="hyperswitch/crates/router/src/routes/app.rs" role="context" start="99" end="101"> pub struct ReqState { pub event_context: events::EventContext<crate::events::EventType, EventsHandler>, } <file_sep path="hyperswitch/crates/api_models/src/user/dashboard_metadata.rs" role="context" start="156" end="181"> pub enum GetMetaDataResponse { ProductionAgreement(bool), SetupProcessor(Option<SetupProcessor>), ConfigureEndpoint(bool), SetupComplete(bool), FirstProcessorConnected(Option<ProcessorConnected>), SecondProcessorConnected(Option<ProcessorConnected>), ConfiguredRouting(Option<ConfiguredRouting>), TestPayment(Option<TestPayment>), IntegrationMethod(Option<IntegrationMethod>), ConfigurationType(Option<ConfigurationType>), IntegrationCompleted(bool), StripeConnected(Option<ProcessorConnected>), PaypalConnected(Option<ProcessorConnected>), SPRoutingConfigured(Option<ConfiguredRouting>), Feedback(Option<Feedback>), ProdIntent(Option<ProdIntent>), SPTestPayment(bool), DownloadWoocom(bool), ConfigureWoocom(bool), SetupWoocomWebhook(bool), IsMultipleConfiguration(bool), IsChangePasswordRequired(bool), OnboardingSurvey(Option<OnboardingSurvey>), ReconStatus(Option<ReconStatus>), }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/admin.rs<|crate|> router anchor=get_parent_merchant kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/admin.rs" role="context" start="1161" end="1187"> async fn get_parent_merchant( state: &SessionState, sub_merchants_enabled: Option<bool>, parent_merchant: Option<&id_type::MerchantId>, key_store: &domain::MerchantKeyStore, ) -> RouterResult<Option<id_type::MerchantId>> { Ok(match sub_merchants_enabled { Some(true) => { Some( parent_merchant.ok_or_else(|| { report!(errors::ValidationError::MissingRequiredField { field_name: "parent_merchant_id".to_string() }) .change_context(errors::ApiErrorResponse::PreconditionFailed { message: "If `sub_merchants_enabled` is `true`, then `parent_merchant_id` is mandatory".to_string(), }) }) .map(|id| validate_merchant_id(state, id,key_store).change_context( errors::ApiErrorResponse::InvalidDataValue { field_name: "parent_merchant_id" } ))? .await? .get_id().to_owned() ) } _ => None, }) } <file_sep path="hyperswitch/crates/router/src/core/admin.rs" role="context" start="1160" end="1160"> use common_utils::{ date_time, ext_traits::{AsyncExt, Encode, OptionExt, ValueExt}, fp_utils, id_type, pii, type_name, types::keymanager::{self as km_types, KeyManagerState, ToEncryptable}, }; use error_stack::{report, FutureExt, ResultExt}; use crate::{ consts, core::{ encryption::transfer_encryption_key, errors::{self, RouterResponse, RouterResult, StorageErrorExt}, payment_methods::{cards, transformers}, payments::helpers, pm_auth::helpers::PaymentAuthConnectorDataExt, routing, utils as core_utils, }, db::{AccountsStorageInterface, StorageInterface}, routes::{metrics, SessionState}, services::{ self, api::{self as service_api, client}, authentication, pm_auth as payment_initiation_service, }, types::{ self, api::{self, admin}, domain::{ self, types::{self as domain_types, AsyncLift}, }, storage::{self, enums::MerchantStorageScheme}, transformers::{ForeignInto, ForeignTryFrom, ForeignTryInto}, }, utils, }; <file_sep path="hyperswitch/crates/router/src/core/admin.rs" role="context" start="1208" end="1235"> pub fn validate_auth_and_metadata_type( &self, ) -> Result<(), error_stack::Report<errors::ApiErrorResponse>> { let connector_auth_type_validation = ConnectorAuthTypeValidation { auth_type: self.auth_type, }; connector_auth_type_validation.validate_connector_auth_type()?; self.validate_auth_and_metadata_type_with_connector() .map_err(|err| match *err.current_context() { errors::ConnectorError::InvalidConnectorName => { err.change_context(errors::ApiErrorResponse::InvalidRequestData { message: "The connector name is invalid".to_string(), }) } errors::ConnectorError::InvalidConnectorConfig { config: field_name } => err .change_context(errors::ApiErrorResponse::InvalidRequestData { message: format!("The {} is invalid", field_name), }), errors::ConnectorError::FailedToObtainAuthType => { err.change_context(errors::ApiErrorResponse::InvalidRequestData { message: "The auth type is invalid for the connector".to_string(), }) } _ => err.change_context(errors::ApiErrorResponse::InvalidRequestData { message: "The request body is invalid".to_string(), }), }) } <file_sep path="hyperswitch/crates/router/src/core/admin.rs" role="context" start="1190" end="1199"> async fn validate_merchant_id( state: &SessionState, merchant_id: &id_type::MerchantId, key_store: &domain::MerchantKeyStore, ) -> RouterResult<domain::MerchantAccount> { let db = &*state.store; db.find_merchant_account_by_merchant_id(&state.into(), merchant_id, key_store) .await .to_not_found_response(errors::ApiErrorResponse::MerchantAccountNotFound) } <file_sep path="hyperswitch/crates/router/src/core/admin.rs" role="context" start="1090" end="1158"> pub async fn merchant_account_delete( state: SessionState, merchant_id: id_type::MerchantId, ) -> RouterResponse<api::MerchantAccountDeleteResponse> { let mut is_deleted = false; let db = state.store.as_ref(); let key_manager_state = &(&state).into(); let merchant_key_store = db .get_merchant_key_store_by_merchant_id( key_manager_state, &merchant_id, &state.store.get_master_key().to_vec().into(), ) .await .to_not_found_response(errors::ApiErrorResponse::MerchantAccountNotFound)?; let merchant_account = db .find_merchant_account_by_merchant_id(key_manager_state, &merchant_id, &merchant_key_store) .await .to_not_found_response(errors::ApiErrorResponse::MerchantAccountNotFound)?; let is_merchant_account_deleted = db .delete_merchant_account_by_merchant_id(&merchant_id) .await .to_not_found_response(errors::ApiErrorResponse::MerchantAccountNotFound)?; if is_merchant_account_deleted { let is_merchant_key_store_deleted = db .delete_merchant_key_store_by_merchant_id(&merchant_id) .await .to_not_found_response(errors::ApiErrorResponse::MerchantAccountNotFound)?; is_deleted = is_merchant_account_deleted && is_merchant_key_store_deleted; } let state = state.clone(); authentication::decision::spawn_tracked_job( async move { authentication::decision::revoke_api_key( &state, merchant_account.publishable_key.into(), ) .await }, authentication::decision::REVOKE, ); match db .delete_config_by_key(merchant_id.get_requires_cvv_key().as_str()) .await { Ok(_) => Ok::<_, errors::ApiErrorResponse>(()), Err(err) => { if err.current_context().is_db_not_found() { crate::logger::error!("requires_cvv config not found in db: {err:?}"); Ok(()) } else { Err(err .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed while deleting requires_cvv config"))? } } } .ok(); let response = api::MerchantAccountDeleteResponse { merchant_id, deleted: is_deleted, }; Ok(service_api::ApplicationResponse::Json(response)) } <file_sep path="hyperswitch/crates/router/src/core/admin.rs" role="context" start="1051" end="1088"> pub async fn merchant_account_update( state: SessionState, merchant_id: &id_type::MerchantId, _profile_id: Option<id_type::ProfileId>, req: api::MerchantAccountUpdate, ) -> RouterResponse<api::MerchantAccountResponse> { let db = state.store.as_ref(); let key_manager_state = &(&state).into(); let key_store = db .get_merchant_key_store_by_merchant_id( key_manager_state, merchant_id, &db.get_master_key().to_vec().into(), ) .await .to_not_found_response(errors::ApiErrorResponse::MerchantAccountNotFound)?; let merchant_account_storage_object = req .get_update_merchant_object(&state, merchant_id, &key_store) .await .attach_printable("Failed to create merchant account update object")?; let response = db .update_specific_fields_in_merchant( key_manager_state, merchant_id, merchant_account_storage_object, &key_store, ) .await .to_not_found_response(errors::ApiErrorResponse::MerchantAccountNotFound)?; Ok(service_api::ApplicationResponse::Json( api::MerchantAccountResponse::foreign_try_from(response) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed while generating response")?, )) } <file_sep path="hyperswitch/crates/router/src/core/admin.rs" role="context" start="850" end="984"> async fn get_update_merchant_object( self, state: &SessionState, merchant_id: &id_type::MerchantId, key_store: &domain::MerchantKeyStore, ) -> RouterResult<storage::MerchantAccountUpdate> { let key_manager_state = &state.into(); let key = key_store.key.get_inner().peek(); let db = state.store.as_ref(); let primary_business_details = self.get_primary_details_as_value().change_context( errors::ApiErrorResponse::InvalidDataValue { field_name: "primary_business_details", }, )?; let pm_collect_link_config = self.get_pm_link_config_as_value().change_context( errors::ApiErrorResponse::InvalidDataValue { field_name: "pm_collect_link_config", }, )?; let merchant_details = self.get_merchant_details_as_secret().change_context( errors::ApiErrorResponse::InvalidDataValue { field_name: "merchant_details", }, )?; self.parse_routing_algorithm().change_context( errors::ApiErrorResponse::InvalidDataValue { field_name: "routing_algorithm", }, )?; let webhook_details = self.webhook_details.map(ForeignInto::foreign_into); let parent_merchant_id = get_parent_merchant( state, self.sub_merchants_enabled, self.parent_merchant_id.as_ref(), key_store, ) .await?; // This supports changing the business profile by passing in the profile_id let business_profile_id_update = if let Some(ref profile_id) = self.default_profile { // Validate whether profile_id passed in request is valid and is linked to the merchant core_utils::validate_and_get_business_profile( state.store.as_ref(), key_manager_state, key_store, Some(profile_id), merchant_id, ) .await? .map(|business_profile| Some(business_profile.get_id().to_owned())) } else { None }; #[cfg(any(feature = "v1", feature = "v2"))] // In order to support backwards compatibility, if a business_labels are passed in the update // call, then create new profiles with the profile_name as business_label self.primary_business_details .clone() .async_map(|primary_business_details| async { let _ = create_profile_from_business_labels( state, db, key_store, merchant_id, primary_business_details, ) .await; }) .await; let identifier = km_types::Identifier::Merchant(key_store.merchant_id.clone()); Ok(storage::MerchantAccountUpdate::Update { merchant_name: self .merchant_name .map(Secret::new) .async_lift(|inner| async { domain_types::crypto_operation( key_manager_state, type_name!(storage::MerchantAccount), domain_types::CryptoOperation::EncryptOptional(inner), identifier.clone(), key, ) .await .and_then(|val| val.try_into_optionaloperation()) }) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to encrypt merchant name")?, merchant_details: merchant_details .async_lift(|inner| async { domain_types::crypto_operation( key_manager_state, type_name!(storage::MerchantAccount), domain_types::CryptoOperation::EncryptOptional(inner), identifier.clone(), key, ) .await .and_then(|val| val.try_into_optionaloperation()) }) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to encrypt merchant details")?, return_url: self.return_url.map(|a| a.to_string()), webhook_details, sub_merchants_enabled: self.sub_merchants_enabled, parent_merchant_id, enable_payment_response_hash: self.enable_payment_response_hash, payment_response_hash_key: self.payment_response_hash_key, redirect_to_merchant_with_http_post: self.redirect_to_merchant_with_http_post, locker_id: self.locker_id, metadata: self.metadata, publishable_key: None, primary_business_details, frm_routing_algorithm: self.frm_routing_algorithm, intent_fulfillment_time: None, #[cfg(feature = "payouts")] payout_routing_algorithm: self.payout_routing_algorithm, #[cfg(not(feature = "payouts"))] payout_routing_algorithm: None, default_profile: business_profile_id_update, payment_link_config: None, pm_collect_link_config, routing_algorithm: self.routing_algorithm, }) } <file_sep path="hyperswitch/crates/router/src/core/admin.rs" role="context" start="281" end="421"> async fn create_domain_model_from_request( self, state: &SessionState, key_store: domain::MerchantKeyStore, identifier: &id_type::MerchantId, ) -> RouterResult<domain::MerchantAccount> { let db = &*state.accounts_store; let publishable_key = create_merchant_publishable_key(); let primary_business_details = self.get_primary_details_as_value().change_context( errors::ApiErrorResponse::InvalidDataValue { field_name: "primary_business_details", }, )?; let webhook_details = self.webhook_details.clone().map(ForeignInto::foreign_into); let pm_collect_link_config = self.get_pm_link_config_as_value().change_context( errors::ApiErrorResponse::InvalidDataValue { field_name: "pm_collect_link_config", }, )?; let merchant_details = self.get_merchant_details_as_secret().change_context( errors::ApiErrorResponse::InvalidDataValue { field_name: "merchant_details", }, )?; self.parse_routing_algorithm() .change_context(errors::ApiErrorResponse::InvalidDataValue { field_name: "routing_algorithm", }) .attach_printable("Invalid routing algorithm given")?; let metadata = self.get_metadata_as_secret().change_context( errors::ApiErrorResponse::InvalidDataValue { field_name: "metadata", }, )?; // Get the enable payment response hash as a boolean, where the default value is true let enable_payment_response_hash = self.get_enable_payment_response_hash(); let payment_response_hash_key = self.get_payment_response_hash_key(); let parent_merchant_id = get_parent_merchant( state, self.sub_merchants_enabled, self.parent_merchant_id.as_ref(), &key_store, ) .await?; let organization = CreateOrValidateOrganization::new(self.organization_id) .create_or_validate(db) .await?; let key = key_store.key.clone().into_inner(); let key_manager_state = state.into(); let merchant_account = async { Ok::<_, error_stack::Report<common_utils::errors::CryptoError>>( domain::MerchantAccountSetter { merchant_id: identifier.clone(), merchant_name: self .merchant_name .async_lift(|inner| async { domain_types::crypto_operation( &key_manager_state, type_name!(domain::MerchantAccount), domain_types::CryptoOperation::EncryptOptional(inner), km_types::Identifier::Merchant(key_store.merchant_id.clone()), key.peek(), ) .await .and_then(|val| val.try_into_optionaloperation()) }) .await?, merchant_details: merchant_details .async_lift(|inner| async { domain_types::crypto_operation( &key_manager_state, type_name!(domain::MerchantAccount), domain_types::CryptoOperation::EncryptOptional(inner), km_types::Identifier::Merchant(key_store.merchant_id.clone()), key.peek(), ) .await .and_then(|val| val.try_into_optionaloperation()) }) .await?, return_url: self.return_url.map(|a| a.to_string()), webhook_details, routing_algorithm: Some(serde_json::json!({ "algorithm_id": null, "timestamp": 0 })), sub_merchants_enabled: self.sub_merchants_enabled, parent_merchant_id, enable_payment_response_hash, payment_response_hash_key, redirect_to_merchant_with_http_post: self .redirect_to_merchant_with_http_post .unwrap_or_default(), publishable_key, locker_id: self.locker_id, metadata, storage_scheme: MerchantStorageScheme::PostgresOnly, primary_business_details, created_at: date_time::now(), modified_at: date_time::now(), intent_fulfillment_time: None, frm_routing_algorithm: self.frm_routing_algorithm, #[cfg(feature = "payouts")] payout_routing_algorithm: self.payout_routing_algorithm, #[cfg(not(feature = "payouts"))] payout_routing_algorithm: None, organization_id: organization.get_organization_id(), is_recon_enabled: false, default_profile: None, recon_status: diesel_models::enums::ReconStatus::NotRequested, payment_link_config: None, pm_collect_link_config, version: common_types::consts::API_VERSION, is_platform_account: false, product_type: self.product_type, }, ) } .await .change_context(errors::ApiErrorResponse::InternalServerError)?; let mut domain_merchant_account = domain::MerchantAccount::from(merchant_account); CreateProfile::new(self.primary_business_details.clone()) .create_profiles(state, &mut domain_merchant_account, &key_store) .await?; Ok(domain_merchant_account) } <file_sep path="hyperswitch/crates/router/tests/utils.rs" role="context" start="389" end="391"> pub struct MerchantId { merchant_id: common_utils::id_type::MerchantId, } <file_sep path="hyperswitch-encryption-service/migrations/2024-05-28-075150_create_dek_table/up.sql" role="context" start="1" end="9"> CREATE TABLE IF NOT EXISTS data_key_store ( id SERIAL PRIMARY KEY, key_identifier VARCHAR(255) NOT NULL, data_identifier VARCHAR(20) NOT NULL, encryption_key bytea NOT NULL, version VARCHAR(30) NOT NULL, created_at TIMESTAMP NOT NULL ); <file_sep path="hyperswitch/crates/api_models/src/errors/types.rs" role="context" start="86" end="100"> pub enum ApiErrorResponse { Unauthorized(ApiError), ForbiddenCommonResource(ApiError), ForbiddenPrivateResource(ApiError), Conflict(ApiError), Gone(ApiError), Unprocessable(ApiError), InternalServerError(ApiError), NotImplemented(ApiError), ConnectorError(ApiError, #[serde(skip_serializing)] StatusCode), NotFound(ApiError), MethodNotAllowed(ApiError), BadRequest(ApiError), DomainError(ApiError), }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/cards_info.rs<|crate|> router anchor=update_card_info kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/cards_info.rs" role="context" start="209" end="233"> async fn update_card_info(&self) -> RouterResult<card_info_models::CardInfo> { let db = self.state.store.as_ref(); let card_info = CardsInfoInterface::update_card_info( db, self.record.card_iin.clone(), card_info_models::UpdateCardInfo { card_issuer: self.record.card_issuer.clone(), card_network: self.record.card_network.clone(), card_type: self.record.card_type.clone(), card_subtype: self.record.card_subtype.clone(), card_issuing_country: self.record.card_issuing_country.clone(), bank_code_id: self.record.bank_code_id.clone(), bank_code: self.record.bank_code.clone(), country_code: self.record.country_code.clone(), last_updated: Some(common_utils::date_time::now()), last_updated_provider: self.record.last_updated_provider.clone(), }, ) .await .to_not_found_response(errors::ApiErrorResponse::GenericNotFoundError { message: "Card info with given key does not exist in our records".to_string(), }) .attach_printable("Failed while updating card info")?; Ok(card_info) } <file_sep path="hyperswitch/crates/router/src/core/cards_info.rs" role="context" start="208" end="208"> use common_utils::fp_utils::when; use diesel_models::cards_info as card_info_models; use rdkafka::message::ToBytes; use crate::{ core::{ errors::{self, RouterResponse, RouterResult, StorageErrorExt}, payments::helpers, }, db::cards_info::CardsInfoInterface, routes, services::ApplicationResponse, types::{ domain, transformers::{ForeignFrom, ForeignInto}, }, }; <file_sep path="hyperswitch/crates/router/src/core/cards_info.rs" role="context" start="252" end="260"> fn set_card_info( self, card_info: card_info_models::CardInfo, ) -> CardInfoBuilder<CardInfoUpdate> { CardInfoBuilder { state: std::marker::PhantomData, card_info: Some(card_info), } } <file_sep path="hyperswitch/crates/router/src/core/cards_info.rs" role="context" start="243" end="248"> fn new() -> Self { Self { state: std::marker::PhantomData, card_info: None, } } <file_sep path="hyperswitch/crates/router/src/core/cards_info.rs" role="context" start="199" end="207"> async fn add_card_info(&self) -> RouterResult<card_info_models::CardInfo> { let db = self.state.store.as_ref(); let card_info = CardsInfoInterface::add_card_info(db, self.record.clone().foreign_into()) .await .to_duplicate_response(errors::ApiErrorResponse::GenericDuplicateError { message: "CardInfo with given key already exists in our records".to_string(), })?; Ok(card_info) } <file_sep path="hyperswitch/crates/router/src/core/cards_info.rs" role="context" start="190" end="197"> async fn fetch_card_info(&self) -> RouterResult<Option<card_info_models::CardInfo>> { let db = self.state.store.as_ref(); let maybe_card_info = db .get_card_info(&self.record.card_iin) .await .change_context(errors::ApiErrorResponse::InvalidCardIin)?; Ok(maybe_card_info) } <file_sep path="hyperswitch/crates/router/src/core/cards_info.rs" role="context" start="76" end="103"> pub async fn update_card_info( state: routes::SessionState, card_info_request: cards_info_api_types::CardInfoUpdateRequest, ) -> RouterResponse<cards_info_api_types::CardInfoResponse> { let db = state.store.as_ref(); CardsInfoInterface::update_card_info( db, card_info_request.card_iin, card_info_models::UpdateCardInfo { card_issuer: card_info_request.card_issuer, card_network: card_info_request.card_network, card_type: card_info_request.card_type, card_subtype: card_info_request.card_subtype, card_issuing_country: card_info_request.card_issuing_country, bank_code_id: card_info_request.bank_code_id, bank_code: card_info_request.bank_code, country_code: card_info_request.country_code, last_updated: Some(common_utils::date_time::now()), last_updated_provider: card_info_request.last_updated_provider, }, ) .await .to_not_found_response(errors::ApiErrorResponse::GenericNotFoundError { message: "Card info with given key does not exist in our records".to_string(), }) .attach_printable("Failed while updating card info") .map(|card_info| ApplicationResponse::Json(card_info.foreign_into())) } <file_sep path="hyperswitch/crates/router/src/connector/payone/transformers.rs" role="context" start="117" end="121"> pub struct Card { card_holder_name: Secret<String>, card_number: CardNumber, expiry_date: Secret<String>, }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/webhooks/outgoing.rs<|crate|> router anchor=trigger_webhook_and_raise_event kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/webhooks/outgoing.rs" role="context" start="198" end="236"> pub(crate) async fn trigger_webhook_and_raise_event( state: SessionState, business_profile: domain::Profile, merchant_key_store: &domain::MerchantKeyStore, event: domain::Event, request_content: OutgoingWebhookRequestContent, delivery_attempt: enums::WebhookDeliveryAttempt, content: Option<api::OutgoingWebhookContent>, process_tracker: Option<storage::ProcessTracker>, ) { logger::debug!( event_id=%event.event_id, idempotent_event_id=?event.idempotent_event_id, initial_attempt_id=?event.initial_attempt_id, "Attempting to send webhook" ); let merchant_id = business_profile.merchant_id.clone(); let trigger_webhook_result = trigger_webhook_to_merchant( state.clone(), business_profile, merchant_key_store, event.clone(), request_content, delivery_attempt, process_tracker, ) .await; let _ = raise_webhooks_analytics_event( state, trigger_webhook_result, content, merchant_id, event, merchant_key_store, ) .await; } <file_sep path="hyperswitch/crates/router/src/core/webhooks/outgoing.rs" role="context" start="197" end="197"> use api_models::{ webhook_events::{OutgoingWebhookRequestContent, OutgoingWebhookResponseContent}, webhooks, }; use diesel_models::process_tracker::business_status; use crate::compatibility::stripe::webhooks as stripe_webhooks; use crate::{ core::{ errors::{self, CustomResult}, metrics, }, db::StorageInterface, events::outgoing_webhook_logs::{ OutgoingWebhookEvent, OutgoingWebhookEventContent, OutgoingWebhookEventMetric, }, logger, routes::{app::SessionStateInfo, SessionState}, services, types::{ api, domain::{self}, storage::{self, enums}, transformers::ForeignFrom, }, utils::{OptionExt, ValueExt}, workflows::outgoing_webhook_retry, }; <file_sep path="hyperswitch/crates/router/src/core/webhooks/outgoing.rs" role="context" start="457" end="530"> async fn raise_webhooks_analytics_event( state: SessionState, trigger_webhook_result: CustomResult<(), errors::WebhooksFlowError>, content: Option<api::OutgoingWebhookContent>, merchant_id: common_utils::id_type::MerchantId, event: domain::Event, merchant_key_store: &domain::MerchantKeyStore, ) { let key_manager_state: &KeyManagerState = &(&state).into(); let event_id = event.event_id; let error = if let Err(error) = trigger_webhook_result { logger::error!(?error, "Failed to send webhook to merchant"); serde_json::to_value(error.current_context()) .change_context(errors::ApiErrorResponse::WebhookProcessingFailure) .inspect_err(|error| { logger::error!(?error, "Failed to serialize outgoing webhook error as JSON"); }) .ok() } else { None }; let outgoing_webhook_event_content = content .as_ref() .and_then(api::OutgoingWebhookContent::get_outgoing_webhook_event_content) .or_else(|| get_outgoing_webhook_event_content_from_event_metadata(event.metadata)); // Fetch updated_event from db let updated_event = state .store .find_event_by_merchant_id_event_id( key_manager_state, &merchant_id, &event_id, merchant_key_store, ) .await .attach_printable_lazy(|| format!("event not found for id: {}", &event_id)) .map_err(|error| { logger::error!(?error); error }) .ok(); // Get status_code from webhook response let status_code = updated_event.and_then(|updated_event| { let webhook_response: Option<OutgoingWebhookResponseContent> = updated_event.response.and_then(|res| { res.peek() .parse_struct("OutgoingWebhookResponseContent") .map_err(|error| { logger::error!(?error, "Error deserializing webhook response"); error }) .ok() }); webhook_response.and_then(|res| res.status_code) }); let webhook_event = OutgoingWebhookEvent::new( state.tenant.tenant_id.clone(), merchant_id, event_id, event.event_type, outgoing_webhook_event_content, error, event.initial_attempt_id, status_code, event.delivery_attempt, ); state.event_handler().log_event(&webhook_event); } <file_sep path="hyperswitch/crates/router/src/core/webhooks/outgoing.rs" role="context" start="238" end="455"> async fn trigger_webhook_to_merchant( state: SessionState, business_profile: domain::Profile, merchant_key_store: &domain::MerchantKeyStore, event: domain::Event, request_content: OutgoingWebhookRequestContent, delivery_attempt: enums::WebhookDeliveryAttempt, process_tracker: Option<storage::ProcessTracker>, ) -> CustomResult<(), errors::WebhooksFlowError> { let webhook_url = match ( get_webhook_url_from_business_profile(&business_profile), process_tracker.clone(), ) { (Ok(webhook_url), _) => Ok(webhook_url), (Err(error), Some(process_tracker)) => { if !error .current_context() .is_webhook_delivery_retryable_error() { logger::debug!("Failed to obtain merchant webhook URL, aborting retries"); state .store .as_scheduler() .finish_process_with_business_status(process_tracker, business_status::FAILURE) .await .change_context( errors::WebhooksFlowError::OutgoingWebhookProcessTrackerTaskUpdateFailed, )?; } Err(error) } (Err(error), None) => Err(error), }?; let event_id = event.event_id; let headers = request_content .headers .into_iter() .map(|(name, value)| (name, value.into_masked())) .collect(); let request = services::RequestBuilder::new() .method(services::Method::Post) .url(&webhook_url) .attach_default_headers() .headers(headers) .set_body(RequestContent::RawBytes( request_content.body.expose().into_bytes(), )) .build(); let response = state .api_client .send_request(&state, request, Some(OUTGOING_WEBHOOK_TIMEOUT_SECS), false) .await; metrics::WEBHOOK_OUTGOING_COUNT.add( 1, router_env::metric_attributes!((MERCHANT_ID, business_profile.merchant_id.clone())), ); logger::debug!(outgoing_webhook_response=?response); match delivery_attempt { enums::WebhookDeliveryAttempt::InitialAttempt => match response { Err(client_error) => { api_client_error_handler( state.clone(), merchant_key_store.clone(), &business_profile.merchant_id, &event_id, client_error, delivery_attempt, ScheduleWebhookRetry::NoSchedule, ) .await? } Ok(response) => { let status_code = response.status(); let updated_event = update_event_in_storage( state.clone(), merchant_key_store.clone(), &business_profile.merchant_id, &event_id, response, ) .await?; if status_code.is_success() { update_overall_delivery_status_in_storage( state.clone(), merchant_key_store.clone(), &business_profile.merchant_id, updated_event, ) .await?; success_response_handler( state.clone(), &business_profile.merchant_id, process_tracker, business_status::INITIAL_DELIVERY_ATTEMPT_SUCCESSFUL, ) .await?; } else { error_response_handler( state.clone(), &business_profile.merchant_id, delivery_attempt, status_code.as_u16(), "Ignoring error when sending webhook to merchant", ScheduleWebhookRetry::NoSchedule, ) .await?; } } }, enums::WebhookDeliveryAttempt::AutomaticRetry => { let process_tracker = process_tracker .get_required_value("process_tracker") .change_context(errors::WebhooksFlowError::OutgoingWebhookRetrySchedulingFailed) .attach_printable("`process_tracker` is unavailable in automatic retry flow")?; match response { Err(client_error) => { api_client_error_handler( state.clone(), merchant_key_store.clone(), &business_profile.merchant_id, &event_id, client_error, delivery_attempt, ScheduleWebhookRetry::WithProcessTracker(Box::new(process_tracker)), ) .await?; } Ok(response) => { let status_code = response.status(); let updated_event = update_event_in_storage( state.clone(), merchant_key_store.clone(), &business_profile.merchant_id, &event_id, response, ) .await?; if status_code.is_success() { update_overall_delivery_status_in_storage( state.clone(), merchant_key_store.clone(), &business_profile.merchant_id, updated_event, ) .await?; success_response_handler( state.clone(), &business_profile.merchant_id, Some(process_tracker), "COMPLETED_BY_PT", ) .await?; } else { error_response_handler( state.clone(), &business_profile.merchant_id, delivery_attempt, status_code.as_u16(), "An error occurred when sending webhook to merchant", ScheduleWebhookRetry::WithProcessTracker(Box::new(process_tracker)), ) .await?; } } } } enums::WebhookDeliveryAttempt::ManualRetry => match response { Err(client_error) => { api_client_error_handler( state.clone(), merchant_key_store.clone(), &business_profile.merchant_id, &event_id, client_error, delivery_attempt, ScheduleWebhookRetry::NoSchedule, ) .await? } Ok(response) => { let status_code = response.status(); let _updated_event = update_event_in_storage( state.clone(), merchant_key_store.clone(), &business_profile.merchant_id, &event_id, response, ) .await?; if status_code.is_success() { increment_webhook_outgoing_received_count(&business_profile.merchant_id); } else { error_response_handler( state, &business_profile.merchant_id, delivery_attempt, status_code.as_u16(), "Ignoring error when sending webhook to merchant", ScheduleWebhookRetry::NoSchedule, ) .await?; } } }, } Ok(()) } <file_sep path="hyperswitch/crates/router/src/core/webhooks/outgoing.rs" role="context" start="52" end="194"> pub(crate) async fn create_event_and_trigger_outgoing_webhook( state: SessionState, merchant_account: domain::MerchantAccount, business_profile: domain::Profile, merchant_key_store: &domain::MerchantKeyStore, event_type: enums::EventType, event_class: enums::EventClass, primary_object_id: String, primary_object_type: enums::EventObjectType, content: api::OutgoingWebhookContent, primary_object_created_at: Option<time::PrimitiveDateTime>, ) -> CustomResult<(), errors::ApiErrorResponse> { let delivery_attempt = enums::WebhookDeliveryAttempt::InitialAttempt; let idempotent_event_id = utils::get_idempotent_event_id(&primary_object_id, event_type, delivery_attempt); let webhook_url_result = get_webhook_url_from_business_profile(&business_profile); if !state.conf.webhooks.outgoing_enabled || webhook_url_result.is_err() || webhook_url_result.as_ref().is_ok_and(String::is_empty) { logger::debug!( business_profile_id=?business_profile.get_id(), %idempotent_event_id, "Outgoing webhooks are disabled in application configuration, or merchant webhook URL \ could not be obtained; skipping outgoing webhooks for event" ); return Ok(()); } let event_id = utils::generate_event_id(); let merchant_id = business_profile.merchant_id.clone(); let now = common_utils::date_time::now(); let outgoing_webhook = api::OutgoingWebhook { merchant_id: merchant_id.clone(), event_id: event_id.clone(), event_type, content: content.clone(), timestamp: now, }; let request_content = get_outgoing_webhook_request(&merchant_account, outgoing_webhook, &business_profile) .change_context(errors::ApiErrorResponse::WebhookProcessingFailure) .attach_printable("Failed to construct outgoing webhook request content")?; let event_metadata = storage::EventMetadata::foreign_from(&content); let key_manager_state = &(&state).into(); let new_event = domain::Event { event_id: event_id.clone(), event_type, event_class, is_webhook_notified: false, primary_object_id, primary_object_type, created_at: now, merchant_id: Some(business_profile.merchant_id.clone()), business_profile_id: Some(business_profile.get_id().to_owned()), primary_object_created_at, idempotent_event_id: Some(idempotent_event_id.clone()), initial_attempt_id: Some(event_id.clone()), request: Some( crypto_operation( key_manager_state, type_name!(domain::Event), CryptoOperation::Encrypt( request_content .encode_to_string_of_json() .change_context(errors::ApiErrorResponse::WebhookProcessingFailure) .attach_printable("Failed to encode outgoing webhook request content") .map(Secret::new)?, ), Identifier::Merchant(merchant_key_store.merchant_id.clone()), merchant_key_store.key.get_inner().peek(), ) .await .and_then(|val| val.try_into_operation()) .change_context(errors::ApiErrorResponse::WebhookProcessingFailure) .attach_printable("Failed to encrypt outgoing webhook request content")?, ), response: None, delivery_attempt: Some(delivery_attempt), metadata: Some(event_metadata), is_overall_delivery_successful: Some(false), }; let event_insert_result = state .store .insert_event(key_manager_state, new_event, merchant_key_store) .await; let event = match event_insert_result { Ok(event) => Ok(event), Err(error) => { if error.current_context().is_db_unique_violation() { logger::debug!("Event with idempotent ID `{idempotent_event_id}` already exists in the database"); return Ok(()); } else { logger::error!(event_insertion_failure=?error); Err(error .change_context(errors::ApiErrorResponse::WebhookProcessingFailure) .attach_printable("Failed to insert event in events table")) } } }?; let process_tracker = add_outgoing_webhook_retry_task_to_process_tracker( &*state.store, &business_profile, &event, ) .await .inspect_err(|error| { logger::error!( ?error, "Failed to add outgoing webhook retry task to process tracker" ); }) .ok(); let cloned_key_store = merchant_key_store.clone(); // Using a tokio spawn here and not arbiter because not all caller of this function // may have an actix arbiter tokio::spawn( async move { Box::pin(trigger_webhook_and_raise_event( state, business_profile, &cloned_key_store, event, request_content, delivery_attempt, Some(content), process_tracker, )) .await; } .in_current_span(), ); Ok(()) } <file_sep path="hyperswitch/crates/router/src/types/domain/event.rs" role="context" start="21" end="74"> pub struct Event { /// A string that uniquely identifies the event. pub event_id: String, /// Represents the type of event for the webhook. pub event_type: EventType, /// Represents the class of event for the webhook. pub event_class: EventClass, /// Indicates whether the current webhook delivery was successful. pub is_webhook_notified: bool, /// Reference to the object for which the webhook was created. pub primary_object_id: String, /// Type of the object type for which the webhook was created. pub primary_object_type: EventObjectType, /// The timestamp when the webhook was created. pub created_at: time::PrimitiveDateTime, /// Merchant Account identifier to which the object is associated with. pub merchant_id: Option<common_utils::id_type::MerchantId>, /// Business Profile identifier to which the object is associated with. pub business_profile_id: Option<common_utils::id_type::ProfileId>, /// The timestamp when the primary object was created. pub primary_object_created_at: Option<time::PrimitiveDateTime>, /// This allows the event to be uniquely identified to prevent multiple processing. pub idempotent_event_id: Option<String>, /// Links to the initial attempt of the event. pub initial_attempt_id: Option<String>, /// This field contains the encrypted request data sent as part of the event. #[encrypt] pub request: Option<Encryptable<Secret<String>>>, /// This field contains the encrypted response data received as part of the event. #[encrypt] pub response: Option<Encryptable<Secret<String>>>, /// Represents the event delivery type. pub delivery_attempt: Option<WebhookDeliveryAttempt>, /// Holds any additional data related to the event. pub metadata: Option<EventMetadata>, /// Indicates whether the event was ultimately delivered. pub is_overall_delivery_successful: Option<bool>, } <file_sep path="hyperswitch/migrations/2022-09-29-084920_create_initial_tables/up.sql" role="context" start="279" end="295"> phone_country_code VARCHAR(255), description VARCHAR(255), address JSON, created_at TIMESTAMP NOT NULL DEFAULT now()::TIMESTAMP, metadata JSON, PRIMARY KEY (customer_id, merchant_id) ); CREATE TABLE events ( id SERIAL PRIMARY KEY, event_id VARCHAR(255) NOT NULL, event_type "EventType" NOT NULL, event_class "EventClass" NOT NULL, is_webhook_notified BOOLEAN NOT NULL DEFAULT FALSE, intent_reference_id VARCHAR(255), primary_object_id VARCHAR(255) NOT NULL, primary_object_type "EventObjectType" NOT NULL, <file_sep path="hyperswitch/crates/api_models/src/webhooks.rs" role="context" start="337" end="349"> pub enum OutgoingWebhookContent { #[schema(value_type = PaymentsResponse, title = "PaymentsResponse")] PaymentDetails(Box<payments::PaymentsResponse>), #[schema(value_type = RefundResponse, title = "RefundResponse")] RefundDetails(Box<refunds::RefundResponse>), #[schema(value_type = DisputeResponse, title = "DisputeResponse")] DisputeDetails(Box<disputes::DisputeResponse>), #[schema(value_type = MandateResponse, title = "MandateResponse")] MandateDetails(Box<mandates::MandateResponse>), #[cfg(feature = "payouts")] #[schema(value_type = PayoutCreateResponse, title = "PayoutCreateResponse")] PayoutDetails(Box<payouts::PayoutCreateResponse>), }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/refunds.rs<|crate|> router anchor=add_refund_sync_task kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/refunds.rs" role="context" start="1606" end="1642"> pub async fn add_refund_sync_task( db: &dyn db::StorageInterface, refund: &storage::Refund, runner: storage::ProcessTrackerRunner, ) -> RouterResult<storage::ProcessTracker> { let task = "SYNC_REFUND"; let process_tracker_id = format!("{runner}_{task}_{}", refund.internal_reference_id); let schedule_time = common_utils::date_time::now(); let refund_workflow_tracking_data = refund_to_refund_core_workflow_model(refund); let tag = ["REFUND"]; let process_tracker_entry = storage::ProcessTrackerNew::new( process_tracker_id, task, runner, tag, refund_workflow_tracking_data, None, schedule_time, common_types::consts::API_VERSION, ) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to construct refund sync process tracker task")?; let response = db .insert_process(process_tracker_entry) .await .to_duplicate_response(errors::ApiErrorResponse::DuplicateRefundRequest) .attach_printable_lazy(|| { format!( "Failed while inserting task in process_tracker: refund_id: {}", refund.refund_id ) })?; metrics::TASKS_ADDED_COUNT.add(1, router_env::metric_attributes!(("flow", "Refund"))); Ok(response) } <file_sep path="hyperswitch/crates/router/src/core/refunds.rs" role="context" start="1605" end="1605"> use common_utils::{ ext_traits::AsyncExt, types::{ConnectorTransactionId, MinorUnit}, }; use diesel_models::process_tracker::business_status; use router_env::{instrument, tracing}; use crate::{ consts, core::{ errors::{self, ConnectorErrorExt, RouterResponse, RouterResult, StorageErrorExt}, payments::{self, access_token, helpers}, refunds::transformers::SplitRefundInput, utils as core_utils, }, db, logger, routes::{metrics, SessionState}, services, types::{ self, api::{self, refunds}, domain, storage::{self, enums}, transformers::{ForeignFrom, ForeignInto}, }, utils::{self, OptionExt}, workflows::payment_sync, }; <file_sep path="hyperswitch/crates/router/src/core/refunds.rs" role="context" start="1681" end="1707"> pub async fn get_refund_sync_process_schedule_time( db: &dyn db::StorageInterface, connector: &str, merchant_id: &common_utils::id_type::MerchantId, retry_count: i32, ) -> Result<Option<time::PrimitiveDateTime>, errors::ProcessTrackerError> { let redis_mapping: errors::CustomResult<process_data::ConnectorPTMapping, errors::RedisError> = db::get_and_deserialize_key( db, &format!("pt_mapping_refund_sync_{connector}"), "ConnectorPTMapping", ) .await; let mapping = match redis_mapping { Ok(x) => x, Err(err) => { logger::error!("Error: while getting connector mapping: {err:?}"); process_data::ConnectorPTMapping::default() } }; let time_delta = process_tracker_utils::get_schedule_time(mapping, merchant_id, retry_count + 1); Ok(process_tracker_utils::get_time_from_delta(time_delta)) } <file_sep path="hyperswitch/crates/router/src/core/refunds.rs" role="context" start="1645" end="1679"> pub async fn add_refund_execute_task( db: &dyn db::StorageInterface, refund: &storage::Refund, runner: storage::ProcessTrackerRunner, ) -> RouterResult<storage::ProcessTracker> { let task = "EXECUTE_REFUND"; let process_tracker_id = format!("{runner}_{task}_{}", refund.internal_reference_id); let tag = ["REFUND"]; let schedule_time = common_utils::date_time::now(); let refund_workflow_tracking_data = refund_to_refund_core_workflow_model(refund); let process_tracker_entry = storage::ProcessTrackerNew::new( process_tracker_id, task, runner, tag, refund_workflow_tracking_data, None, schedule_time, common_types::consts::API_VERSION, ) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to construct refund execute process tracker task")?; let response = db .insert_process(process_tracker_entry) .await .to_duplicate_response(errors::ApiErrorResponse::DuplicateRefundRequest) .attach_printable_lazy(|| { format!( "Failed while inserting task in process_tracker: refund_id: {}", refund.refund_id ) })?; Ok(response) } <file_sep path="hyperswitch/crates/router/src/core/refunds.rs" role="context" start="1593" end="1603"> pub fn refund_to_refund_core_workflow_model( refund: &storage::Refund, ) -> storage::RefundCoreWorkflow { storage::RefundCoreWorkflow { refund_internal_reference_id: refund.internal_reference_id.clone(), connector_transaction_id: refund.connector_transaction_id.clone(), merchant_id: refund.merchant_id.clone(), payment_id: refund.payment_id.clone(), processor_transaction_data: refund.processor_transaction_data.clone(), } } <file_sep path="hyperswitch/crates/router/src/core/refunds.rs" role="context" start="1472" end="1590"> pub async fn trigger_refund_execute_workflow( state: &SessionState, refund_tracker: &storage::ProcessTracker, ) -> Result<(), errors::ProcessTrackerError> { let db = &*state.store; let refund_core = serde_json::from_value::<storage::RefundCoreWorkflow>(refund_tracker.tracking_data.clone()) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable_lazy(|| { format!( "unable to convert into refund_core {:?}", refund_tracker.tracking_data ) })?; let key_manager_state = &state.into(); let key_store = state .store .get_merchant_key_store_by_merchant_id( key_manager_state, &refund_core.merchant_id, &state.store.get_master_key().to_vec().into(), ) .await?; let merchant_account = db .find_merchant_account_by_merchant_id( key_manager_state, &refund_core.merchant_id, &key_store, ) .await .to_not_found_response(errors::ApiErrorResponse::MerchantAccountNotFound)?; let refund = db .find_refund_by_internal_reference_id_merchant_id( &refund_core.refund_internal_reference_id, &refund_core.merchant_id, merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::RefundNotFound)?; match (&refund.sent_to_gateway, &refund.refund_status) { (false, enums::RefundStatus::Pending) => { let merchant_account = db .find_merchant_account_by_merchant_id( key_manager_state, &refund.merchant_id, &key_store, ) .await .to_not_found_response(errors::ApiErrorResponse::MerchantAccountNotFound)?; let payment_attempt = db .find_payment_attempt_by_connector_transaction_id_payment_id_merchant_id( &refund.connector_transaction_id, &refund_core.payment_id, &refund.merchant_id, merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::PaymentNotFound)?; let payment_intent = db .find_payment_intent_by_payment_id_merchant_id( &(state.into()), &payment_attempt.payment_id, &refund.merchant_id, &key_store, merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::PaymentNotFound)?; let split_refunds = core_utils::get_split_refunds(SplitRefundInput { split_payment_request: payment_intent.split_payments.clone(), payment_charges: payment_attempt.charges.clone(), charge_id: payment_attempt.charge_id.clone(), refund_request: refund.split_refunds.clone(), })?; //trigger refund request to gateway let updated_refund = Box::pin(trigger_refund_to_gateway( state, &refund, &merchant_account, &key_store, &payment_attempt, &payment_intent, None, split_refunds, )) .await?; add_refund_sync_task( db, &updated_refund, storage::ProcessTrackerRunner::RefundWorkflowRouter, ) .await?; } (true, enums::RefundStatus::Pending) => { // create sync task add_refund_sync_task( db, &refund, storage::ProcessTrackerRunner::RefundWorkflowRouter, ) .await?; } (_, _) => { //mark task as finished db.as_scheduler() .finish_process_with_business_status( refund_tracker.clone(), business_status::COMPLETED_BY_PT, ) .await?; } }; Ok(()) } <file_sep path="hyperswitch/crates/router/src/core/refunds.rs" role="context" start="1290" end="1380"> pub async fn schedule_refund_execution( state: &SessionState, refund: storage::Refund, refund_type: api_models::refunds::RefundType, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, payment_attempt: &storage::PaymentAttempt, payment_intent: &storage::PaymentIntent, creds_identifier: Option<String>, split_refunds: Option<SplitRefundsRequest>, ) -> RouterResult<storage::Refund> { // refunds::RefundResponse> { let db = &*state.store; let runner = storage::ProcessTrackerRunner::RefundWorkflowRouter; let task = "EXECUTE_REFUND"; let task_id = format!("{runner}_{task}_{}", refund.internal_reference_id); let refund_process = db .find_process_by_id(&task_id) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to find the process id")?; let result = match refund.refund_status { enums::RefundStatus::Pending | enums::RefundStatus::ManualReview => { match (refund.sent_to_gateway, refund_process) { (false, None) => { // Execute the refund task based on refund_type match refund_type { api_models::refunds::RefundType::Scheduled => { add_refund_execute_task(db, &refund, runner) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable_lazy(|| format!("Failed while pushing refund execute task to scheduler, refund_id: {}", refund.refund_id))?; Ok(refund) } api_models::refunds::RefundType::Instant => { let update_refund = Box::pin(trigger_refund_to_gateway( state, &refund, merchant_account, key_store, payment_attempt, payment_intent, creds_identifier, split_refunds, )) .await; match update_refund { Ok(updated_refund_data) => { add_refund_sync_task(db, &updated_refund_data, runner) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable_lazy(|| format!( "Failed while pushing refund sync task in scheduler: refund_id: {}", refund.refund_id ))?; Ok(updated_refund_data) } Err(err) => Err(err), } } } } _ => { // Sync the refund for status check //[#300]: return refund status response match refund_type { api_models::refunds::RefundType::Scheduled => { add_refund_sync_task(db, &refund, runner) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable_lazy(|| format!("Failed while pushing refund sync task in scheduler: refund_id: {}", refund.refund_id))?; Ok(refund) } api_models::refunds::RefundType::Instant => { // [#255]: This is not possible in schedule_refund_execution as it will always be scheduled // sync_refund_with_gateway(data, &refund).await Ok(refund) } } } } } // [#255]: This is not allowed to be otherwise or all _ => Ok(refund), }?; Ok(result) } <file_sep path="hyperswitch/v2_compatible_migrations/2024-08-28-081721_add_v2_columns/up.sql" role="context" start="59" end="70"> ALTER TABLE merchant_connector_account ADD COLUMN IF NOT EXISTS feature_metadata JSONB; ALTER TABLE payment_methods ADD COLUMN IF NOT EXISTS locker_fingerprint_id VARCHAR(64), ADD COLUMN IF NOT EXISTS payment_method_type_v2 VARCHAR(64), ADD COLUMN IF NOT EXISTS payment_method_subtype VARCHAR(64); ALTER TABLE refund ADD COLUMN IF NOT EXISTS id VARCHAR(64), ADD COLUMN IF NOT EXISTS merchant_reference_id VARCHAR(64), ADD COLUMN IF NOT EXISTS connector_id VARCHAR(64); <file_sep path="hyperswitch/postman/collection-dir/powertranz/Flow Testcases/Happy Cases/Scenario1-Create payment with confirm true/Payments - Create/event.test.js" role="context" start="61" end="78"> "INFO - Unable to assign variable {{client_secret}}, as jsonData.client_secret is undefined.", ); } // Response body should have value "succeeded" for "status" if (jsonData?.status) { pm.test( "[POST]::/payments - Content check if value for 'status' matches 'succeeded'", function () { pm.expect(jsonData.status).to.eql("succeeded"); }, ); }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/payment_methods/cards.rs<|crate|> router anchor=populate_bin_details_for_masked_card kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="519" end="553"> pub async fn populate_bin_details_for_masked_card( card_details: &api_models::payment_methods::MigrateCardDetail, db: &dyn db::StorageInterface, ) -> errors::CustomResult<api::CardDetailFromLocker, errors::ApiErrorResponse> { migration::validate_card_expiry(&card_details.card_exp_month, &card_details.card_exp_year)?; let card_number = card_details.card_number.clone(); let (card_isin, _last4_digits) = get_card_bin_and_last4_digits_for_masked_card( card_number.peek(), ) .change_context(errors::ApiErrorResponse::InvalidRequestData { message: "Invalid card number".to_string(), })?; let card_bin_details = if card_details.card_issuer.is_some() && card_details.card_network.is_some() && card_details.card_type.is_some() && card_details.card_issuing_country.is_some() { api_models::payment_methods::CardDetailFromLocker::foreign_try_from((card_details, None))? } else { let card_info = db .get_card_info(&card_isin) .await .map_err(|error| services::logger::error!(card_info_error=?error)) .ok() .flatten(); api_models::payment_methods::CardDetailFromLocker::foreign_try_from(( card_details, card_info, ))? }; Ok(card_bin_details) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="518" end="518"> _req: api::PaymentMethodMigrate, _merchant_id: &id_type::MerchantId, _merchant_account: &domain::MerchantAccount, _key_store: &domain::MerchantKeyStore, ) -> errors::RouterResponse<api::PaymentMethodMigrateResponse> { todo!() } #[cfg(all( any(feature = "v1", feature = "v2"), not(feature = "payment_methods_v2") ))] pub async fn populate_bin_details_for_masked_card( card_details: &api_models::payment_methods::MigrateCardDetail, db: &dyn db::StorageInterface, ) -> errors::CustomResult<api::CardDetailFromLocker, errors::ApiErrorResponse> { migration::validate_card_expiry(&card_details.card_exp_month, &card_details.card_exp_year)?; let card_number = card_details.card_number.clone(); let (card_isin, _last4_digits) = get_card_bin_and_last4_digits_for_masked_card( card_number.peek(), ) .change_context(errors::ApiErrorResponse::InvalidRequestData { message: "Invalid card number".to_string(), })?; <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="641" end="710"> fn foreign_try_from( (card_details, card_info): ( &api_models::payment_methods::MigrateCardDetail, Option<diesel_models::CardInfo>, ), ) -> Result<Self, Self::Error> { let (card_isin, last4_digits) = get_card_bin_and_last4_digits_for_masked_card(card_details.card_number.peek()) .change_context(errors::ApiErrorResponse::InvalidRequestData { message: "Invalid card number".to_string(), })?; if let Some(card_bin_info) = card_info { Ok(Self { last4_digits: Some(last4_digits.clone()), issuer_country: card_details .card_issuing_country .as_ref() .map(|c| api_enums::CountryAlpha2::from_str(c)) .transpose() .ok() .flatten() .or(card_bin_info .card_issuing_country .as_ref() .map(|c| api_enums::CountryAlpha2::from_str(c)) .transpose() .ok() .flatten()), card_number: None, expiry_month: Some(card_details.card_exp_month.clone()), expiry_year: Some(card_details.card_exp_year.clone()), card_fingerprint: None, card_holder_name: card_details.card_holder_name.clone(), nick_name: card_details.nick_name.clone(), card_isin: Some(card_isin.clone()), card_issuer: card_details .card_issuer .clone() .or(card_bin_info.card_issuer), card_network: card_details .card_network .clone() .or(card_bin_info.card_network), card_type: card_details.card_type.clone().or(card_bin_info.card_type), saved_to_locker: false, }) } else { Ok(Self { last4_digits: Some(last4_digits.clone()), issuer_country: card_details .card_issuing_country .as_ref() .map(|c| api_enums::CountryAlpha2::from_str(c)) .transpose() .ok() .flatten(), card_number: None, expiry_month: Some(card_details.card_exp_month.clone()), expiry_year: Some(card_details.card_exp_year.clone()), card_fingerprint: None, card_holder_name: card_details.card_holder_name.clone(), nick_name: card_details.nick_name.clone(), card_isin: Some(card_isin.clone()), card_issuer: card_details.card_issuer.clone(), card_network: card_details.card_network.clone(), card_type: card_details.card_type.clone(), saved_to_locker: false, }) } } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="566" end="630"> fn foreign_try_from( (card_details, card_info): ( &api_models::payment_methods::MigrateCardDetail, Option<diesel_models::CardInfo>, ), ) -> Result<Self, Self::Error> { let (card_isin, last4_digits) = get_card_bin_and_last4_digits_for_masked_card(card_details.card_number.peek()) .change_context(errors::ApiErrorResponse::InvalidRequestData { message: "Invalid card number".to_string(), })?; if let Some(card_bin_info) = card_info { Ok(Self { scheme: card_details .card_network .clone() .or(card_bin_info.card_network.clone()) .map(|card_network| card_network.to_string()), last4_digits: Some(last4_digits.clone()), issuer_country: card_details .card_issuing_country .clone() .or(card_bin_info.card_issuing_country), card_number: None, expiry_month: Some(card_details.card_exp_month.clone()), expiry_year: Some(card_details.card_exp_year.clone()), card_token: None, card_fingerprint: None, card_holder_name: card_details.card_holder_name.clone(), nick_name: card_details.nick_name.clone(), card_isin: Some(card_isin.clone()), card_issuer: card_details .card_issuer .clone() .or(card_bin_info.card_issuer), card_network: card_details .card_network .clone() .or(card_bin_info.card_network), card_type: card_details.card_type.clone().or(card_bin_info.card_type), saved_to_locker: false, }) } else { Ok(Self { scheme: card_details .card_network .clone() .map(|card_network| card_network.to_string()), last4_digits: Some(last4_digits.clone()), issuer_country: card_details.card_issuing_country.clone(), card_number: None, expiry_month: Some(card_details.card_exp_month.clone()), expiry_year: Some(card_details.card_exp_year.clone()), card_token: None, card_fingerprint: None, card_holder_name: card_details.card_holder_name.clone(), nick_name: card_details.nick_name.clone(), card_isin: Some(card_isin.clone()), card_issuer: card_details.card_issuer.clone(), card_network: card_details.card_network.clone(), card_type: card_details.card_type.clone(), saved_to_locker: false, }) } } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="505" end="513"> pub async fn migrate_payment_method( _state: routes::SessionState, _req: api::PaymentMethodMigrate, _merchant_id: &id_type::MerchantId, _merchant_account: &domain::MerchantAccount, _key_store: &domain::MerchantKeyStore, ) -> errors::RouterResponse<api::PaymentMethodMigrateResponse> { todo!() } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="381" end="502"> pub async fn migrate_payment_method( state: routes::SessionState, req: api::PaymentMethodMigrate, merchant_id: &id_type::MerchantId, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, ) -> errors::RouterResponse<api::PaymentMethodMigrateResponse> { let mut req = req; let card_details = &req.card.get_required_value("card")?; let card_number_validation_result = cards::CardNumber::from_str(card_details.card_number.peek()); let card_bin_details = populate_bin_details_for_masked_card(card_details, &*state.store).await?; req.card = Some(api_models::payment_methods::MigrateCardDetail { card_issuing_country: card_bin_details.issuer_country.clone(), card_network: card_bin_details.card_network.clone(), card_issuer: card_bin_details.card_issuer.clone(), card_type: card_bin_details.card_type.clone(), ..card_details.clone() }); if let Some(connector_mandate_details) = &req.connector_mandate_details { helpers::validate_merchant_connector_ids_in_connector_mandate_details( &state, key_store, connector_mandate_details, merchant_id, card_bin_details.card_network.clone(), ) .await?; }; let should_require_connector_mandate_details = req.network_token.is_none(); let mut migration_status = migration::RecordMigrationStatusBuilder::new(); let resp = match card_number_validation_result { Ok(card_number) => { let payment_method_create_request = api::PaymentMethodCreate::get_payment_method_create_from_payment_method_migrate( card_number, &req, ); logger::debug!("Storing the card in locker and migrating the payment method"); get_client_secret_or_add_payment_method_for_migration( &state, payment_method_create_request, merchant_account, key_store, &mut migration_status, ) .await? } Err(card_validation_error) => { logger::debug!("Card number to be migrated is invalid, skip saving in locker {card_validation_error}"); skip_locker_call_and_migrate_payment_method( &state, &req, merchant_id.to_owned(), key_store, merchant_account, card_bin_details.clone(), should_require_connector_mandate_details, &mut migration_status, ) .await? } }; let payment_method_response = match resp { services::ApplicationResponse::Json(response) => response, _ => Err(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to fetch the payment method response")?, }; let pm_id = payment_method_response.payment_method_id.clone(); let network_token = req.network_token.clone(); let network_token_migrated = match network_token { Some(nt_detail) => { logger::debug!("Network token migration"); let network_token_requestor_ref_id = nt_detail.network_token_requestor_ref_id.clone(); let network_token_data = &nt_detail.network_token_data; Some( save_network_token_and_update_payment_method( &state, &req, key_store, merchant_account, network_token_data, network_token_requestor_ref_id, pm_id, ) .await .map_err(|err| logger::error!(?err, "Failed to save network token")) .ok() .unwrap_or_default(), ) } None => { logger::debug!("Network token data is not available"); None } }; migration_status.network_token_migrated(network_token_migrated); let migrate_status = migration_status.build(); Ok(services::ApplicationResponse::Json( api::PaymentMethodMigrateResponse { payment_method_response, card_migrated: migrate_status.card_migrated, network_token_migrated: migrate_status.network_token_migrated, connector_mandate_details_migrated: migrate_status.connector_mandate_details_migrated, network_transaction_id_migrated: migrate_status.network_transaction_migrated, }, )) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="1005" end="1023"> pub fn get_card_bin_and_last4_digits_for_masked_card( masked_card_number: &str, ) -> Result<(String, String), cards::CardNumberValidationErr> { let last4_digits = masked_card_number .chars() .rev() .take(4) .collect::<String>() .chars() .rev() .collect::<String>(); let card_isin = masked_card_number.chars().take(6).collect::<String>(); cards::validate::validate_card_number_chars(&card_isin) .and_then(|_| cards::validate::validate_card_number_chars(&last4_digits))?; Ok((card_isin, last4_digits)) } <file_sep path="hyperswitch/crates/router/src/db.rs" role="context" start="90" end="147"> pub trait StorageInterface: Send + Sync + dyn_clone::DynClone + address::AddressInterface + api_keys::ApiKeyInterface + blocklist_lookup::BlocklistLookupInterface + configs::ConfigInterface + capture::CaptureInterface + customers::CustomerInterface + dashboard_metadata::DashboardMetadataInterface + dispute::DisputeInterface + ephemeral_key::EphemeralKeyInterface + ephemeral_key::ClientSecretInterface + events::EventInterface + file::FileMetadataInterface + FraudCheckInterface + locker_mock_up::LockerMockUpInterface + mandate::MandateInterface + merchant_account::MerchantAccountInterface + merchant_connector_account::ConnectorAccessToken + merchant_connector_account::MerchantConnectorAccountInterface + PaymentAttemptInterface<Error = StorageError> + PaymentIntentInterface<Error = StorageError> + PaymentMethodInterface<Error = StorageError> + blocklist::BlocklistInterface + blocklist_fingerprint::BlocklistFingerprintInterface + dynamic_routing_stats::DynamicRoutingStatsInterface + scheduler::SchedulerInterface + PayoutAttemptInterface<Error = StorageError> + PayoutsInterface<Error = StorageError> + refund::RefundInterface + reverse_lookup::ReverseLookupInterface + cards_info::CardsInfoInterface + merchant_key_store::MerchantKeyStoreInterface + MasterKeyInterface + payment_link::PaymentLinkInterface + RedisConnInterface + RequestIdStore + business_profile::ProfileInterface + routing_algorithm::RoutingAlgorithmInterface + gsm::GsmInterface + unified_translations::UnifiedTranslationsInterface + authorization::AuthorizationInterface + user::sample_data::BatchSampleDataInterface + health_check::HealthCheckDbInterface + user_authentication_method::UserAuthenticationMethodInterface + authentication::AuthenticationInterface + generic_link::GenericLinkInterface + relay::RelayInterface + user::theme::ThemeInterface + payment_method_session::PaymentMethodsSessionInterface + 'static { fn get_scheduler_db(&self) -> Box<dyn scheduler::SchedulerInterface>; fn get_cache_store(&self) -> Box<(dyn RedisConnInterface + Send + Sync + 'static)>; } <file_sep path="hyperswitch/crates/api_models/src/errors/types.rs" role="context" start="86" end="100"> pub enum ApiErrorResponse { Unauthorized(ApiError), ForbiddenCommonResource(ApiError), ForbiddenPrivateResource(ApiError), Conflict(ApiError), Gone(ApiError), Unprocessable(ApiError), InternalServerError(ApiError), NotImplemented(ApiError), ConnectorError(ApiError, #[serde(skip_serializing)] StatusCode), NotFound(ApiError), MethodNotAllowed(ApiError), BadRequest(ApiError), DomainError(ApiError), }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/payment_methods/vault.rs<|crate|> router anchor=delete_tokenized_data kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/payment_methods/vault.rs" role="context" start="1141" end="1184"> pub async fn delete_tokenized_data( state: &routes::SessionState, lookup_key: &str, ) -> RouterResult<()> { let redis_key = get_redis_locker_key(lookup_key); let func = || async { metrics::DELETED_TOKENIZED_CARD.add(1, &[]); let redis_conn = state .store .get_redis_conn() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to get redis connection")?; let response = redis_conn.delete_key(&redis_key.as_str().into()).await; match response { Ok(redis_interface::DelReply::KeyDeleted) => Ok(()), Ok(redis_interface::DelReply::KeyNotDeleted) => { Err(errors::ApiErrorResponse::InternalServerError) .attach_printable("Token invalid or expired") } Err(err) => { metrics::TEMP_LOCKER_FAILURES.add(1, &[]); Err(errors::ApiErrorResponse::InternalServerError).attach_printable_lazy(|| { format!("Failed to delete from redis locker: {err:?}") }) } } }; match func().await { Ok(s) => { logger::info!( "Delete payload in redis locker successful with lookup key: {:?}", redis_key ); Ok(s) } Err(err) => { logger::error!("Redis Temp locker Failed: {:?}", err); Err(err) } } } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/vault.rs" role="context" start="1140" end="1140"> use crate::{ consts, core::errors::{self, CustomResult, RouterResult}, db, logger, routes, routes::metrics, types::{ api, domain, storage::{self, enums}, }, utils::StringExt, }; <file_sep path="hyperswitch/crates/router/src/core/payment_methods/vault.rs" role="context" start="1222" end="1251"> pub async fn call_to_vault<V: pm_types::VaultingInterface>( state: &routes::SessionState, payload: Vec<u8>, ) -> CustomResult<String, errors::VaultError> { let locker = &state.conf.locker; let jwekey = state.conf.jwekey.get_inner(); let request = create_vault_request::<V>(jwekey, locker, payload, state.tenant.tenant_id.to_owned()) .await?; let response = services::call_connector_api(state, request, V::get_vaulting_flow_name()) .await .change_context(errors::VaultError::VaultAPIError); let jwe_body: services::JweBody = response .get_response_inner("JweBody") .change_context(errors::VaultError::ResponseDeserializationFailed) .attach_printable("Failed to get JweBody from vault response")?; let decrypted_payload = pm_transforms::get_decrypted_vault_response_payload( jwekey, jwe_body, locker.decryption_scheme.clone(), ) .await .change_context(errors::VaultError::ResponseDecryptionFailed) .attach_printable("Error getting decrypted vault response payload")?; Ok(decrypted_payload) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/vault.rs" role="context" start="1187" end="1218"> async fn create_vault_request<R: pm_types::VaultingInterface>( jwekey: &settings::Jwekey, locker: &settings::Locker, payload: Vec<u8>, tenant_id: id_type::TenantId, ) -> CustomResult<request::Request, errors::VaultError> { let private_key = jwekey.vault_private_key.peek().as_bytes(); let jws = services::encryption::jws_sign_payload( &payload, &locker.locker_signing_key_id, private_key, ) .await .change_context(errors::VaultError::RequestEncryptionFailed)?; let jwe_payload = pm_transforms::create_jwe_body_for_vault(jwekey, &jws).await?; let mut url = locker.host.to_owned(); url.push_str(R::get_vaulting_request_url()); let mut request = request::Request::new(services::Method::Post, &url); request.add_header( headers::CONTENT_TYPE, consts::VAULT_HEADER_CONTENT_TYPE.into(), ); request.add_header( headers::X_TENANT_ID, tenant_id.get_string_repr().to_owned().into(), ); request.set_body(request::RequestContent::Json(Box::new(jwe_payload))); Ok(request) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/vault.rs" role="context" start="1076" end="1138"> pub async fn get_tokenized_data( state: &routes::SessionState, lookup_key: &str, _should_get_value2: bool, encryption_key: &masking::Secret<Vec<u8>>, ) -> RouterResult<api::TokenizePayloadRequest> { let redis_key = get_redis_locker_key(lookup_key); let func = || async { metrics::GET_TOKENIZED_CARD.add(1, &[]); let redis_conn = state .store .get_redis_conn() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to get redis connection")?; let response = redis_conn .get_key::<bytes::Bytes>(&redis_key.as_str().into()) .await; match response { Ok(resp) => { let decrypted_payload = GcmAes256 .decode_message( encryption_key.peek().as_ref(), masking::Secret::new(resp.into()), ) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to decode redis temp locker data")?; let get_response: api::TokenizePayloadRequest = bytes::Bytes::from(decrypted_payload) .parse_struct("TokenizePayloadRequest") .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable( "Error getting TokenizePayloadRequest from tokenize response", )?; Ok(get_response) } Err(err) => { metrics::TEMP_LOCKER_FAILURES.add(1, &[]); Err(err).change_context(errors::ApiErrorResponse::UnprocessableEntity { message: "Token is invalid or expired".into(), }) } } }; match func().await { Ok(s) => { logger::info!( "Fetch payload in redis locker successful with lookup key: {:?}", redis_key ); Ok(s) } Err(err) => { logger::error!("Redis Temp locker Failed: {:?}", err); Err(err) } } } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/vault.rs" role="context" start="1011" end="1073"> pub async fn create_tokenize( state: &routes::SessionState, value1: String, value2: Option<String>, lookup_key: String, encryption_key: &masking::Secret<Vec<u8>>, ) -> RouterResult<String> { let redis_key = get_redis_locker_key(lookup_key.as_str()); let func = || async { metrics::CREATED_TOKENIZED_CARD.add(1, &[]); let payload_to_be_encrypted = api::TokenizePayloadRequest { value1: value1.clone(), value2: value2.clone().unwrap_or_default(), lookup_key: lookup_key.clone(), service_name: VAULT_SERVICE_NAME.to_string(), }; let payload = payload_to_be_encrypted .encode_to_string_of_json() .change_context(errors::ApiErrorResponse::InternalServerError)?; let encrypted_payload = GcmAes256 .encode_message(encryption_key.peek().as_ref(), payload.as_bytes()) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to encode redis temp locker data")?; let redis_conn = state .store .get_redis_conn() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to get redis connection")?; redis_conn .set_key_if_not_exists_with_expiry( &redis_key.as_str().into(), bytes::Bytes::from(encrypted_payload), Some(i64::from(consts::LOCKER_REDIS_EXPIRY_SECONDS)), ) .await .map(|_| lookup_key.clone()) .inspect_err(|error| { metrics::TEMP_LOCKER_FAILURES.add(1, &[]); logger::error!(?error, "Failed to store tokenized data in Redis"); }) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error from redis locker") }; match func().await { Ok(s) => { logger::info!( "Insert payload in redis locker successful with lookup key: {:?}", redis_key ); Ok(s) } Err(err) => { logger::error!("Redis Temp locker Failed: {:?}", err); Err(err) } } } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/vault.rs" role="context" start="989" end="1000"> pub async fn delete_locker_payment_method_by_lookup_key( state: &routes::SessionState, lookup_key: &Option<String>, ) { if let Some(lookup_key) = lookup_key { delete_tokenized_data(state, lookup_key) .await .map(|_| logger::info!("Card From locker deleted Successfully")) .map_err(|err| logger::error!("Error: Deleting Card From Redis Locker : {:?}", err)) .ok(); } } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/vault.rs" role="context" start="1419" end="1453"> pub async fn start_tokenize_data_workflow( state: &routes::SessionState, tokenize_tracker: &storage::ProcessTracker, ) -> Result<(), errors::ProcessTrackerError> { let db = &*state.store; let delete_tokenize_data = serde_json::from_value::<storage::TokenizeCoreWorkflow>( tokenize_tracker.tracking_data.clone(), ) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable_lazy(|| { format!( "unable to convert into DeleteTokenizeByTokenRequest {:?}", tokenize_tracker.tracking_data ) })?; match delete_tokenized_data(state, &delete_tokenize_data.lookup_key).await { Ok(()) => { logger::info!("Card From locker deleted Successfully"); //mark task as finished db.as_scheduler() .finish_process_with_business_status( tokenize_tracker.clone(), diesel_models::process_tracker::business_status::COMPLETED_BY_PT, ) .await?; } Err(err) => { logger::error!("Err: Deleting Card From Locker : {:?}", err); retry_delete_tokenize(db, delete_tokenize_data.pm, tokenize_tracker.to_owned()).await?; metrics::RETRIED_DELETE_DATA_COUNT.add(1, &[]); } } Ok(()) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/vault.rs" role="context" start="1006" end="1008"> fn get_redis_locker_key(lookup_key: &str) -> String { format!("{}_{}", consts::LOCKER_REDIS_PREFIX, lookup_key) } <file_sep path="hyperswitch/crates/router/src/core/errors.rs" role="context" start="31" end="31"> pub type RouterResult<T> = CustomResult<T, ApiErrorResponse>;
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/payment_methods/cards.rs<|crate|> router anchor=add_card_to_hs_locker kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="2683" end="2720"> pub async fn add_card_to_hs_locker( state: &routes::SessionState, payload: &payment_methods::StoreLockerReq, customer_id: &id_type::CustomerId, locker_choice: api_enums::LockerChoice, ) -> errors::CustomResult<payment_methods::StoreCardRespPayload, errors::VaultError> { let locker = &state.conf.locker; let jwekey = state.conf.jwekey.get_inner(); let db = &*state.store; let stored_card_response = if !locker.mock_locker { let request = payment_methods::mk_add_locker_request_hs( jwekey, locker, payload, locker_choice, state.tenant.tenant_id.clone(), state.request_id, ) .await?; call_locker_api::<payment_methods::StoreCardResp>( state, request, "add_card_to_hs_locker", Some(locker_choice), ) .await .change_context(errors::VaultError::SaveCardFailed)? } else { let card_id = generate_id(consts::ID_LENGTH, "card"); mock_call_to_locker_hs(db, &card_id, payload, None, None, Some(customer_id)).await? }; let stored_card = stored_card_response .payload .get_required_value("StoreCardRespPayload") .change_context(errors::VaultError::SaveCardFailed)?; Ok(stored_card) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="2682" end="2682"> )?; decode_and_decrypt_locker_data(state, key_store, enc_card_data.peek().to_string()).await? } else { mock_get_payment_method(state, key_store, payment_method_reference) .await? .payment_method .payment_method_data }; Ok(payment_method_data) } #[instrument(skip_all)] pub async fn add_card_to_hs_locker( state: &routes::SessionState, payload: &payment_methods::StoreLockerReq, customer_id: &id_type::CustomerId, locker_choice: api_enums::LockerChoice, ) -> errors::CustomResult<payment_methods::StoreCardRespPayload, errors::VaultError> { let locker = &state.conf.locker; let jwekey = state.conf.jwekey.get_inner(); let db = &*state.store; let stored_card_response = if !locker.mock_locker { let request = payment_methods::mk_add_locker_request_hs( jwekey, locker, <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="2781" end="2797"> pub async fn update_payment_method_metadata_and_last_used( state: &routes::SessionState, key_store: &domain::MerchantKeyStore, db: &dyn db::StorageInterface, pm: domain::PaymentMethod, pm_metadata: Option<serde_json::Value>, storage_scheme: MerchantStorageScheme, ) -> errors::CustomResult<(), errors::VaultError> { let pm_update = payment_method::PaymentMethodUpdate::MetadataUpdateAndLastUsed { metadata: pm_metadata, last_used_at: common_utils::date_time::now(), }; db.update_payment_method(&(state.into()), key_store, pm, pm_update, storage_scheme) .await .change_context(errors::VaultError::UpdateInPaymentMethodDataTableFailed)?; Ok(()) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="2723" end="2775"> pub async fn call_locker_api<T>( state: &routes::SessionState, request: Request, flow_name: &str, locker_choice: Option<api_enums::LockerChoice>, ) -> errors::CustomResult<T, errors::VaultError> where T: serde::de::DeserializeOwned, { let locker = &state.conf.locker; let jwekey = state.conf.jwekey.get_inner(); let response_type_name = type_name!(T); let response = services::call_connector_api(state, request, flow_name) .await .change_context(errors::VaultError::ApiError)?; let is_locker_call_succeeded = response.is_ok(); let jwe_body = response .unwrap_or_else(|err| err) .response .parse_struct::<services::JweBody>("JweBody") .change_context(errors::VaultError::ResponseDeserializationFailed) .attach_printable("Failed while parsing locker response into JweBody")?; let decrypted_payload = payment_methods::get_decrypted_response_payload( jwekey, jwe_body, locker_choice, locker.decryption_scheme.clone(), ) .await .change_context(errors::VaultError::ResponseDeserializationFailed) .attach_printable("Failed while decrypting locker payload response")?; // Irrespective of locker's response status, payload is JWE + JWS decrypted. But based on locker's status, // if Ok, deserialize the decrypted payload into given type T // if Err, raise an error including locker error message too if is_locker_call_succeeded { let stored_card_resp: Result<T, error_stack::Report<errors::VaultError>> = decrypted_payload .parse_struct(response_type_name) .change_context(errors::VaultError::ResponseDeserializationFailed) .attach_printable_lazy(|| { format!("Failed while parsing locker response into {response_type_name}") }); stored_card_resp } else { Err::<T, error_stack::Report<errors::VaultError>>((errors::VaultError::ApiError).into()) .attach_printable_lazy(|| format!("Locker error response: {decrypted_payload:?}")) } } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="2625" end="2680"> pub async fn get_payment_method_from_hs_locker<'a>( state: &'a routes::SessionState, key_store: &domain::MerchantKeyStore, customer_id: &id_type::CustomerId, merchant_id: &id_type::MerchantId, payment_method_reference: &'a str, locker_choice: Option<api_enums::LockerChoice>, ) -> errors::CustomResult<Secret<String>, errors::VaultError> { let locker = &state.conf.locker; let jwekey = state.conf.jwekey.get_inner(); let payment_method_data = if !locker.mock_locker { let request = payment_methods::mk_get_card_request_hs( jwekey, locker, customer_id, merchant_id, payment_method_reference, locker_choice, state.tenant.tenant_id.clone(), state.request_id, ) .await .change_context(errors::VaultError::FetchPaymentMethodFailed) .attach_printable("Making get payment method request failed")?; let get_card_resp = call_locker_api::<payment_methods::RetrieveCardResp>( state, request, "get_pm_from_locker", locker_choice, ) .await .change_context(errors::VaultError::FetchPaymentMethodFailed)?; let retrieve_card_resp = get_card_resp .payload .get_required_value("RetrieveCardRespPayload") .change_context(errors::VaultError::FetchPaymentMethodFailed) .attach_printable("Failed to retrieve field - payload from RetrieveCardResp")?; let enc_card_data = retrieve_card_resp .enc_card_data .get_required_value("enc_card_data") .change_context(errors::VaultError::FetchPaymentMethodFailed) .attach_printable( "Failed to retrieve field - enc_card_data from RetrieveCardRespPayload", )?; decode_and_decrypt_locker_data(state, key_store, enc_card_data.peek().to_string()).await? } else { mock_get_payment_method(state, key_store, payment_method_reference) .await? .payment_method .payment_method_data }; Ok(payment_method_data) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="2594" end="2622"> pub async fn decode_and_decrypt_locker_data( state: &routes::SessionState, key_store: &domain::MerchantKeyStore, enc_card_data: String, ) -> errors::CustomResult<Secret<String>, errors::VaultError> { // Fetch key let key = key_store.key.get_inner().peek(); // Decode let decoded_bytes = hex::decode(&enc_card_data) .change_context(errors::VaultError::ResponseDeserializationFailed) .attach_printable("Failed to decode hex string into bytes")?; // Decrypt domain::types::crypto_operation( &state.into(), type_name!(payment_method::PaymentMethod), domain::types::CryptoOperation::DecryptOptional(Some(Encryption::new( decoded_bytes.into(), ))), Identifier::Merchant(key_store.merchant_id.clone()), key, ) .await .and_then(|val| val.try_into_optionaloperation()) .change_context(errors::VaultError::FetchPaymentMethodFailed)? .map_or( Err(report!(errors::VaultError::FetchPaymentMethodFailed)), |d| Ok(d.into_inner()), ) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="2550" end="2591"> pub async fn add_card_hs( state: &routes::SessionState, req: api::PaymentMethodCreate, card: &api::CardDetail, customer_id: &id_type::CustomerId, merchant_account: &domain::MerchantAccount, locker_choice: api_enums::LockerChoice, card_reference: Option<&str>, ) -> errors::CustomResult< ( api::PaymentMethodResponse, Option<payment_methods::DataDuplicationCheck>, ), errors::VaultError, > { let payload = payment_methods::StoreLockerReq::LockerCard(payment_methods::StoreCardReq { merchant_id: merchant_account.get_id().to_owned(), merchant_customer_id: customer_id.to_owned(), requestor_card_reference: card_reference.map(str::to_string), card: Card { card_number: card.card_number.to_owned(), name_on_card: card.card_holder_name.to_owned(), card_exp_month: card.card_exp_month.to_owned(), card_exp_year: card.card_exp_year.to_owned(), card_brand: card.card_network.as_ref().map(ToString::to_string), card_isin: None, nick_name: card.nick_name.as_ref().map(Secret::peek).cloned(), }, ttl: state.conf.locker.ttl_for_storage_in_secs, }); let store_card_payload = add_card_to_hs_locker(state, &payload, customer_id, locker_choice).await?; let payment_method_resp = payment_methods::mk_add_card_response_hs( card.clone(), store_card_payload.card_reference, req, merchant_account.get_id(), ); Ok((payment_method_resp, store_card_payload.duplication_check)) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="2358" end="2431"> pub async fn add_bank_to_locker( state: &routes::SessionState, req: api::PaymentMethodCreate, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, bank: &api::BankPayout, customer_id: &id_type::CustomerId, ) -> errors::CustomResult< ( api::PaymentMethodResponse, Option<payment_methods::DataDuplicationCheck>, ), errors::VaultError, > { let key = key_store.key.get_inner().peek(); let payout_method_data = api::PayoutMethodData::Bank(bank.clone()); let key_manager_state: KeyManagerState = state.into(); let enc_data = async { serde_json::to_value(payout_method_data.to_owned()) .map_err(|err| { logger::error!("Error while encoding payout method data: {err:?}"); errors::VaultError::SavePaymentMethodFailed }) .change_context(errors::VaultError::SavePaymentMethodFailed) .attach_printable("Unable to encode payout method data") .ok() .map(|v| { let secret: Secret<String> = Secret::new(v.to_string()); secret }) .async_lift(|inner| async { domain::types::crypto_operation( &key_manager_state, type_name!(payment_method::PaymentMethod), domain::types::CryptoOperation::EncryptOptional(inner), Identifier::Merchant(key_store.merchant_id.clone()), key, ) .await .and_then(|val| val.try_into_optionaloperation()) }) .await } .await .change_context(errors::VaultError::SavePaymentMethodFailed) .attach_printable("Failed to encrypt payout method data")? .map(Encryption::from) .map(|e| e.into_inner()) .map_or(Err(errors::VaultError::SavePaymentMethodFailed), |e| { Ok(hex::encode(e.peek())) })?; let payload = payment_methods::StoreLockerReq::LockerGeneric(payment_methods::StoreGenericReq { merchant_id: merchant_account.get_id().to_owned(), merchant_customer_id: customer_id.to_owned(), enc_data, ttl: state.conf.locker.ttl_for_storage_in_secs, }); let store_resp = add_card_to_hs_locker( state, &payload, customer_id, api_enums::LockerChoice::HyperswitchCardVault, ) .await?; let payment_method_resp = payment_methods::mk_add_bank_response_hs( bank.clone(), store_resp.card_reference, req, merchant_account.get_id(), ); Ok((payment_method_resp, store_resp.duplication_check)) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="2969" end="3026"> pub async fn mock_call_to_locker_hs( db: &dyn db::StorageInterface, card_id: &str, payload: &payment_methods::StoreLockerReq, card_cvc: Option<String>, payment_method_id: Option<String>, customer_id: Option<&id_type::CustomerId>, ) -> errors::CustomResult<payment_methods::StoreCardResp, errors::VaultError> { let mut locker_mock_up = storage::LockerMockUpNew { card_id: card_id.to_string(), external_id: uuid::Uuid::new_v4().to_string(), card_fingerprint: uuid::Uuid::new_v4().to_string(), card_global_fingerprint: uuid::Uuid::new_v4().to_string(), merchant_id: id_type::MerchantId::default(), card_number: "4111111111111111".to_string(), card_exp_year: "2099".to_string(), card_exp_month: "12".to_string(), card_cvc, payment_method_id, customer_id: customer_id.map(ToOwned::to_owned), name_on_card: None, nickname: None, enc_card_data: None, }; locker_mock_up = match payload { payment_methods::StoreLockerReq::LockerCard(store_card_req) => storage::LockerMockUpNew { merchant_id: store_card_req.merchant_id.to_owned(), card_number: store_card_req.card.card_number.peek().to_string(), card_exp_year: store_card_req.card.card_exp_year.peek().to_string(), card_exp_month: store_card_req.card.card_exp_month.peek().to_string(), name_on_card: store_card_req.card.name_on_card.to_owned().expose_option(), nickname: store_card_req.card.nick_name.to_owned(), ..locker_mock_up }, payment_methods::StoreLockerReq::LockerGeneric(store_generic_req) => { storage::LockerMockUpNew { merchant_id: store_generic_req.merchant_id.to_owned(), enc_card_data: Some(store_generic_req.enc_data.to_owned()), ..locker_mock_up } } }; let response = db .insert_locker_mock_up(locker_mock_up) .await .change_context(errors::VaultError::SaveCardFailed)?; let payload = payment_methods::StoreCardRespPayload { card_reference: response.card_id, duplication_check: None, }; Ok(payment_methods::StoreCardResp { status: "Ok".to_string(), error_code: None, error_message: None, payload: Some(payload), }) } <file_sep path="hyperswitch/crates/router/src/core/errors.rs" role="context" start="121" end="158"> pub enum VaultError { #[error("Failed to save card in card vault")] SaveCardFailed, #[error("Failed to fetch card details from card vault")] FetchCardFailed, #[error("Failed to delete card in card vault")] DeleteCardFailed, #[error("Failed to encode card vault request")] RequestEncodingFailed, #[error("Failed to deserialize card vault response")] ResponseDeserializationFailed, #[error("Failed to create payment method")] PaymentMethodCreationFailed, #[error("The given payment method is currently not supported in vault")] PaymentMethodNotSupported, #[error("The given payout method is currently not supported in vault")] PayoutMethodNotSupported, #[error("Missing required field: {field_name}")] MissingRequiredField { field_name: &'static str }, #[error("The card vault returned an unexpected response: {0:?}")] UnexpectedResponseError(bytes::Bytes), #[error("Failed to update in PMD table")] UpdateInPaymentMethodDataTableFailed, #[error("Failed to fetch payment method in vault")] FetchPaymentMethodFailed, #[error("Failed to save payment method in vault")] SavePaymentMethodFailed, #[error("Failed to generate fingerprint")] GenerateFingerprintFailed, #[error("Failed to encrypt vault request")] RequestEncryptionFailed, #[error("Failed to decrypt vault response")] ResponseDecryptionFailed, #[error("Failed to call vault")] VaultAPIError, #[error("Failed while calling locker API")] ApiError, } <file_sep path="hyperswitch/crates/api_models/src/enums.rs" role="context" start="393" end="395"> pub enum LockerChoice { HyperswitchCardVault, }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/payments/helpers.rs<|crate|> router anchor=make_url_with_signature kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="3403" end="3450"> pub fn make_url_with_signature( redirect_url: &str, business_profile: &domain::Profile, ) -> RouterResult<api::RedirectionResponse> { let mut url = url::Url::parse(redirect_url) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to parse the url")?; let mut base_url = url.clone(); base_url.query_pairs_mut().clear(); let url = if business_profile.enable_payment_response_hash { let key = business_profile .payment_response_hash_key .as_ref() .get_required_value("payment_response_hash_key")?; let signature = hmac_sha512_sorted_query_params( &mut url.query_pairs().collect::<Vec<_>>(), key.as_str(), )?; url.query_pairs_mut() .append_pair("signature", &signature) .append_pair("signature_algorithm", "HMAC-SHA512"); url.to_owned() } else { url.to_owned() }; let parameters = url .query_pairs() .collect::<Vec<_>>() .iter() .map(|(key, value)| (key.clone().into_owned(), value.clone().into_owned())) .collect::<Vec<_>>(); Ok(api::RedirectionResponse { return_url: base_url.to_string(), params: parameters, return_url_with_query_params: url.to_string(), http_method: if business_profile.redirect_to_merchant_with_http_post { services::Method::Post.to_string() } else { services::Method::Get.to_string() }, headers: Vec::new(), }) } <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="3402" end="3402"> use std::{borrow::Cow, collections::HashSet, net::IpAddr, str::FromStr}; use redis_interface::errors::RedisError; use crate::{ configs::settings::{ConnectorRequestReferenceIdConfig, TempLockerEnableConfig}, connector, consts::{self, BASE64_ENGINE}, core::{ authentication, errors::{self, CustomResult, RouterResult, StorageErrorExt}, mandate::helpers::MandateGenericData, payment_methods::{ self, cards::{self}, network_tokenization, vault, }, payments, pm_auth::retrieve_payment_method_from_auth_service, }, db::StorageInterface, routes::{metrics, payment_methods as payment_methods_handler, SessionState}, services, types::{ api::{self, admin, enums as api_enums, MandateValidationFieldsExt}, domain::{self, types}, storage::{self, enums as storage_enums, ephemeral_key, CardTokenData}, transformers::{ForeignFrom, ForeignTryFrom}, AdditionalMerchantData, AdditionalPaymentMethodConnectorResponse, ErrorResponse, MandateReference, MerchantAccountData, MerchantRecipientData, PaymentsResponseData, RecipientIdType, RecurringMandatePaymentData, RouterData, }, utils::{ self, crypto::{self, SignMessage}, OptionExt, StringExt, }, }; use crate::{core::admin as core_admin, headers}; <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="3474" end="3476"> pub fn check_if_operation_confirm<Op: std::fmt::Debug>(operations: Op) -> bool { format!("{operations:?}") == "PaymentConfirm" } <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="3452" end="3472"> pub fn hmac_sha512_sorted_query_params( params: &mut [(Cow<'_, str>, Cow<'_, str>)], key: &str, ) -> RouterResult<String> { params.sort(); let final_string = params .iter() .map(|(key, value)| format!("{key}={value}")) .collect::<Vec<_>>() .join("&"); let signature = crypto::HmacSha512::sign_message( &crypto::HmacSha512, key.as_bytes(), final_string.as_bytes(), ) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to sign the message")?; Ok(hex::encode(signature)) } <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="3388" end="3400"> pub fn make_pg_redirect_response( payment_id: id_type::PaymentId, response: &api::PaymentsResponse, connector: String, ) -> api::PgRedirectResponse { api::PgRedirectResponse { payment_id, status: response.status, gateway_id: connector, customer_id: response.customer_id.to_owned(), amount: Some(response.amount), } } <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="3364" end="3385"> pub async fn delete_client_secret( state: SessionState, ephemeral_key_id: String, ) -> errors::RouterResponse<ClientSecretResponse> { let db = state.store.as_ref(); let ephemeral_key = db .delete_client_secret(&ephemeral_key_id) .await .map_err(|err| match err.current_context() { errors::StorageError::ValueNotFound(_) => { err.change_context(errors::ApiErrorResponse::GenericNotFoundError { message: "Ephemeral Key not found".to_string(), }) } _ => err.change_context(errors::ApiErrorResponse::InternalServerError), }) .attach_printable("Unable to delete ephemeral key")?; let response = ClientSecretResponse::foreign_try_from(ephemeral_key) .attach_printable("Only customer is supported as resource_id in response")?; Ok(services::ApplicationResponse::Json(response)) } <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="3174" end="3194"> pub fn get_handle_response_url( payment_id: id_type::PaymentId, business_profile: &domain::Profile, response: &api::PaymentsResponse, connector: String, ) -> RouterResult<api::RedirectionResponse> { let payments_return_url = response.return_url.as_ref(); let redirection_response = make_pg_redirect_response(payment_id, response, connector); let return_url = make_merchant_url_with_response( business_profile, redirection_response, payments_return_url, response.client_secret.as_ref(), response.manual_retry_allowed, ) .attach_printable("Failed to make merchant url with response")?; make_url_with_signature(&return_url, business_profile) } <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="5783" end="5814"> pub fn new( root_keys: masking::Secret<String>, recipient_id: masking::Secret<String>, private_key: masking::Secret<String>, ) -> CustomResult<Self, errors::GooglePayDecryptionError> { // base64 decode the private key let decoded_key = BASE64_ENGINE .decode(private_key.expose()) .change_context(errors::GooglePayDecryptionError::Base64DecodingFailed)?; // base64 decode the root signing keys let decoded_root_signing_keys = BASE64_ENGINE .decode(root_keys.expose()) .change_context(errors::GooglePayDecryptionError::Base64DecodingFailed)?; // create a private key from the decoded key let private_key = PKey::private_key_from_pkcs8(&decoded_key) .change_context(errors::GooglePayDecryptionError::KeyDeserializationFailed) .attach_printable("cannot convert private key from decode_key")?; // parse the root signing keys let root_keys_vector: Vec<GooglePayRootSigningKey> = decoded_root_signing_keys .parse_struct("GooglePayRootSigningKey") .change_context(errors::GooglePayDecryptionError::DeserializationFailed)?; // parse and filter the root signing keys by protocol version let filtered_root_signing_keys = filter_root_signing_keys(root_keys_vector)?; Ok(Self { root_signing_keys: filtered_root_signing_keys, recipient_id, private_key, }) } <file_sep path="hyperswitch/crates/router/src/routes/app.rs" role="context" start="1906" end="1906"> pub struct Profile; <file_sep path="hyperswitch/postman/collection-dir/powertranz/Flow Testcases/Happy Cases/Scenario1-Create payment with confirm true/Payments - Create/event.test.js" role="context" start="61" end="78"> "INFO - Unable to assign variable {{client_secret}}, as jsonData.client_secret is undefined.", ); } // Response body should have value "succeeded" for "status" if (jsonData?.status) { pm.test( "[POST]::/payments - Content check if value for 'status' matches 'succeeded'", function () { pm.expect(jsonData.status).to.eql("succeeded"); }, ); }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/payments/routing.rs<|crate|> router anchor=make_dsl_input_for_payouts kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/payments/routing.rs" role="context" start="135" end="187"> pub fn make_dsl_input_for_payouts( payout_data: &payouts::PayoutData, ) -> RoutingResult<dsl_inputs::BackendInput> { let mandate = dsl_inputs::MandateData { mandate_acceptance_type: None, mandate_type: None, payment_type: None, }; let metadata = payout_data .payouts .metadata .clone() .map(|val| val.parse_value("routing_parameters")) .transpose() .change_context(errors::RoutingError::MetadataParsingError) .attach_printable("Unable to parse routing_parameters from metadata of payouts") .unwrap_or(None); let payment = dsl_inputs::PaymentInput { amount: payout_data.payouts.amount, card_bin: None, currency: payout_data.payouts.destination_currency, authentication_type: None, capture_method: None, business_country: payout_data .payout_attempt .business_country .map(api_enums::Country::from_alpha2), billing_country: payout_data .billing_address .as_ref() .and_then(|bic| bic.country) .map(api_enums::Country::from_alpha2), business_label: payout_data.payout_attempt.business_label.clone(), setup_future_usage: None, }; let payment_method = dsl_inputs::PaymentMethodInput { payment_method: payout_data .payouts .payout_type .map(api_enums::PaymentMethod::foreign_from), payment_method_type: payout_data .payout_method_data .as_ref() .map(api_enums::PaymentMethodType::foreign_from), card_network: None, }; Ok(dsl_inputs::BackendInput { mandate, metadata, payment, payment_method, }) } <file_sep path="hyperswitch/crates/router/src/core/payments/routing.rs" role="context" start="134" end="134"> use api_models::{ admin as admin_api, enums::{self as api_enums, CountryAlpha2}, routing::ConnectorSelection, }; use euclid::{ backend::{self, inputs as dsl_inputs, EuclidBackend}, dssa::graph::{self as euclid_graph, CgraphExt}, enums as euclid_enums, frontend::{ast, dir as euclid_dir}, }; use crate::core::payouts; use crate::{ core::{ errors, errors as oss_errors, routing::{self}, }, logger, types::{ api::{self, routing as routing_types}, domain, storage as oss_storage, transformers::{ForeignFrom, ForeignInto, ForeignTryFrom}, }, utils::{OptionExt, ValueExt}, SessionState, }; type RoutingResult<O> = oss_errors::CustomResult<O, errors::RoutingError>; <file_sep path="hyperswitch/crates/router/src/core/payments/routing.rs" role="context" start="302" end="410"> pub fn make_dsl_input( payments_dsl_input: &routing::PaymentsDslInput<'_>, ) -> RoutingResult<dsl_inputs::BackendInput> { let mandate_data = dsl_inputs::MandateData { mandate_acceptance_type: payments_dsl_input.setup_mandate.as_ref().and_then( |mandate_data| { mandate_data .customer_acceptance .as_ref() .map(|cat| match cat.acceptance_type { hyperswitch_domain_models::mandates::AcceptanceType::Online => { euclid_enums::MandateAcceptanceType::Online } hyperswitch_domain_models::mandates::AcceptanceType::Offline => { euclid_enums::MandateAcceptanceType::Offline } }) }, ), mandate_type: payments_dsl_input .setup_mandate .as_ref() .and_then(|mandate_data| { mandate_data.mandate_type.clone().map(|mt| match mt { hyperswitch_domain_models::mandates::MandateDataType::SingleUse(_) => { euclid_enums::MandateType::SingleUse } hyperswitch_domain_models::mandates::MandateDataType::MultiUse(_) => { euclid_enums::MandateType::MultiUse } }) }), payment_type: Some( if payments_dsl_input .recurring_details .as_ref() .is_some_and(|data| { matches!( data, api_models::mandates::RecurringDetails::ProcessorPaymentToken(_) ) }) { euclid_enums::PaymentType::PptMandate } else { payments_dsl_input.setup_mandate.map_or_else( || euclid_enums::PaymentType::NonMandate, |_| euclid_enums::PaymentType::SetupMandate, ) }, ), }; let payment_method_input = dsl_inputs::PaymentMethodInput { payment_method: payments_dsl_input.payment_attempt.payment_method, payment_method_type: payments_dsl_input.payment_attempt.payment_method_type, card_network: payments_dsl_input .payment_method_data .as_ref() .and_then(|pm_data| match pm_data { domain::PaymentMethodData::Card(card) => card.card_network.clone(), _ => None, }), }; let payment_input = dsl_inputs::PaymentInput { amount: payments_dsl_input.payment_attempt.get_total_amount(), card_bin: payments_dsl_input.payment_method_data.as_ref().and_then( |pm_data| match pm_data { domain::PaymentMethodData::Card(card) => { Some(card.card_number.peek().chars().take(6).collect()) } _ => None, }, ), currency: payments_dsl_input.currency, authentication_type: payments_dsl_input.payment_attempt.authentication_type, capture_method: payments_dsl_input .payment_attempt .capture_method .and_then(|cm| cm.foreign_into()), business_country: payments_dsl_input .payment_intent .business_country .map(api_enums::Country::from_alpha2), billing_country: payments_dsl_input .address .get_payment_method_billing() .and_then(|bic| bic.address.as_ref()) .and_then(|add| add.country) .map(api_enums::Country::from_alpha2), business_label: payments_dsl_input.payment_intent.business_label.clone(), setup_future_usage: payments_dsl_input.payment_intent.setup_future_usage, }; let metadata = payments_dsl_input .payment_intent .parse_and_get_metadata("routing_parameters") .change_context(errors::RoutingError::MetadataParsingError) .attach_printable("Unable to parse routing_parameters from metadata of payment_intent") .unwrap_or(None); Ok(dsl_inputs::BackendInput { metadata, payment: payment_input, payment_method: payment_method_input, mandate: mandate_data, }) } <file_sep path="hyperswitch/crates/router/src/core/payments/routing.rs" role="context" start="190" end="299"> pub fn make_dsl_input( payments_dsl_input: &routing::PaymentsDslInput<'_>, ) -> RoutingResult<dsl_inputs::BackendInput> { let mandate_data = dsl_inputs::MandateData { mandate_acceptance_type: payments_dsl_input.setup_mandate.as_ref().and_then( |mandate_data| { mandate_data .customer_acceptance .as_ref() .map(|customer_accept| match customer_accept.acceptance_type { hyperswitch_domain_models::mandates::AcceptanceType::Online => { euclid_enums::MandateAcceptanceType::Online } hyperswitch_domain_models::mandates::AcceptanceType::Offline => { euclid_enums::MandateAcceptanceType::Offline } }) }, ), mandate_type: payments_dsl_input .setup_mandate .as_ref() .and_then(|mandate_data| { mandate_data .mandate_type .clone() .map(|mandate_type| match mandate_type { hyperswitch_domain_models::mandates::MandateDataType::SingleUse(_) => { euclid_enums::MandateType::SingleUse } hyperswitch_domain_models::mandates::MandateDataType::MultiUse(_) => { euclid_enums::MandateType::MultiUse } }) }), payment_type: Some( if payments_dsl_input .recurring_details .as_ref() .is_some_and(|data| { matches!( data, api_models::mandates::RecurringDetails::ProcessorPaymentToken(_) ) }) { euclid_enums::PaymentType::PptMandate } else { payments_dsl_input.setup_mandate.map_or_else( || euclid_enums::PaymentType::NonMandate, |_| euclid_enums::PaymentType::SetupMandate, ) }, ), }; let payment_method_input = dsl_inputs::PaymentMethodInput { payment_method: Some(payments_dsl_input.payment_attempt.payment_method_type), payment_method_type: Some(payments_dsl_input.payment_attempt.payment_method_subtype), card_network: payments_dsl_input .payment_method_data .as_ref() .and_then(|pm_data| match pm_data { domain::PaymentMethodData::Card(card) => card.card_network.clone(), _ => None, }), }; let payment_input = dsl_inputs::PaymentInput { amount: payments_dsl_input .payment_attempt .amount_details .get_net_amount(), card_bin: payments_dsl_input.payment_method_data.as_ref().and_then( |pm_data| match pm_data { domain::PaymentMethodData::Card(card) => Some(card.card_number.get_card_isin()), _ => None, }, ), currency: payments_dsl_input.currency, authentication_type: Some(payments_dsl_input.payment_attempt.authentication_type), capture_method: Some(payments_dsl_input.payment_intent.capture_method), business_country: None, billing_country: payments_dsl_input .address .get_payment_method_billing() .and_then(|billing_address| billing_address.address.as_ref()) .and_then(|address_details| address_details.country) .map(api_enums::Country::from_alpha2), business_label: None, setup_future_usage: Some(payments_dsl_input.payment_intent.setup_future_usage), }; let metadata = payments_dsl_input .payment_intent .metadata .clone() .map(|value| value.parse_value("routing_parameters")) .transpose() .change_context(errors::RoutingError::MetadataParsingError) .attach_printable("Unable to parse routing_parameters from metadata of payment_intent") .unwrap_or(None); Ok(dsl_inputs::BackendInput { metadata, payment: payment_input, payment_method: payment_method_input, mandate: mandate_data, }) } <file_sep path="hyperswitch/crates/router/src/core/payments/routing.rs" role="context" start="122" end="124"> fn default() -> Self { Self::V1(routing_types::RoutingAlgorithmRef::default()) } <file_sep path="hyperswitch/crates/router/src/core/payments/routing.rs" role="context" start="412" end="466"> pub async fn perform_static_routing_v1( state: &SessionState, merchant_id: &common_utils::id_type::MerchantId, algorithm_id: Option<&common_utils::id_type::RoutingId>, business_profile: &domain::Profile, transaction_data: &routing::TransactionData<'_>, ) -> RoutingResult<Vec<routing_types::RoutableConnectorChoice>> { let algorithm_id = if let Some(id) = algorithm_id { id } else { #[cfg(feature = "v1")] let fallback_config = routing::helpers::get_merchant_default_config( &*state.clone().store, business_profile.get_id().get_string_repr(), &api_enums::TransactionType::from(transaction_data), ) .await .change_context(errors::RoutingError::FallbackConfigFetchFailed)?; #[cfg(feature = "v2")] let fallback_config = admin::ProfileWrapper::new(business_profile.clone()) .get_default_fallback_list_of_connector_under_profile() .change_context(errors::RoutingError::FallbackConfigFetchFailed)?; return Ok(fallback_config); }; let cached_algorithm = ensure_algorithm_cached_v1( state, merchant_id, algorithm_id, business_profile.get_id(), &api_enums::TransactionType::from(transaction_data), ) .await?; Ok(match cached_algorithm.as_ref() { CachedAlgorithm::Single(conn) => vec![(**conn).clone()], CachedAlgorithm::Priority(plist) => plist.clone(), CachedAlgorithm::VolumeSplit(splits) => perform_volume_split(splits.to_vec()) .change_context(errors::RoutingError::ConnectorSelectionFailed)?, CachedAlgorithm::Advanced(interpreter) => { let backend_input = match transaction_data { routing::TransactionData::Payment(payment_data) => make_dsl_input(payment_data)?, #[cfg(feature = "payouts")] routing::TransactionData::Payout(payout_data) => { make_dsl_input_for_payouts(payout_data)? } }; execute_dsl_and_get_connector_v1(backend_input, interpreter)? } }) } <file_sep path="hyperswitch/crates/router/src/core/payments/routing.rs" role="context" start="855" end="879"> pub async fn perform_eligibility_analysis( state: &SessionState, key_store: &domain::MerchantKeyStore, chosen: Vec<routing_types::RoutableConnectorChoice>, transaction_data: &routing::TransactionData<'_>, eligible_connectors: Option<&Vec<api_enums::RoutableConnectors>>, profile_id: &common_utils::id_type::ProfileId, ) -> RoutingResult<Vec<routing_types::RoutableConnectorChoice>> { let backend_input = match transaction_data { routing::TransactionData::Payment(payment_data) => make_dsl_input(payment_data)?, #[cfg(feature = "payouts")] routing::TransactionData::Payout(payout_data) => make_dsl_input_for_payouts(payout_data)?, }; perform_cgraph_filtering( state, key_store, chosen, backend_input, eligible_connectors, profile_id, &api_enums::TransactionType::from(transaction_data), ) .await } <file_sep path="hyperswitch/crates/router/src/core/payments/routing.rs" role="context" start="111" end="111"> type RoutingResult<O> = oss_errors::CustomResult<O, errors::RoutingError>; <file_sep path="hyperswitch/crates/router/src/connector/nmi/transformers.rs" role="context" start="454" end="459"> pub enum PaymentMethod { CardNonThreeDs(Box<CardData>), CardThreeDs(Box<CardThreeDsData>), GPay(Box<GooglePayData>), ApplePay(Box<ApplePayData>), } <file_sep path="hyperswitch/v2_compatible_migrations/2024-08-28-081721_add_v2_columns/up.sql" role="context" start="54" end="70"> ADD COLUMN redirection_data JSONB, ADD COLUMN connector_payment_data TEXT, ADD COLUMN connector_token_details JSONB; -- Change the type of the column from JSON to JSONB ALTER TABLE merchant_connector_account ADD COLUMN IF NOT EXISTS feature_metadata JSONB; ALTER TABLE payment_methods ADD COLUMN IF NOT EXISTS locker_fingerprint_id VARCHAR(64), ADD COLUMN IF NOT EXISTS payment_method_type_v2 VARCHAR(64), ADD COLUMN IF NOT EXISTS payment_method_subtype VARCHAR(64); ALTER TABLE refund ADD COLUMN IF NOT EXISTS id VARCHAR(64), ADD COLUMN IF NOT EXISTS merchant_reference_id VARCHAR(64), ADD COLUMN IF NOT EXISTS connector_id VARCHAR(64); <file_sep path="hyperswitch/crates/api_models/src/payments.rs" role="context" start="1819" end="1826"> pub struct MandateData { /// A way to update the mandate's payment method details pub update_mandate_id: Option<String>, /// A consent from the customer to store the payment method pub customer_acceptance: Option<CustomerAcceptance>, /// A way to select the type of mandate used pub mandate_type: Option<MandateType>, }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/connector/payone.rs<|crate|> router anchor=new kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=1<|meta_end|> <file_sep path="hyperswitch/crates/router/src/connector/payone.rs" role="context" start="49" end="54"> pub fn new() -> &'static Self { &Self { #[cfg(feature = "payouts")] amount_converter: &MinorUnitForConnector, } } <file_sep path="hyperswitch/crates/router/src/connector/payone.rs" role="context" start="48" end="48"> use common_utils::types::{AmountConvertor, MinorUnit, MinorUnitForConnector}; <file_sep path="hyperswitch/crates/router/src/connector/payone.rs" role="context" start="110" end="140"> fn build_headers( &self, req: &types::RouterData<Flow, Request, Response>, connectors: &settings::Connectors, ) -> CustomResult<Vec<(String, request::Maskable<String>)>, errors::ConnectorError> { let auth = payone::PayoneAuthType::try_from(&req.connector_auth_type)?; let http_method = self.get_http_method().to_string(); let content_type = Self::get_content_type(self); let base_url = self.base_url(connectors); let url = Self::get_url(self, req, connectors)?; let date_header = get_formatted_date_time!( "[weekday repr:short], [day] [month repr:short] [year] [hour]:[minute]:[second] GMT" )?; let path: String = url.replace(base_url, "/"); let authorization_header: String = self.generate_signature( auth, http_method, path, content_type.to_string(), date_header.clone(), )?; let headers = vec![ (headers::DATE.to_string(), date_header.to_string().into()), ( headers::AUTHORIZATION.to_string(), authorization_header.to_string().into(), ), ]; Ok(headers) } <file_sep path="hyperswitch/crates/router/src/connector/payone.rs" role="context" start="55" end="80"> pub fn generate_signature( &self, auth: payone::PayoneAuthType, http_method: String, canonicalized_path: String, content_type: String, date_header: String, ) -> CustomResult<String, errors::ConnectorError> { let payone::PayoneAuthType { api_key, api_secret, .. } = auth; let string_to_hash: String = format!( "{}\n{}\n{}\n{}\n", http_method, content_type.trim(), date_header.trim(), canonicalized_path.trim() ); let key = hmac::Key::new(hmac::HMAC_SHA256, api_secret.expose().as_bytes()); let hash_hmac = consts::BASE64_ENGINE.encode(hmac::sign(&key, string_to_hash.as_bytes())); let signature_header = format!("GCS v1HMAC:{}:{}", api_key.peek(), hash_hmac); Ok(signature_header) } <file_sep path="hyperswitch/crates/router/src/connector/payone.rs" role="context" start="321" end="338"> fn build_request( &self, req: &types::PayoutsRouterData<api::PoFulfill>, connectors: &settings::Connectors, ) -> CustomResult<Option<services::Request>, errors::ConnectorError> { let request = services::RequestBuilder::new() .method(services::Method::Post) .url(&types::PayoutFulfillType::get_url(self, req, connectors)?) .attach_default_headers() .headers(types::PayoutFulfillType::get_headers( self, req, connectors, )?) .set_body(types::PayoutFulfillType::get_request_body( self, req, connectors, )?) .build(); Ok(Some(request)) } <file_sep path="hyperswitch/crates/router/src/connector/payone.rs" role="context" start="306" end="319"> fn get_request_body( &self, req: &types::PayoutsRouterData<api::PoFulfill>, _connectors: &settings::Connectors, ) -> CustomResult<RequestContent, errors::ConnectorError> { let amount = convert_amount( self.amount_converter, req.request.minor_amount, req.request.destination_currency, )?; let connector_router_data = payone::PayoneRouterData::from((amount, req)); let connector_req = payone::PayonePayoutFulfillRequest::try_from(connector_router_data)?; Ok(RequestContent::Json(Box::new(connector_req))) }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/connector/dummyconnector/transformers.rs<|crate|> router anchor=from kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/connector/dummyconnector/transformers.rs" role="context" start="312" end="319"> fn from(item: RefundStatus) -> Self { match item { RefundStatus::Succeeded => Self::Success, RefundStatus::Failed => Self::Failure, RefundStatus::Processing => Self::Pending, //TODO: Review mapping } } <file_sep path="hyperswitch/crates/router/src/connector/dummyconnector/transformers.rs" role="context" start="353" end="363"> fn try_from( item: types::RefundsResponseRouterData<api::RSync, RefundResponse>, ) -> Result<Self, Self::Error> { Ok(Self { response: Ok(types::RefundsResponseData { connector_refund_id: item.response.id.to_string(), refund_status: enums::RefundStatus::from(item.response.status), }), ..item.data }) } <file_sep path="hyperswitch/crates/router/src/connector/dummyconnector/transformers.rs" role="context" start="336" end="346"> fn try_from( item: types::RefundsResponseRouterData<api::Execute, RefundResponse>, ) -> Result<Self, Self::Error> { Ok(Self { response: Ok(types::RefundsResponseData { connector_refund_id: item.response.id.to_string(), refund_status: enums::RefundStatus::from(item.response.status), }), ..item.data }) } <file_sep path="hyperswitch/crates/router/src/connector/dummyconnector/transformers.rs" role="context" start="292" end="296"> fn try_from(item: &types::RefundsRouterData<F>) -> Result<Self, Self::Error> { Ok(Self { amount: item.request.refund_amount, }) } <file_sep path="hyperswitch/crates/router/src/connector/dummyconnector/transformers.rs" role="context" start="276" end="280"> fn get_url(&self) -> Option<Url> { match self { Self::RedirectToUrl(redirect_to_url) => Some(redirect_to_url.to_owned()), } } <file_sep path="hyperswitch/crates/router/src/connector/dummyconnector/transformers.rs" role="context" start="242" end="266"> fn try_from( item: types::ResponseRouterData<F, PaymentsResponse, T, types::PaymentsResponseData>, ) -> Result<Self, Self::Error> { let redirection_data = item .response .next_action .and_then(|redirection_data| redirection_data.get_url()) .map(|redirection_url| { services::RedirectForm::from((redirection_url, services::Method::Get)) }); Ok(Self { status: enums::AttemptStatus::from(item.response.status), response: Ok(types::PaymentsResponseData::TransactionResponse { resource_id: types::ResponseId::ConnectorTransactionId(item.response.id), redirection_data: Box::new(redirection_data), mandate_reference: Box::new(None), connector_metadata: None, network_txn_id: None, connector_response_reference_id: None, incremental_authorization_allowed: None, charges: None, }), ..item.data }) } <file_sep path="hyperswitch/crates/router/src/connector/dummyconnector/transformers.rs" role="context" start="304" end="309"> pub enum RefundStatus { Succeeded, Failed, #[default] Processing, } <file_sep path="hyperswitch/crates/api_models/src/refunds.rs" role="context" start="378" end="384"> pub enum RefundStatus { Succeeded, Failed, #[default] Pending, Review, }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/connector/ebanx/transformers.rs<|crate|> router anchor=from kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/connector/ebanx/transformers.rs" role="context" start="373" end="381"> fn from(item: EbanxCancelStatus) -> Self { match item { EbanxCancelStatus::Success => Self::Cancelled, EbanxCancelStatus::ApiError | EbanxCancelStatus::AuthenticationError | EbanxCancelStatus::InvalidRequestError | EbanxCancelStatus::RequestError => Self::Failed, } } <file_sep path="hyperswitch/crates/router/src/connector/ebanx/transformers.rs" role="context" start="389" end="403"> fn try_from( item: types::PayoutsResponseRouterData<F, EbanxCancelResponse>, ) -> Result<Self, Self::Error> { Ok(Self { response: Ok(types::PayoutsResponseData { status: Some(storage_enums::PayoutStatus::from(item.response.status)), connector_payout_id: item.data.request.connector_payout_id.clone(), payout_eligible: None, should_add_next_step_to_process_tracker: false, error_code: None, error_message: None, }), ..item.data }) } <file_sep path="hyperswitch/crates/router/src/connector/ebanx/transformers.rs" role="context" start="330" end="349"> fn try_from(item: &types::PayoutsRouterData<F>) -> Result<Self, Self::Error> { let request = item.request.to_owned(); let ebanx_auth_type = EbanxAuthType::try_from(&item.connector_auth_type)?; let payout_type = request.get_payout_type()?; match payout_type { storage_enums::PayoutType::Bank => Ok(Self { integration_key: ebanx_auth_type.integration_key, uid: request .connector_payout_id .to_owned() .ok_or(errors::ConnectorError::MissingRequiredField { field_name: "uid" })?, }), storage_enums::PayoutType::Card | storage_enums::PayoutType::Wallet => { Err(errors::ConnectorError::NotSupported { message: "Payout Method Not Supported".to_string(), connector: "Ebanx", })? } } } <file_sep path="hyperswitch/crates/router/src/connector/ebanx/transformers.rs" role="context" start="296" end="310"> fn try_from( item: types::PayoutsResponseRouterData<F, EbanxFulfillResponse>, ) -> Result<Self, Self::Error> { Ok(Self { response: Ok(types::PayoutsResponseData { status: Some(storage_enums::PayoutStatus::from(item.response.status)), connector_payout_id: Some(item.data.request.get_transfer_id()?), payout_eligible: None, should_add_next_step_to_process_tracker: false, error_code: None, error_message: None, }), ..item.data }) } <file_sep path="hyperswitch/crates/router/src/connector/ebanx/transformers.rs" role="context" start="363" end="369"> pub enum EbanxCancelStatus { Success, ApiError, AuthenticationError, InvalidRequestError, RequestError, } <file_sep path="hyperswitch/crates/api_models/src/errors/types.rs" role="context" start="14" end="21"> pub struct ApiError { pub sub_code: &'static str, pub error_identifier: u16, pub error_message: String, pub extra: Option<Extra>, #[cfg(feature = "detailed_errors")] pub stacktrace: Option<serde_json::Value>, }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/connector/ebanx/transformers.rs<|crate|> router anchor=from kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=1<|meta_end|> <file_sep path="hyperswitch/crates/router/src/connector/ebanx/transformers.rs" role="context" start="373" end="381"> fn from(item: EbanxCancelStatus) -> Self { match item { EbanxCancelStatus::Success => Self::Cancelled, EbanxCancelStatus::ApiError | EbanxCancelStatus::AuthenticationError | EbanxCancelStatus::InvalidRequestError | EbanxCancelStatus::RequestError => Self::Failed, } } <file_sep path="hyperswitch/crates/router/src/connector/ebanx/transformers.rs" role="context" start="389" end="403"> fn try_from( item: types::PayoutsResponseRouterData<F, EbanxCancelResponse>, ) -> Result<Self, Self::Error> { Ok(Self { response: Ok(types::PayoutsResponseData { status: Some(storage_enums::PayoutStatus::from(item.response.status)), connector_payout_id: item.data.request.connector_payout_id.clone(), payout_eligible: None, should_add_next_step_to_process_tracker: false, error_code: None, error_message: None, }), ..item.data }) } <file_sep path="hyperswitch/crates/router/src/connector/ebanx/transformers.rs" role="context" start="330" end="349"> fn try_from(item: &types::PayoutsRouterData<F>) -> Result<Self, Self::Error> { let request = item.request.to_owned(); let ebanx_auth_type = EbanxAuthType::try_from(&item.connector_auth_type)?; let payout_type = request.get_payout_type()?; match payout_type { storage_enums::PayoutType::Bank => Ok(Self { integration_key: ebanx_auth_type.integration_key, uid: request .connector_payout_id .to_owned() .ok_or(errors::ConnectorError::MissingRequiredField { field_name: "uid" })?, }), storage_enums::PayoutType::Card | storage_enums::PayoutType::Wallet => { Err(errors::ConnectorError::NotSupported { message: "Payout Method Not Supported".to_string(), connector: "Ebanx", })? } } } <file_sep path="hyperswitch/crates/router/src/connector/ebanx/transformers.rs" role="context" start="296" end="310"> fn try_from( item: types::PayoutsResponseRouterData<F, EbanxFulfillResponse>, ) -> Result<Self, Self::Error> { Ok(Self { response: Ok(types::PayoutsResponseData { status: Some(storage_enums::PayoutStatus::from(item.response.status)), connector_payout_id: Some(item.data.request.get_transfer_id()?), payout_eligible: None, should_add_next_step_to_process_tracker: false, error_code: None, error_message: None, }), ..item.data }) } <file_sep path="hyperswitch/crates/router/src/connector/ebanx/transformers.rs" role="context" start="363" end="369"> pub enum EbanxCancelStatus { Success, ApiError, AuthenticationError, InvalidRequestError, RequestError, }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/connector/wise/transformers.rs<|crate|> router anchor=from kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/connector/wise/transformers.rs" role="context" start="623" end="633"> fn from(entity_type: PayoutEntityType) -> Self { match entity_type { PayoutEntityType::Individual | PayoutEntityType::Personal | PayoutEntityType::NonProfit | PayoutEntityType::NaturalPerson => Self::Private, PayoutEntityType::Company | PayoutEntityType::PublicSector | PayoutEntityType::Business => Self::Business, } } <file_sep path="hyperswitch/crates/router/src/connector/wise/transformers.rs" role="context" start="622" end="622"> use crate::{ connector::utils::{self, PayoutsData, RouterData}, types::{ api::payouts, storage::enums::{self as storage_enums, PayoutEntityType}, }, }; <file_sep path="hyperswitch/crates/router/src/connector/wise/transformers.rs" role="context" start="639" end="649"> fn try_from(payout_method_type: PayoutMethodData) -> Result<Self, Self::Error> { match payout_method_type { PayoutMethodData::Bank(api_models::payouts::Bank::Ach(_)) => Ok(Self::Aba), PayoutMethodData::Bank(api_models::payouts::Bank::Bacs(_)) => Ok(Self::SortCode), PayoutMethodData::Bank(api_models::payouts::Bank::Sepa(_)) => Ok(Self::Iban), _ => Err(errors::ConnectorError::NotImplemented( utils::get_unimplemented_payment_method_error_message("Wise"), ) .into()), } } <file_sep path="hyperswitch/crates/router/src/connector/wise/transformers.rs" role="context" start="609" end="618"> fn from(wise_status: WiseStatus) -> Self { match wise_status { WiseStatus::Completed => Self::Success, WiseStatus::Rejected => Self::Failed, WiseStatus::Cancelled => Self::Cancelled, WiseStatus::Pending | WiseStatus::Processing | WiseStatus::IncomingPaymentWaiting => { Self::Pending } } } <file_sep path="hyperswitch/crates/router/src/connector/wise/transformers.rs" role="context" start="582" end="604"> fn try_from( item: types::PayoutsResponseRouterData<F, WiseFulfillResponse>, ) -> Result<Self, Self::Error> { let response: WiseFulfillResponse = item.response; Ok(Self { response: Ok(types::PayoutsResponseData { status: Some(storage_enums::PayoutStatus::from(response.status)), connector_payout_id: Some( item.data .request .connector_payout_id .clone() .ok_or(errors::ConnectorError::MissingConnectorTransactionID)?, ), payout_eligible: None, should_add_next_step_to_process_tracker: false, error_code: None, error_message: None, }), ..item.data }) } <file_sep path="hyperswitch/crates/router/src/connector/wise/transformers.rs" role="context" start="324" end="362"> fn get_payout_bank_details( payout_method_data: PayoutMethodData, address: Option<&hyperswitch_domain_models::address::Address>, entity_type: PayoutEntityType, ) -> Result<WiseBankDetails, errors::ConnectorError> { let wise_address_details = match get_payout_address_details(address) { Some(a) => Ok(a), None => Err(errors::ConnectorError::MissingRequiredField { field_name: "address", }), }?; match payout_method_data { PayoutMethodData::Bank(payouts::BankPayout::Ach(b)) => Ok(WiseBankDetails { legal_type: LegalType::from(entity_type), address: Some(wise_address_details), account_number: Some(b.bank_account_number.to_owned()), abartn: Some(b.bank_routing_number), account_type: Some(AccountType::Checking), ..WiseBankDetails::default() }), PayoutMethodData::Bank(payouts::BankPayout::Bacs(b)) => Ok(WiseBankDetails { legal_type: LegalType::from(entity_type), address: Some(wise_address_details), account_number: Some(b.bank_account_number.to_owned()), sort_code: Some(b.bank_sort_code), ..WiseBankDetails::default() }), PayoutMethodData::Bank(payouts::BankPayout::Sepa(b)) => Ok(WiseBankDetails { legal_type: LegalType::from(entity_type), address: Some(wise_address_details), iban: Some(b.iban.to_owned()), bic: b.bic, ..WiseBankDetails::default() }), _ => Err(errors::ConnectorError::NotImplemented( utils::get_unimplemented_payment_method_error_message("Wise"), ))?, } } <file_sep path="hyperswitch/crates/router/src/connector/wise/transformers.rs" role="context" start="534" end="554"> fn try_from( item: types::PayoutsResponseRouterData<F, WisePayoutResponse>, ) -> Result<Self, Self::Error> { let response: WisePayoutResponse = item.response; let status = match storage_enums::PayoutStatus::from(response.status) { storage_enums::PayoutStatus::Cancelled => storage_enums::PayoutStatus::Cancelled, _ => storage_enums::PayoutStatus::RequiresFulfillment, }; Ok(Self { response: Ok(types::PayoutsResponseData { status: Some(status), connector_payout_id: Some(response.id.to_string()), payout_eligible: None, should_add_next_step_to_process_tracker: false, error_code: None, error_message: None, }), ..item.data }) } <file_sep path="hyperswitch/crates/router/src/core/payments/types.rs" role="context" start="37" end="37"> struct Private {}
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/types/transformers.rs<|crate|> router anchor=from kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/types/transformers.rs" role="context" start="1795" end="1807"> fn from(addr: domain::Address) -> Self { Self { city: addr.city, country: addr.country, line1: addr.line1.map(Encryptable::into_inner), line2: addr.line2.map(Encryptable::into_inner), line3: addr.line3.map(Encryptable::into_inner), zip: addr.zip.map(Encryptable::into_inner), state: addr.state.map(Encryptable::into_inner), first_name: addr.first_name.map(Encryptable::into_inner), last_name: addr.last_name.map(Encryptable::into_inner), } } <file_sep path="hyperswitch/crates/router/src/types/transformers.rs" role="context" start="1794" end="1794"> use common_utils::{ consts::X_HS_LATENCY, crypto::Encryptable, ext_traits::{Encode, StringExt, ValueExt}, fp_utils::when, pii, types::ConnectorTransactionIdTrait, }; use super::domain; <file_sep path="hyperswitch/crates/router/src/types/transformers.rs" role="context" start="1823" end="1825"> fn foreign_from(item: api_models::organization::OrganizationNew) -> Self { Self::new(item.org_id, item.org_name) } <file_sep path="hyperswitch/crates/router/src/types/transformers.rs" role="context" start="1811" end="1817"> fn foreign_from(value: ConnectorSelection) -> Self { match value { ConnectorSelection::Priority(connectors) => Self::Priority(connectors), ConnectorSelection::VolumeSplit(splits) => Self::VolumeSplit(splits), } } <file_sep path="hyperswitch/crates/router/src/types/transformers.rs" role="context" start="1776" end="1791"> fn foreign_from( (payment_link_config, status): (storage::PaymentLink, payments::PaymentLinkStatus), ) -> Self { Self { payment_link_id: payment_link_config.payment_link_id, merchant_id: payment_link_config.merchant_id, link_to_pay: payment_link_config.link_to_pay, amount: payment_link_config.amount, created_at: payment_link_config.created_at, expiry: payment_link_config.fulfilment_time, description: payment_link_config.description, currency: payment_link_config.currency, status, secure_link: payment_link_config.secure_link, } } <file_sep path="hyperswitch/crates/router/src/types/transformers.rs" role="context" start="1692" end="1770"> fn foreign_try_from( value: ( Option<&storage::PaymentAttempt>, Option<&storage::PaymentIntent>, Option<&domain::Address>, Option<&domain::Address>, Option<&domain::Customer>, ), ) -> Result<Self, Self::Error> { let (payment_attempt, payment_intent, shipping, billing, customer) = value; // Populating the dynamic fields directly, for the cases where we have customer details stored in // Payment Intent let customer_details_from_pi = payment_intent .and_then(|payment_intent| payment_intent.customer_details.clone()) .map(|customer_details| { customer_details .into_inner() .peek() .clone() .parse_value::<CustomerData>("CustomerData") .change_context(errors::ApiErrorResponse::InvalidDataValue { field_name: "customer_details", }) .attach_printable("Failed to parse customer_details") }) .transpose() .change_context(errors::ApiErrorResponse::InvalidDataValue { field_name: "customer_details", })?; let mut billing_address = billing .map(hyperswitch_domain_models::address::Address::from) .map(api_types::Address::from); // This change is to fix a merchant integration // If billing.email is not passed by the merchant, and if the customer email is present, then use the `customer.email` as the billing email if let Some(billing_address) = &mut billing_address { billing_address.email = billing_address.email.clone().or_else(|| { customer .and_then(|cust| { cust.email .as_ref() .map(|email| pii::Email::from(email.clone())) }) .or(customer_details_from_pi.clone().and_then(|cd| cd.email)) }); } else { billing_address = Some(payments::Address { email: customer .and_then(|cust| { cust.email .as_ref() .map(|email| pii::Email::from(email.clone())) }) .or(customer_details_from_pi.clone().and_then(|cd| cd.email)), ..Default::default() }); } Ok(Self { currency: payment_attempt.map(|pa| pa.currency.unwrap_or_default()), shipping: shipping .map(hyperswitch_domain_models::address::Address::from) .map(api_types::Address::from), billing: billing_address, amount: payment_attempt .map(|pa| api_types::Amount::from(pa.net_amount.get_order_amount())), email: customer .and_then(|cust| cust.email.as_ref().map(|em| pii::Email::from(em.clone()))) .or(customer_details_from_pi.clone().and_then(|cd| cd.email)), phone: customer .and_then(|cust| cust.phone.as_ref().map(|p| p.clone().into_inner())) .or(customer_details_from_pi.clone().and_then(|cd| cd.phone)), name: customer .and_then(|cust| cust.name.as_ref().map(|n| n.clone().into_inner())) .or(customer_details_from_pi.clone().and_then(|cd| cd.name)), ..Self::default() }) } <file_sep path="hyperswitch/crates/router/src/types/transformers.rs" role="context" start="139" end="141"> fn foreign_from(s: storage_enums::AttemptStatus) -> Self { Self::from(s) } <file_sep path="hyperswitch/crates/router/tests/macros.rs" role="context" start="17" end="21"> struct Address { line1: String, zip: String, city: String, } <file_sep path="hyperswitch/migrations/2025-02-06-111828_drop_int_id_column_accross_database/up.sql" role="context" start="20" end="36"> ------------------------ Payment Attempt ----------------------- ALTER TABLE payment_attempt DROP COLUMN id; ------------------------ Payment Methods ----------------------- ALTER TABLE payment_methods DROP COLUMN IF EXISTS id; ------------------------ Address ----------------------- ALTER TABLE address DROP COLUMN IF EXISTS id; ------------------------ Dispute ----------------------- ALTER TABLE dispute DROP COLUMN IF EXISTS id; ------------------------ Mandate ----------------------- ALTER TABLE mandate DROP COLUMN IF EXISTS id; ------------------------ Refund ----------------------- <file_sep path="hyperswitch/crates/api_models/src/payments.rs" role="context" start="4244" end="4252"> pub struct Address { /// Provide the address details pub address: Option<AddressDetails>, pub phone: Option<PhoneDetails>, #[schema(value_type = Option<String>)] pub email: Option<Email>, }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/connector/stripe/transformers.rs<|crate|> router anchor=should_return_err_for_empty_country kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=1<|meta_end|> <file_sep path="hyperswitch/crates/router/src/connector/stripe/transformers.rs" role="context" start="4345" end="4367"> fn should_return_err_for_empty_country() { // Arrange let stripe_shipping_address = create_stripe_shipping_address( "name".to_string(), Some("line1".to_string()), None, Some("zip".to_string()), ); let payment_method = &StripePaymentMethodType::AfterpayClearpay; //Act let result = validate_shipping_address_against_payment_method( &Some(stripe_shipping_address), Some(payment_method), ); // Assert assert!(result.is_err()); let missing_fields = get_missing_fields(result.unwrap_err().current_context()).to_owned(); assert_eq!(missing_fields.len(), 1); assert_eq!(*missing_fields.first().unwrap(), "shipping.address.country"); } <file_sep path="hyperswitch/crates/router/src/connector/stripe/transformers.rs" role="context" start="4394" end="4418"> fn should_return_error_when_missing_multiple_fields() { // Arrange let expected_missing_field_names: Vec<&'static str> = vec!["shipping.address.zip", "shipping.address.country"]; let stripe_shipping_address = create_stripe_shipping_address( "name".to_string(), Some("line1".to_string()), None, None, ); let payment_method = &StripePaymentMethodType::AfterpayClearpay; //Act let result = validate_shipping_address_against_payment_method( &Some(stripe_shipping_address), Some(payment_method), ); // Assert assert!(result.is_err()); let missing_fields = get_missing_fields(result.unwrap_err().current_context()).to_owned(); for field in missing_fields { assert!(expected_missing_field_names.contains(&field)); } } <file_sep path="hyperswitch/crates/router/src/connector/stripe/transformers.rs" role="context" start="4370" end="4391"> fn should_return_err_for_empty_zip() { // Arrange let stripe_shipping_address = create_stripe_shipping_address( "name".to_string(), Some("line1".to_string()), Some(CountryAlpha2::AD), None, ); let payment_method = &StripePaymentMethodType::AfterpayClearpay; //Act let result = validate_shipping_address_against_payment_method( &Some(stripe_shipping_address), Some(payment_method), ); // Assert assert!(result.is_err()); let missing_fields = get_missing_fields(result.unwrap_err().current_context()).to_owned(); assert_eq!(missing_fields.len(), 1); assert_eq!(*missing_fields.first().unwrap(), "shipping.address.zip"); } <file_sep path="hyperswitch/crates/router/src/connector/stripe/transformers.rs" role="context" start="4320" end="4342"> fn should_return_err_for_empty_line1() { // Arrange let stripe_shipping_address = create_stripe_shipping_address( "name".to_string(), None, Some(CountryAlpha2::AD), Some("zip".to_string()), ); let payment_method = &StripePaymentMethodType::AfterpayClearpay; //Act let result = validate_shipping_address_against_payment_method( &Some(stripe_shipping_address), Some(payment_method), ); // Assert assert!(result.is_err()); let missing_fields = get_missing_fields(result.unwrap_err().current_context()).to_owned(); assert_eq!(missing_fields.len(), 1); assert_eq!(*missing_fields.first().unwrap(), "shipping.address.line1"); } <file_sep path="hyperswitch/crates/router/src/connector/stripe/transformers.rs" role="context" start="4298" end="4317"> fn should_return_ok() { // Arrange let stripe_shipping_address = create_stripe_shipping_address( "name".to_string(), Some("line1".to_string()), Some(CountryAlpha2::AD), Some("zip".to_string()), ); let payment_method = &StripePaymentMethodType::AfterpayClearpay; //Act let result = validate_shipping_address_against_payment_method( &Some(stripe_shipping_address), Some(payment_method), ); // Assert assert!(result.is_ok()); } <file_sep path="hyperswitch/crates/router/src/connector/stripe/transformers.rs" role="context" start="4428" end="4444"> fn create_stripe_shipping_address( name: String, line1: Option<String>, country: Option<CountryAlpha2>, zip: Option<String>, ) -> StripeShippingAddress { StripeShippingAddress { name: Secret::new(name), line1: line1.map(Secret::new), country, zip: zip.map(Secret::new), city: Some(String::from("city")), line2: Some(Secret::new(String::from("line2"))), state: Some(Secret::new(String::from("state"))), phone: Some(Secret::new(String::from("pbone number"))), } } <file_sep path="hyperswitch/crates/router/src/connector/stripe/transformers.rs" role="context" start="4420" end="4426"> fn get_missing_fields(connector_error: &errors::ConnectorError) -> Vec<&'static str> { if let errors::ConnectorError::MissingRequiredFields { field_names } = connector_error { return field_names.to_vec(); } vec![] } <file_sep path="hyperswitch/crates/router/src/connector/stripe/transformers.rs" role="context" start="647" end="676"> pub enum StripePaymentMethodType { Affirm, AfterpayClearpay, Alipay, #[serde(rename = "amazon_pay")] AmazonPay, #[serde(rename = "au_becs_debit")] Becs, #[serde(rename = "bacs_debit")] Bacs, Bancontact, Blik, Card, CustomerBalance, Eps, Giropay, Ideal, Klarna, #[serde(rename = "p24")] Przelewy24, #[serde(rename = "sepa_debit")] Sepa, Sofort, #[serde(rename = "us_bank_account")] Ach, #[serde(rename = "wechat_pay")] Wechatpay, #[serde(rename = "cashapp")] Cashapp, }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/configs/defaults.rs<|crate|> router anchor=default kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=1<|meta_end|> <file_sep path="hyperswitch/crates/router/src/configs/defaults.rs" role="context" start="155" end="175"> fn default() -> Self { Self { // Hex-encoded 32-byte long (64 characters long when hex-encoded) key used for calculating // hashes of API keys hash_key: String::new().into(), // Specifies the number of days before API key expiry when email reminders should be sent #[cfg(feature = "email")] expiry_reminder_days: vec![7, 3, 1], // Hex-encoded key used for calculating checksum for partial auth #[cfg(feature = "partial-auth")] checksum_auth_key: String::new().into(), // context used for blake3 #[cfg(feature = "partial-auth")] checksum_auth_context: String::new().into(), #[cfg(feature = "partial-auth")] enable_partial_auth: false, } } <file_sep path="hyperswitch/crates/router/src/configs/defaults.rs" role="context" start="284" end="379"> pub fn get_shipping_required_fields() -> HashMap<String, RequiredFieldInfo> { HashMap::from([ ( "shipping.address.first_name".to_string(), RequiredFieldInfo { required_field: "shipping.address.first_name".to_string(), display_name: "shipping_first_name".to_string(), field_type: enums::FieldType::UserShippingName, value: None, }, ), ( "shipping.address.last_name".to_string(), RequiredFieldInfo { required_field: "shipping.address.last_name".to_string(), display_name: "shipping_last_name".to_string(), field_type: enums::FieldType::UserShippingName, value: None, }, ), ( "shipping.address.city".to_string(), RequiredFieldInfo { required_field: "shipping.address.city".to_string(), display_name: "city".to_string(), field_type: enums::FieldType::UserShippingAddressCity, value: None, }, ), ( "shipping.address.state".to_string(), RequiredFieldInfo { required_field: "shipping.address.state".to_string(), display_name: "state".to_string(), field_type: enums::FieldType::UserShippingAddressState, value: None, }, ), ( "shipping.address.zip".to_string(), RequiredFieldInfo { required_field: "shipping.address.zip".to_string(), display_name: "zip".to_string(), field_type: enums::FieldType::UserShippingAddressPincode, value: None, }, ), ( "shipping.address.country".to_string(), RequiredFieldInfo { required_field: "shipping.address.country".to_string(), display_name: "country".to_string(), field_type: enums::FieldType::UserShippingAddressCountry { options: vec!["ALL".to_string()], }, value: None, }, ), ( "shipping.address.line1".to_string(), RequiredFieldInfo { required_field: "shipping.address.line1".to_string(), display_name: "line1".to_string(), field_type: enums::FieldType::UserShippingAddressLine1, value: None, }, ), ( "shipping.phone.number".to_string(), RequiredFieldInfo { required_field: "shipping.phone.number".to_string(), display_name: "phone_number".to_string(), field_type: enums::FieldType::UserPhoneNumber, value: None, }, ), ( "shipping.phone.country_code".to_string(), RequiredFieldInfo { required_field: "shipping.phone.country_code".to_string(), display_name: "dialing_code".to_string(), field_type: enums::FieldType::UserPhoneNumberCountryCode, value: None, }, ), ( "shipping.email".to_string(), RequiredFieldInfo { required_field: "shipping.email".to_string(), display_name: "email".to_string(), field_type: enums::FieldType::UserEmailAddress, value: None, }, ), ]) } <file_sep path="hyperswitch/crates/router/src/configs/defaults.rs" role="context" start="178" end="282"> pub fn get_billing_required_fields() -> HashMap<String, RequiredFieldInfo> { HashMap::from([ ( "billing.address.first_name".to_string(), RequiredFieldInfo { required_field: "payment_method_data.billing.address.first_name".to_string(), display_name: "billing_first_name".to_string(), field_type: enums::FieldType::UserBillingName, value: None, }, ), ( "billing.address.last_name".to_string(), RequiredFieldInfo { required_field: "payment_method_data.billing.address.last_name".to_string(), display_name: "billing_last_name".to_string(), field_type: enums::FieldType::UserBillingName, value: None, }, ), ( "billing.address.city".to_string(), RequiredFieldInfo { required_field: "payment_method_data.billing.address.city".to_string(), display_name: "city".to_string(), field_type: enums::FieldType::UserAddressCity, value: None, }, ), ( "billing.address.state".to_string(), RequiredFieldInfo { required_field: "payment_method_data.billing.address.state".to_string(), display_name: "state".to_string(), field_type: enums::FieldType::UserAddressState, value: None, }, ), ( "billing.address.zip".to_string(), RequiredFieldInfo { required_field: "payment_method_data.billing.address.zip".to_string(), display_name: "zip".to_string(), field_type: enums::FieldType::UserAddressPincode, value: None, }, ), ( "billing.address.country".to_string(), RequiredFieldInfo { required_field: "payment_method_data.billing.address.country".to_string(), display_name: "country".to_string(), field_type: enums::FieldType::UserAddressCountry { options: vec!["ALL".to_string()], }, value: None, }, ), ( "billing.address.line1".to_string(), RequiredFieldInfo { required_field: "payment_method_data.billing.address.line1".to_string(), display_name: "line1".to_string(), field_type: enums::FieldType::UserAddressLine1, value: None, }, ), ( "billing.address.line2".to_string(), RequiredFieldInfo { required_field: "payment_method_data.billing.address.line2".to_string(), display_name: "line2".to_string(), field_type: enums::FieldType::UserAddressLine2, value: None, }, ), ( "billing.phone.number".to_string(), RequiredFieldInfo { required_field: "payment_method_data.billing.phone.number".to_string(), display_name: "phone_number".to_string(), field_type: enums::FieldType::UserPhoneNumber, value: None, }, ), ( "billing.phone.country_code".to_string(), RequiredFieldInfo { required_field: "payment_method_data.billing.phone.country_code".to_string(), display_name: "dialing_code".to_string(), field_type: enums::FieldType::UserPhoneNumberCountryCode, value: None, }, ), ( "billing.email".to_string(), RequiredFieldInfo { required_field: "payment_method_data.billing.email".to_string(), display_name: "email".to_string(), field_type: enums::FieldType::UserEmailAddress, value: None, }, ), ]) } <file_sep path="hyperswitch/crates/router/src/configs/defaults.rs" role="context" start="143" end="150"> fn default() -> Self { Self { tenant_id: id_type::TenantId::get_default_global_tenant_id(), schema: String::from("global"), redis_key_prefix: String::from("global"), clickhouse_database: String::from("global"), } } <file_sep path="hyperswitch/crates/router/src/configs/defaults.rs" role="context" start="134" end="139"> fn default() -> Self { Self { ttl: 900, soft_kill: Some(false), } } <file_sep path="hyperswitch/crates/router/src/configs/defaults.rs" role="context" start="68" end="81"> fn default() -> Self { Self { host: "localhost".into(), host_rs: "localhost".into(), mock_locker: true, basilisk_host: "localhost".into(), locker_signing_key_id: "1".into(), //true or false locker_enabled: true, //Time to live for storage entries in locker ttl_for_storage_in_secs: 60 * 60 * 24 * 365 * 7, decryption_scheme: Default::default(), } } <file_sep path="hyperswitch/crates/router/src/configs/defaults.rs" role="context" start="40" end="53"> fn default() -> Self { Self { username: String::new(), password: String::new().into(), host: "localhost".into(), port: 5432, dbname: String::new(), pool_size: 5, connection_timeout: 10, queue_strategy: Default::default(), min_idle: None, max_lifetime: None, } }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/connector/stripe/transformers.rs<|crate|> router anchor=should_return_error_when_missing_multiple_fields kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=1<|meta_end|> <file_sep path="hyperswitch/crates/router/src/connector/stripe/transformers.rs" role="context" start="4394" end="4418"> fn should_return_error_when_missing_multiple_fields() { // Arrange let expected_missing_field_names: Vec<&'static str> = vec!["shipping.address.zip", "shipping.address.country"]; let stripe_shipping_address = create_stripe_shipping_address( "name".to_string(), Some("line1".to_string()), None, None, ); let payment_method = &StripePaymentMethodType::AfterpayClearpay; //Act let result = validate_shipping_address_against_payment_method( &Some(stripe_shipping_address), Some(payment_method), ); // Assert assert!(result.is_err()); let missing_fields = get_missing_fields(result.unwrap_err().current_context()).to_owned(); for field in missing_fields { assert!(expected_missing_field_names.contains(&field)); } } <file_sep path="hyperswitch/crates/router/src/connector/stripe/transformers.rs" role="context" start="4428" end="4444"> fn create_stripe_shipping_address( name: String, line1: Option<String>, country: Option<CountryAlpha2>, zip: Option<String>, ) -> StripeShippingAddress { StripeShippingAddress { name: Secret::new(name), line1: line1.map(Secret::new), country, zip: zip.map(Secret::new), city: Some(String::from("city")), line2: Some(Secret::new(String::from("line2"))), state: Some(Secret::new(String::from("state"))), phone: Some(Secret::new(String::from("pbone number"))), } } <file_sep path="hyperswitch/crates/router/src/connector/stripe/transformers.rs" role="context" start="4420" end="4426"> fn get_missing_fields(connector_error: &errors::ConnectorError) -> Vec<&'static str> { if let errors::ConnectorError::MissingRequiredFields { field_names } = connector_error { return field_names.to_vec(); } vec![] } <file_sep path="hyperswitch/crates/router/src/connector/stripe/transformers.rs" role="context" start="4370" end="4391"> fn should_return_err_for_empty_zip() { // Arrange let stripe_shipping_address = create_stripe_shipping_address( "name".to_string(), Some("line1".to_string()), Some(CountryAlpha2::AD), None, ); let payment_method = &StripePaymentMethodType::AfterpayClearpay; //Act let result = validate_shipping_address_against_payment_method( &Some(stripe_shipping_address), Some(payment_method), ); // Assert assert!(result.is_err()); let missing_fields = get_missing_fields(result.unwrap_err().current_context()).to_owned(); assert_eq!(missing_fields.len(), 1); assert_eq!(*missing_fields.first().unwrap(), "shipping.address.zip"); } <file_sep path="hyperswitch/crates/router/src/connector/stripe/transformers.rs" role="context" start="4345" end="4367"> fn should_return_err_for_empty_country() { // Arrange let stripe_shipping_address = create_stripe_shipping_address( "name".to_string(), Some("line1".to_string()), None, Some("zip".to_string()), ); let payment_method = &StripePaymentMethodType::AfterpayClearpay; //Act let result = validate_shipping_address_against_payment_method( &Some(stripe_shipping_address), Some(payment_method), ); // Assert assert!(result.is_err()); let missing_fields = get_missing_fields(result.unwrap_err().current_context()).to_owned(); assert_eq!(missing_fields.len(), 1); assert_eq!(*missing_fields.first().unwrap(), "shipping.address.country"); } <file_sep path="hyperswitch/crates/router/src/connector/stripe/transformers.rs" role="context" start="991" end="1019"> fn validate_shipping_address_against_payment_method( shipping_address: &Option<StripeShippingAddress>, payment_method: Option<&StripePaymentMethodType>, ) -> Result<(), error_stack::Report<errors::ConnectorError>> { match payment_method { Some(StripePaymentMethodType::AfterpayClearpay) => match shipping_address { Some(address) => { let missing_fields = collect_missing_value_keys!( ("shipping.address.line1", address.line1), ("shipping.address.country", address.country), ("shipping.address.zip", address.zip) ); if !missing_fields.is_empty() { return Err(errors::ConnectorError::MissingRequiredFields { field_names: missing_fields, } .into()); } Ok(()) } None => Err(errors::ConnectorError::MissingRequiredField { field_name: "shipping.address", } .into()), }, _ => Ok(()), } } <file_sep path="hyperswitch/crates/router/src/connector/stripe/transformers.rs" role="context" start="647" end="676"> pub enum StripePaymentMethodType { Affirm, AfterpayClearpay, Alipay, #[serde(rename = "amazon_pay")] AmazonPay, #[serde(rename = "au_becs_debit")] Becs, #[serde(rename = "bacs_debit")] Bacs, Bancontact, Blik, Card, CustomerBalance, Eps, Giropay, Ideal, Klarna, #[serde(rename = "p24")] Przelewy24, #[serde(rename = "sepa_debit")] Sepa, Sofort, #[serde(rename = "us_bank_account")] Ach, #[serde(rename = "wechat_pay")] Wechatpay, #[serde(rename = "cashapp")] Cashapp, }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/db/merchant_account.rs<|crate|> router anchor=publish_and_redact_merchant_account_cache kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/db/merchant_account.rs" role="context" start="772" end="806"> async fn publish_and_redact_merchant_account_cache( store: &dyn super::StorageInterface, merchant_account: &storage::MerchantAccount, ) -> CustomResult<(), errors::StorageError> { let publishable_key = merchant_account .publishable_key .as_ref() .map(|publishable_key| CacheKind::Accounts(publishable_key.into())); #[cfg(feature = "v1")] let cgraph_key = merchant_account.default_profile.as_ref().map(|profile_id| { CacheKind::CGraph( format!( "cgraph_{}_{}", merchant_account.get_id().get_string_repr(), profile_id.get_string_repr(), ) .into(), ) }); // TODO: we will not have default profile in v2 #[cfg(feature = "v2")] let cgraph_key = None; let mut cache_keys = vec![CacheKind::Accounts( merchant_account.get_id().get_string_repr().into(), )]; cache_keys.extend(publishable_key.into_iter()); cache_keys.extend(cgraph_key.into_iter()); cache::redact_from_redis_and_publish(store.get_cache_store().as_ref(), cache_keys).await?; Ok(()) } <file_sep path="hyperswitch/crates/router/src/db/merchant_account.rs" role="context" start="771" end="771"> use storage_impl::redis::cache::{self, CacheKind, ACCOUNTS_CACHE}; use super::{MasterKeyInterface, MockDb, Store}; use crate::{ connection, core::errors::{self, CustomResult}, db::merchant_key_store::MerchantKeyStoreInterface, types::{ domain::{ self, behaviour::{Conversion, ReverseConversion}, }, storage, }, }; <file_sep path="hyperswitch/crates/router/src/db/merchant_account.rs" role="context" start="809" end="827"> async fn publish_and_redact_all_merchant_account_cache( store: &dyn super::StorageInterface, merchant_accounts: &[storage::MerchantAccount], ) -> CustomResult<(), errors::StorageError> { let merchant_ids = merchant_accounts .iter() .map(|merchant_account| merchant_account.get_id().get_string_repr().to_string()); let publishable_keys = merchant_accounts .iter() .filter_map(|m| m.publishable_key.clone()); let cache_keys: Vec<CacheKind<'_>> = merchant_ids .chain(publishable_keys) .map(|s| CacheKind::Accounts(s.into())) .collect(); cache::redact_from_redis_and_publish(store.get_cache_store().as_ref(), cache_keys).await?; Ok(()) } <file_sep path="hyperswitch/crates/router/src/db/merchant_account.rs" role="context" start="744" end="768"> async fn list_merchant_and_org_ids( &self, _state: &KeyManagerState, limit: u32, offset: Option<u32>, ) -> CustomResult< Vec<( common_utils::id_type::MerchantId, common_utils::id_type::OrganizationId, )>, errors::StorageError, > { let accounts = self.merchant_accounts.lock().await; let limit = limit.try_into().unwrap_or(accounts.len()); let offset = offset.unwrap_or(0).try_into().unwrap_or(0); let merchant_and_org_ids = accounts .iter() .skip(offset) .take(limit) .map(|account| (account.get_id().clone(), account.organization_id.clone())) .collect::<Vec<_>>(); Ok(merchant_and_org_ids) } <file_sep path="hyperswitch/crates/router/src/db/merchant_account.rs" role="context" start="711" end="741"> async fn list_multiple_merchant_accounts( &self, state: &KeyManagerState, merchant_ids: Vec<common_utils::id_type::MerchantId>, ) -> CustomResult<Vec<domain::MerchantAccount>, errors::StorageError> { let accounts = self.merchant_accounts.lock().await; let futures = accounts .iter() .filter(|account| merchant_ids.contains(account.get_id())) .map(|account| async { let key_store = self .get_merchant_key_store_by_merchant_id( state, account.get_id(), &self.get_master_key().to_vec().into(), ) .await; match key_store { Ok(key) => account .clone() .convert(state, key.key.get_inner(), key.merchant_id.clone().into()) .await .change_context(errors::StorageError::DecryptionError), Err(err) => Err(err), } }); futures::future::join_all(futures) .await .into_iter() .collect() } <file_sep path="hyperswitch/crates/router/src/db/merchant_account.rs" role="context" start="210" end="238"> async fn update_specific_fields_in_merchant( &self, state: &KeyManagerState, merchant_id: &common_utils::id_type::MerchantId, merchant_account: storage::MerchantAccountUpdate, merchant_key_store: &domain::MerchantKeyStore, ) -> CustomResult<domain::MerchantAccount, errors::StorageError> { let conn = connection::pg_accounts_connection_write(self).await?; let updated_merchant_account = storage::MerchantAccount::update_with_specific_fields( &conn, merchant_id, merchant_account.into(), ) .await .map_err(|error| report!(errors::StorageError::from(error)))?; #[cfg(feature = "accounts_cache")] { publish_and_redact_merchant_account_cache(self, &updated_merchant_account).await?; } updated_merchant_account .convert( state, merchant_key_store.key.get_inner(), merchant_key_store.merchant_id.clone().into(), ) .await .change_context(errors::StorageError::DecryptionError) } <file_sep path="hyperswitch/crates/router/src/db/merchant_account.rs" role="context" start="179" end="207"> async fn update_merchant( &self, state: &KeyManagerState, this: domain::MerchantAccount, merchant_account: storage::MerchantAccountUpdate, merchant_key_store: &domain::MerchantKeyStore, ) -> CustomResult<domain::MerchantAccount, errors::StorageError> { let conn = connection::pg_accounts_connection_write(self).await?; let updated_merchant_account = Conversion::convert(this) .await .change_context(errors::StorageError::EncryptionError)? .update(&conn, merchant_account.into()) .await .map_err(|error| report!(errors::StorageError::from(error)))?; #[cfg(feature = "accounts_cache")] { publish_and_redact_merchant_account_cache(self, &updated_merchant_account).await?; } updated_merchant_account .convert( state, merchant_key_store.key.get_inner(), merchant_key_store.merchant_id.clone().into(), ) .await .change_context(errors::StorageError::DecryptionError) } <file_sep path="hyperswitch/crates/router/src/routes/app.rs" role="context" start="1460" end="1460"> pub struct MerchantAccount; <file_sep path="hyperswitch/v2_compatible_migrations/2024-08-28-081757_drop_not_null_constraints_on_v1_columns/up.sql" role="context" start="5" end="21"> ALTER COLUMN org_id DROP NOT NULL; -- Create index on org_id in organization table -- This is done to mullify the effects of droping primary key for v1 CREATE INDEX idx_organization_org_id ON organization (org_id); ------------------------ Merchant Account ------------------- -- Drop not null in merchant_account table for v1 columns that are dropped in v2 ALTER TABLE merchant_account DROP CONSTRAINT merchant_account_pkey, ALTER COLUMN merchant_id DROP NOT NULL, ALTER COLUMN primary_business_details DROP NOT NULL, ALTER COLUMN is_recon_enabled DROP NOT NULL; -- This is done to mullify the effects of droping primary key for v1 CREATE INDEX idx_merchant_account_merchant_id ON merchant_account (merchant_id);
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/connector/wise/transformers.rs<|crate|> router anchor=get_payout_bank_details kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/connector/wise/transformers.rs" role="context" start="324" end="362"> fn get_payout_bank_details( payout_method_data: PayoutMethodData, address: Option<&hyperswitch_domain_models::address::Address>, entity_type: PayoutEntityType, ) -> Result<WiseBankDetails, errors::ConnectorError> { let wise_address_details = match get_payout_address_details(address) { Some(a) => Ok(a), None => Err(errors::ConnectorError::MissingRequiredField { field_name: "address", }), }?; match payout_method_data { PayoutMethodData::Bank(payouts::BankPayout::Ach(b)) => Ok(WiseBankDetails { legal_type: LegalType::from(entity_type), address: Some(wise_address_details), account_number: Some(b.bank_account_number.to_owned()), abartn: Some(b.bank_routing_number), account_type: Some(AccountType::Checking), ..WiseBankDetails::default() }), PayoutMethodData::Bank(payouts::BankPayout::Bacs(b)) => Ok(WiseBankDetails { legal_type: LegalType::from(entity_type), address: Some(wise_address_details), account_number: Some(b.bank_account_number.to_owned()), sort_code: Some(b.bank_sort_code), ..WiseBankDetails::default() }), PayoutMethodData::Bank(payouts::BankPayout::Sepa(b)) => Ok(WiseBankDetails { legal_type: LegalType::from(entity_type), address: Some(wise_address_details), iban: Some(b.iban.to_owned()), bic: b.bic, ..WiseBankDetails::default() }), _ => Err(errors::ConnectorError::NotImplemented( utils::get_unimplemented_payment_method_error_message("Wise"), ))?, } } <file_sep path="hyperswitch/crates/router/src/connector/wise/transformers.rs" role="context" start="323" end="323"> use api_models::payouts::PayoutMethodData; type Error = error_stack::Report<errors::ConnectorError>; use crate::{ connector::utils::{self, PayoutsData, RouterData}, types::{ api::payouts, storage::enums::{self as storage_enums, PayoutEntityType}, }, }; use crate::{core::errors, types}; <file_sep path="hyperswitch/crates/router/src/connector/wise/transformers.rs" role="context" start="420" end="436"> fn try_from( item: types::PayoutsResponseRouterData<F, WiseRecipientCreateResponse>, ) -> Result<Self, Self::Error> { let response: WiseRecipientCreateResponse = item.response; Ok(Self { response: Ok(types::PayoutsResponseData { status: Some(storage_enums::PayoutStatus::RequiresCreation), connector_payout_id: Some(response.id.to_string()), payout_eligible: None, should_add_next_step_to_process_tracker: false, error_code: None, error_message: None, }), ..item.data }) } <file_sep path="hyperswitch/crates/router/src/connector/wise/transformers.rs" role="context" start="368" end="411"> fn try_from( item_data: &WiseRouterData<&types::PayoutsRouterData<F>>, ) -> Result<Self, Self::Error> { let item = item_data.router_data; let request = item.request.to_owned(); let customer_details = request.customer_details.to_owned(); let payout_method_data = item.get_payout_method_data()?; let bank_details = get_payout_bank_details( payout_method_data.to_owned(), item.get_optional_billing(), item.request.entity_type, )?; let source_id = match item.connector_auth_type.to_owned() { types::ConnectorAuthType::BodyKey { api_key: _, key1 } => Ok(key1), _ => Err(errors::ConnectorError::MissingRequiredField { field_name: "source_id for PayoutRecipient creation", }), }?; let payout_type = request.get_payout_type()?; match payout_type { storage_enums::PayoutType::Card | storage_enums::PayoutType::Wallet => { Err(errors::ConnectorError::NotImplemented( utils::get_unimplemented_payment_method_error_message("Wise"), ))? } storage_enums::PayoutType::Bank => { let account_holder_name = customer_details .ok_or(errors::ConnectorError::MissingRequiredField { field_name: "customer_details for PayoutRecipient creation", })? .name .ok_or(errors::ConnectorError::MissingRequiredField { field_name: "customer_details.name for PayoutRecipient creation", })?; Ok(Self { profile: source_id, currency: request.destination_currency.to_string(), recipient_type: RecipientType::try_from(payout_method_data)?, account_holder_name, details: bank_details, }) } } } <file_sep path="hyperswitch/crates/router/src/connector/wise/transformers.rs" role="context" start="308" end="321"> fn get_payout_address_details( address: Option<&hyperswitch_domain_models::address::Address>, ) -> Option<WiseAddressDetails> { address.and_then(|add| { add.address.as_ref().map(|a| WiseAddressDetails { country: a.country, country_code: a.country, first_line: a.line1.clone(), post_code: a.zip.clone(), city: a.city.clone(), state: a.state.clone(), }) }) } <file_sep path="hyperswitch/crates/router/src/connector/wise/transformers.rs" role="context" start="43" end="51"> fn try_from(auth_type: &types::ConnectorAuthType) -> Result<Self, Self::Error> { match auth_type { types::ConnectorAuthType::BodyKey { api_key, key1 } => Ok(Self { api_key: api_key.to_owned(), profile_id: key1.to_owned(), }), _ => Err(errors::ConnectorError::FailedToObtainAuthType)?, } } <file_sep path="hyperswitch/crates/router/src/connector/wise/transformers.rs" role="context" start="623" end="633"> fn from(entity_type: PayoutEntityType) -> Self { match entity_type { PayoutEntityType::Individual | PayoutEntityType::Personal | PayoutEntityType::NonProfit | PayoutEntityType::NaturalPerson => Self::Private, PayoutEntityType::Company | PayoutEntityType::PublicSector | PayoutEntityType::Business => Self::Business, } } <file_sep path="hyperswitch/crates/router/src/connector/wise/transformers.rs" role="context" start="134" end="138"> pub enum LegalType { Business, #[default] Private, } <file_sep path="hyperswitch/crates/router/src/connector/wise/transformers.rs" role="context" start="107" end="129"> pub struct WiseBankDetails { legal_type: LegalType, account_type: Option<AccountType>, address: Option<WiseAddressDetails>, post_code: Option<String>, nationality: Option<String>, account_holder_name: Option<Secret<String>>, email: Option<Email>, account_number: Option<Secret<String>>, city: Option<String>, sort_code: Option<Secret<String>>, iban: Option<Secret<String>>, bic: Option<Secret<String>>, transit_number: Option<Secret<String>>, routing_number: Option<Secret<String>>, abartn: Option<Secret<String>>, swift_code: Option<Secret<String>>, payin_reference: Option<String>, psp_reference: Option<String>, tax_id: Option<String>, order_id: Option<String>, job: Option<String>, } <file_sep path="hyperswitch/crates/router/tests/macros.rs" role="context" start="17" end="21"> struct Address { line1: String, zip: String, city: String, } <file_sep path="hyperswitch/migrations/2025-02-06-111828_drop_int_id_column_accross_database/up.sql" role="context" start="20" end="36"> ------------------------ Payment Attempt ----------------------- ALTER TABLE payment_attempt DROP COLUMN id; ------------------------ Payment Methods ----------------------- ALTER TABLE payment_methods DROP COLUMN IF EXISTS id; ------------------------ Address ----------------------- ALTER TABLE address DROP COLUMN IF EXISTS id; ------------------------ Dispute ----------------------- ALTER TABLE dispute DROP COLUMN IF EXISTS id; ------------------------ Mandate ----------------------- ALTER TABLE mandate DROP COLUMN IF EXISTS id; ------------------------ Refund ----------------------- <file_sep path="hyperswitch/crates/api_models/src/payments.rs" role="context" start="4244" end="4252"> pub struct Address { /// Provide the address details pub address: Option<AddressDetails>, pub phone: Option<PhoneDetails>, #[schema(value_type = Option<String>)] pub email: Option<Email>, }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/payment_methods/vault.rs<|crate|> router anchor=get_tokenized_data kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/payment_methods/vault.rs" role="context" start="1076" end="1138"> pub async fn get_tokenized_data( state: &routes::SessionState, lookup_key: &str, _should_get_value2: bool, encryption_key: &masking::Secret<Vec<u8>>, ) -> RouterResult<api::TokenizePayloadRequest> { let redis_key = get_redis_locker_key(lookup_key); let func = || async { metrics::GET_TOKENIZED_CARD.add(1, &[]); let redis_conn = state .store .get_redis_conn() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to get redis connection")?; let response = redis_conn .get_key::<bytes::Bytes>(&redis_key.as_str().into()) .await; match response { Ok(resp) => { let decrypted_payload = GcmAes256 .decode_message( encryption_key.peek().as_ref(), masking::Secret::new(resp.into()), ) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to decode redis temp locker data")?; let get_response: api::TokenizePayloadRequest = bytes::Bytes::from(decrypted_payload) .parse_struct("TokenizePayloadRequest") .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable( "Error getting TokenizePayloadRequest from tokenize response", )?; Ok(get_response) } Err(err) => { metrics::TEMP_LOCKER_FAILURES.add(1, &[]); Err(err).change_context(errors::ApiErrorResponse::UnprocessableEntity { message: "Token is invalid or expired".into(), }) } } }; match func().await { Ok(s) => { logger::info!( "Fetch payload in redis locker successful with lookup key: {:?}", redis_key ); Ok(s) } Err(err) => { logger::error!("Redis Temp locker Failed: {:?}", err); Err(err) } } } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/vault.rs" role="context" start="1075" end="1075"> use common_utils::{ crypto::{DecodeMessage, EncodeMessage, GcmAes256}, ext_traits::{BytesExt, Encode}, generate_id_with_default_len, id_type, pii::Email, }; use masking::PeekInterface; use crate::types::api::payouts; use crate::{ consts, core::errors::{self, CustomResult, RouterResult}, db, logger, routes, routes::metrics, types::{ api, domain, storage::{self, enums}, }, utils::StringExt, }; <file_sep path="hyperswitch/crates/router/src/core/payment_methods/vault.rs" role="context" start="1187" end="1218"> async fn create_vault_request<R: pm_types::VaultingInterface>( jwekey: &settings::Jwekey, locker: &settings::Locker, payload: Vec<u8>, tenant_id: id_type::TenantId, ) -> CustomResult<request::Request, errors::VaultError> { let private_key = jwekey.vault_private_key.peek().as_bytes(); let jws = services::encryption::jws_sign_payload( &payload, &locker.locker_signing_key_id, private_key, ) .await .change_context(errors::VaultError::RequestEncryptionFailed)?; let jwe_payload = pm_transforms::create_jwe_body_for_vault(jwekey, &jws).await?; let mut url = locker.host.to_owned(); url.push_str(R::get_vaulting_request_url()); let mut request = request::Request::new(services::Method::Post, &url); request.add_header( headers::CONTENT_TYPE, consts::VAULT_HEADER_CONTENT_TYPE.into(), ); request.add_header( headers::X_TENANT_ID, tenant_id.get_string_repr().to_owned().into(), ); request.set_body(request::RequestContent::Json(Box::new(jwe_payload))); Ok(request) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/vault.rs" role="context" start="1141" end="1184"> pub async fn delete_tokenized_data( state: &routes::SessionState, lookup_key: &str, ) -> RouterResult<()> { let redis_key = get_redis_locker_key(lookup_key); let func = || async { metrics::DELETED_TOKENIZED_CARD.add(1, &[]); let redis_conn = state .store .get_redis_conn() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to get redis connection")?; let response = redis_conn.delete_key(&redis_key.as_str().into()).await; match response { Ok(redis_interface::DelReply::KeyDeleted) => Ok(()), Ok(redis_interface::DelReply::KeyNotDeleted) => { Err(errors::ApiErrorResponse::InternalServerError) .attach_printable("Token invalid or expired") } Err(err) => { metrics::TEMP_LOCKER_FAILURES.add(1, &[]); Err(errors::ApiErrorResponse::InternalServerError).attach_printable_lazy(|| { format!("Failed to delete from redis locker: {err:?}") }) } } }; match func().await { Ok(s) => { logger::info!( "Delete payload in redis locker successful with lookup key: {:?}", redis_key ); Ok(s) } Err(err) => { logger::error!("Redis Temp locker Failed: {:?}", err); Err(err) } } } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/vault.rs" role="context" start="1011" end="1073"> pub async fn create_tokenize( state: &routes::SessionState, value1: String, value2: Option<String>, lookup_key: String, encryption_key: &masking::Secret<Vec<u8>>, ) -> RouterResult<String> { let redis_key = get_redis_locker_key(lookup_key.as_str()); let func = || async { metrics::CREATED_TOKENIZED_CARD.add(1, &[]); let payload_to_be_encrypted = api::TokenizePayloadRequest { value1: value1.clone(), value2: value2.clone().unwrap_or_default(), lookup_key: lookup_key.clone(), service_name: VAULT_SERVICE_NAME.to_string(), }; let payload = payload_to_be_encrypted .encode_to_string_of_json() .change_context(errors::ApiErrorResponse::InternalServerError)?; let encrypted_payload = GcmAes256 .encode_message(encryption_key.peek().as_ref(), payload.as_bytes()) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to encode redis temp locker data")?; let redis_conn = state .store .get_redis_conn() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to get redis connection")?; redis_conn .set_key_if_not_exists_with_expiry( &redis_key.as_str().into(), bytes::Bytes::from(encrypted_payload), Some(i64::from(consts::LOCKER_REDIS_EXPIRY_SECONDS)), ) .await .map(|_| lookup_key.clone()) .inspect_err(|error| { metrics::TEMP_LOCKER_FAILURES.add(1, &[]); logger::error!(?error, "Failed to store tokenized data in Redis"); }) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error from redis locker") }; match func().await { Ok(s) => { logger::info!( "Insert payload in redis locker successful with lookup key: {:?}", redis_key ); Ok(s) } Err(err) => { logger::error!("Redis Temp locker Failed: {:?}", err); Err(err) } } } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/vault.rs" role="context" start="1006" end="1008"> fn get_redis_locker_key(lookup_key: &str) -> String { format!("{}_{}", consts::LOCKER_REDIS_PREFIX, lookup_key) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/vault.rs" role="context" start="887" end="900"> pub async fn get_payment_method_data_from_locker( state: &routes::SessionState, lookup_key: &str, merchant_key_store: &domain::MerchantKeyStore, ) -> RouterResult<(Option<domain::PaymentMethodData>, SupplementaryVaultData)> { let de_tokenize = get_tokenized_data(state, lookup_key, true, merchant_key_store.key.get_inner()).await?; let (payment_method, customer_id) = domain::PaymentMethodData::from_values(de_tokenize.value1, de_tokenize.value2) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error parsing Payment Method from Values")?; Ok((Some(payment_method), customer_id)) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/vault.rs" role="context" start="938" end="951"> pub async fn get_payout_method_data_from_temporary_locker( state: &routes::SessionState, lookup_key: &str, merchant_key_store: &domain::MerchantKeyStore, ) -> RouterResult<(Option<api::PayoutMethodData>, SupplementaryVaultData)> { let de_tokenize = get_tokenized_data(state, lookup_key, true, merchant_key_store.key.get_inner()).await?; let (payout_method, supp_data) = api::PayoutMethodData::from_values(de_tokenize.value1, de_tokenize.value2) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error parsing Payout Method from Values")?; Ok((Some(payout_method), supp_data)) } <file_sep path="hyperswitch/crates/router/tests/utils.rs" role="context" start="399" end="401"> pub struct Error { pub message: Message, } <file_sep path="hyperswitch/crates/api_models/src/errors/types.rs" role="context" start="86" end="100"> pub enum ApiErrorResponse { Unauthorized(ApiError), ForbiddenCommonResource(ApiError), ForbiddenPrivateResource(ApiError), Conflict(ApiError), Gone(ApiError), Unprocessable(ApiError), InternalServerError(ApiError), NotImplemented(ApiError), ConnectorError(ApiError, #[serde(skip_serializing)] StatusCode), NotFound(ApiError), MethodNotAllowed(ApiError), BadRequest(ApiError), DomainError(ApiError), }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/user.rs<|crate|> router anchor=handle_invitation kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/user.rs" role="context" start="664" end="730"> async fn handle_invitation( state: &SessionState, user_from_token: &auth::UserFromToken, request: &user_api::InviteUserRequest, req_state: &ReqState, auth_id: &Option<String>, ) -> UserResult<InviteMultipleUserResponse> { let inviter_user = user_from_token.get_user_from_db(state).await?; if inviter_user.get_email() == request.email { return Err(UserErrors::InvalidRoleOperationWithMessage( "User Inviting themselves".to_string(), ) .into()); } let role_info = roles::RoleInfo::from_role_id_in_lineage( state, &request.role_id, &user_from_token.merchant_id, &user_from_token.org_id, &user_from_token.profile_id, user_from_token .tenant_id .as_ref() .unwrap_or(&state.tenant.tenant_id), ) .await .to_not_found_response(UserErrors::InvalidRoleId)?; if !role_info.is_invitable() { return Err(report!(UserErrors::InvalidRoleId)) .attach_printable(format!("role_id = {} is not invitable", request.role_id)); } let invitee_email = domain::UserEmail::from_pii_email(request.email.clone())?; let invitee_user = state.global_store.find_user_by_email(&invitee_email).await; if let Ok(invitee_user) = invitee_user { handle_existing_user_invitation( state, user_from_token, request, invitee_user.into(), role_info, auth_id, ) .await } else if invitee_user .as_ref() .map_err(|e| e.current_context().is_db_not_found()) .err() .unwrap_or(false) { handle_new_user_invitation( state, user_from_token, request, role_info, req_state.clone(), auth_id, ) .await } else { Err(UserErrors::InternalServerError.into()) } } <file_sep path="hyperswitch/crates/router/src/core/user.rs" role="context" start="663" end="663"> use api_models::{ payments::RedirectionResponse, user::{self as user_api, InviteMultipleUserResponse, NameIdUnit}, }; use error_stack::{report, ResultExt}; use user_api::dashboard_metadata::SetMetaDataRequest; use super::errors::{StorageErrorExt, UserErrors, UserResponse, UserResult}; use crate::services::email::types as email_types; use crate::{ consts, core::encryption::send_request_to_key_service_for_user, db::{ domain::user_authentication_method::DEFAULT_USER_AUTH_METHOD, user_role::ListUserRolesByUserIdPayload, }, routes::{app::ReqState, SessionState}, services::{authentication as auth, authorization::roles, openidconnect, ApplicationResponse}, types::{domain, transformers::ForeignInto}, utils::{ self, user::{theme as theme_utils, two_factor_auth as tfa_utils}, }, }; <file_sep path="hyperswitch/crates/router/src/core/user.rs" role="context" start="960" end="1131"> async fn handle_new_user_invitation( state: &SessionState, user_from_token: &auth::UserFromToken, request: &user_api::InviteUserRequest, role_info: roles::RoleInfo, req_state: ReqState, auth_id: &Option<String>, ) -> UserResult<InviteMultipleUserResponse> { let new_user = domain::NewUser::try_from((request.clone(), user_from_token.clone()))?; new_user .insert_user_in_db(state.global_store.as_ref()) .await .change_context(UserErrors::InternalServerError)?; let invitation_status = if cfg!(feature = "email") { UserStatus::InvitationSent } else { UserStatus::Active }; let now = common_utils::date_time::now(); let user_role = domain::NewUserRole { user_id: new_user.get_user_id().to_owned(), role_id: request.role_id.clone(), status: invitation_status, created_by: user_from_token.user_id.clone(), last_modified_by: user_from_token.user_id.clone(), created_at: now, last_modified: now, entity: domain::NoLevel, }; let _user_role = match role_info.get_entity_type() { EntityType::Tenant => { return Err(UserErrors::InvalidRoleOperationWithMessage( "Tenant roles are not allowed for this operation".to_string(), ) .into()); } EntityType::Organization => { user_role .add_entity(domain::OrganizationLevel { tenant_id: user_from_token .tenant_id .clone() .unwrap_or(state.tenant.tenant_id.clone()), org_id: user_from_token.org_id.clone(), }) .insert_in_v2(state) .await? } EntityType::Merchant => { user_role .add_entity(domain::MerchantLevel { tenant_id: user_from_token .tenant_id .clone() .unwrap_or(state.tenant.tenant_id.clone()), org_id: user_from_token.org_id.clone(), merchant_id: user_from_token.merchant_id.clone(), }) .insert_in_v2(state) .await? } EntityType::Profile => { user_role .add_entity(domain::ProfileLevel { tenant_id: user_from_token .tenant_id .clone() .unwrap_or(state.tenant.tenant_id.clone()), org_id: user_from_token.org_id.clone(), merchant_id: user_from_token.merchant_id.clone(), profile_id: user_from_token.profile_id.clone(), }) .insert_in_v2(state) .await? } }; let is_email_sent; #[cfg(feature = "email")] { // TODO: Adding this to avoid clippy lints // Will be adding actual usage for this variable later let _ = req_state.clone(); let invitee_email = domain::UserEmail::from_pii_email(request.email.clone())?; let entity = match role_info.get_entity_type() { EntityType::Tenant => { return Err(UserErrors::InvalidRoleOperationWithMessage( "Tenant roles are not allowed for this operation".to_string(), ) .into()); } EntityType::Organization => email_types::Entity { entity_id: user_from_token.org_id.get_string_repr().to_owned(), entity_type: EntityType::Organization, }, EntityType::Merchant => email_types::Entity { entity_id: user_from_token.merchant_id.get_string_repr().to_owned(), entity_type: EntityType::Merchant, }, EntityType::Profile => email_types::Entity { entity_id: user_from_token.profile_id.get_string_repr().to_owned(), entity_type: EntityType::Profile, }, }; let theme = theme_utils::get_most_specific_theme_using_token_and_min_entity( state, user_from_token, role_info.get_entity_type(), ) .await?; let email_contents = email_types::InviteUser { recipient_email: invitee_email, user_name: domain::UserName::new(new_user.get_name())?, settings: state.conf.clone(), entity, auth_id: auth_id.clone(), theme_id: theme.as_ref().map(|theme| theme.theme_id.clone()), theme_config: theme .map(|theme| theme.email_config()) .unwrap_or(state.conf.theme.email_config.clone()), }; let send_email_result = state .email_client .compose_and_send_email( email_types::get_base_url(state), Box::new(email_contents), state.conf.proxy.https_url.as_ref(), ) .await; logger::info!(?send_email_result); is_email_sent = send_email_result.is_ok(); } #[cfg(not(feature = "email"))] { is_email_sent = false; let invited_user_token = auth::UserFromToken { user_id: new_user.get_user_id(), merchant_id: user_from_token.merchant_id.clone(), org_id: user_from_token.org_id.clone(), role_id: request.role_id.clone(), profile_id: user_from_token.profile_id.clone(), tenant_id: user_from_token.tenant_id.clone(), }; let set_metadata_request = SetMetaDataRequest::IsChangePasswordRequired; dashboard_metadata::set_metadata( state.clone(), invited_user_token, set_metadata_request, req_state, ) .await?; } Ok(InviteMultipleUserResponse { is_email_sent, password: new_user .get_password() .map(|password| password.get_secret()), email: request.email.clone(), error: None, }) } <file_sep path="hyperswitch/crates/router/src/core/user.rs" role="context" start="733" end="957"> async fn handle_existing_user_invitation( state: &SessionState, user_from_token: &auth::UserFromToken, request: &user_api::InviteUserRequest, invitee_user_from_db: domain::UserFromStorage, role_info: roles::RoleInfo, auth_id: &Option<String>, ) -> UserResult<InviteMultipleUserResponse> { let now = common_utils::date_time::now(); if state .global_store .find_user_role_by_user_id_and_lineage( invitee_user_from_db.get_user_id(), user_from_token .tenant_id .as_ref() .unwrap_or(&state.tenant.tenant_id), &user_from_token.org_id, &user_from_token.merchant_id, &user_from_token.profile_id, UserRoleVersion::V1, ) .await .is_err_and(|err| err.current_context().is_db_not_found()) .not() { return Err(UserErrors::UserExists.into()); } if state .global_store .find_user_role_by_user_id_and_lineage( invitee_user_from_db.get_user_id(), user_from_token .tenant_id .as_ref() .unwrap_or(&state.tenant.tenant_id), &user_from_token.org_id, &user_from_token.merchant_id, &user_from_token.profile_id, UserRoleVersion::V2, ) .await .is_err_and(|err| err.current_context().is_db_not_found()) .not() { return Err(UserErrors::UserExists.into()); } let (org_id, merchant_id, profile_id) = match role_info.get_entity_type() { EntityType::Tenant => { return Err(UserErrors::InvalidRoleOperationWithMessage( "Tenant roles are not allowed for this operation".to_string(), ) .into()); } EntityType::Organization => (Some(&user_from_token.org_id), None, None), EntityType::Merchant => ( Some(&user_from_token.org_id), Some(&user_from_token.merchant_id), None, ), EntityType::Profile => ( Some(&user_from_token.org_id), Some(&user_from_token.merchant_id), Some(&user_from_token.profile_id), ), }; if state .global_store .list_user_roles_by_user_id(ListUserRolesByUserIdPayload { user_id: invitee_user_from_db.get_user_id(), tenant_id: user_from_token .tenant_id .as_ref() .unwrap_or(&state.tenant.tenant_id), org_id, merchant_id, profile_id, entity_id: None, version: None, status: None, limit: Some(1), }) .await .is_ok_and(|data| data.is_empty().not()) { return Err(UserErrors::UserExists.into()); } let user_role = domain::NewUserRole { user_id: invitee_user_from_db.get_user_id().to_owned(), role_id: request.role_id.clone(), status: { if cfg!(feature = "email") { UserStatus::InvitationSent } else { UserStatus::Active } }, created_by: user_from_token.user_id.clone(), last_modified_by: user_from_token.user_id.clone(), created_at: now, last_modified: now, entity: domain::NoLevel, }; let _user_role = match role_info.get_entity_type() { EntityType::Tenant => { return Err(UserErrors::InvalidRoleOperationWithMessage( "Tenant roles are not allowed for this operation".to_string(), ) .into()); } EntityType::Organization => { user_role .add_entity(domain::OrganizationLevel { tenant_id: user_from_token .tenant_id .clone() .unwrap_or(state.tenant.tenant_id.clone()), org_id: user_from_token.org_id.clone(), }) .insert_in_v2(state) .await? } EntityType::Merchant => { user_role .add_entity(domain::MerchantLevel { tenant_id: user_from_token .tenant_id .clone() .unwrap_or(state.tenant.tenant_id.clone()), org_id: user_from_token.org_id.clone(), merchant_id: user_from_token.merchant_id.clone(), }) .insert_in_v2(state) .await? } EntityType::Profile => { user_role .add_entity(domain::ProfileLevel { tenant_id: user_from_token .tenant_id .clone() .unwrap_or(state.tenant.tenant_id.clone()), org_id: user_from_token.org_id.clone(), merchant_id: user_from_token.merchant_id.clone(), profile_id: user_from_token.profile_id.clone(), }) .insert_in_v2(state) .await? } }; let is_email_sent; #[cfg(feature = "email")] { let invitee_email = domain::UserEmail::from_pii_email(request.email.clone())?; let entity = match role_info.get_entity_type() { EntityType::Tenant => { return Err(UserErrors::InvalidRoleOperationWithMessage( "Tenant roles are not allowed for this operation".to_string(), ) .into()); } EntityType::Organization => email_types::Entity { entity_id: user_from_token.org_id.get_string_repr().to_owned(), entity_type: EntityType::Organization, }, EntityType::Merchant => email_types::Entity { entity_id: user_from_token.merchant_id.get_string_repr().to_owned(), entity_type: EntityType::Merchant, }, EntityType::Profile => email_types::Entity { entity_id: user_from_token.profile_id.get_string_repr().to_owned(), entity_type: EntityType::Profile, }, }; let theme = theme_utils::get_most_specific_theme_using_token_and_min_entity( state, user_from_token, role_info.get_entity_type(), ) .await?; let email_contents = email_types::InviteUser { recipient_email: invitee_email, user_name: domain::UserName::new(invitee_user_from_db.get_name())?, settings: state.conf.clone(), entity, auth_id: auth_id.clone(), theme_id: theme.as_ref().map(|theme| theme.theme_id.clone()), theme_config: theme .map(|theme| theme.email_config()) .unwrap_or(state.conf.theme.email_config.clone()), }; is_email_sent = state .email_client .compose_and_send_email( email_types::get_base_url(state), Box::new(email_contents), state.conf.proxy.https_url.as_ref(), ) .await .map(|email_result| logger::info!(?email_result)) .map_err(|email_result| logger::error!(?email_result)) .is_ok(); } #[cfg(not(feature = "email"))] { is_email_sent = false; } Ok(InviteMultipleUserResponse { email: request.email.clone(), is_email_sent, password: None, error: None, }) } <file_sep path="hyperswitch/crates/router/src/core/user.rs" role="context" start="632" end="662"> pub async fn invite_multiple_user( state: SessionState, user_from_token: auth::UserFromToken, requests: Vec<user_api::InviteUserRequest>, req_state: ReqState, auth_id: Option<String>, ) -> UserResponse<Vec<InviteMultipleUserResponse>> { if requests.len() > 10 { return Err(report!(UserErrors::MaxInvitationsError)) .attach_printable("Number of invite requests must not exceed 10"); } let responses = futures::future::join_all(requests.into_iter().map(|request| async { match handle_invitation(&state, &user_from_token, &request, &req_state, &auth_id).await { Ok(response) => response, Err(error) => { logger::error!(invite_error=?error); InviteMultipleUserResponse { email: request.email, is_email_sent: false, password: None, error: Some(error.current_context().get_error_message().to_string()), } } } })) .await; Ok(ApplicationResponse::Json(responses)) } <file_sep path="hyperswitch/crates/router/src/core/user.rs" role="context" start="574" end="630"> pub async fn reset_password_token_only_flow( state: SessionState, user_token: auth::UserFromSinglePurposeToken, request: user_api::ResetPasswordRequest, ) -> UserResponse<()> { let token = request.token.expose(); let email_token = auth::decode_jwt::<email_types::EmailToken>(&token, &state) .await .change_context(UserErrors::LinkInvalid)?; auth::blacklist::check_email_token_in_blacklist(&state, &token).await?; let user_from_db: domain::UserFromStorage = state .global_store .find_user_by_email(&email_token.get_email()?) .await .change_context(UserErrors::InternalServerError)? .into(); if user_from_db.get_user_id() != user_token.user_id { return Err(UserErrors::LinkInvalid.into()); } let password = domain::UserPassword::new(request.password)?; let hash_password = utils::user::password::generate_password_hash(password.get_secret())?; let user = state .global_store .update_user_by_user_id( user_from_db.get_user_id(), storage_user::UserUpdate::PasswordUpdate { password: hash_password, }, ) .await .change_context(UserErrors::InternalServerError)?; if !user_from_db.is_verified() { let _ = state .global_store .update_user_by_user_id( user_from_db.get_user_id(), storage_user::UserUpdate::VerifyUser, ) .await .map_err(|error| logger::error!(?error)); } let _ = auth::blacklist::insert_email_token_in_blacklist(&state, &token) .await .map_err(|error| logger::error!(?error)); let _ = auth::blacklist::insert_user_in_blacklist(&state, &user.user_id) .await .map_err(|error| logger::error!(?error)); auth::cookies::remove_cookie_response() } <file_sep path="hyperswitch/crates/router/tests/macros.rs" role="context" start="12" end="14"> struct User { address: Address, } <file_sep path="hyperswitch/migrations/2025-02-06-111828_drop_int_id_column_accross_database/up.sql" role="context" start="38" end="47"> ------------------------ BlockList ----------------------- ALTER TABLE blocklist DROP COLUMN IF EXISTS id; ------------------------ Roles ----------------------- ALTER TABLE roles DROP COLUMN IF EXISTS id; ------------------------ Users ----------------------- ALTER TABLE users DROP COLUMN IF EXISTS id; <file_sep path="hyperswitch/crates/api_models/src/user.rs" role="context" start="70" end="74"> pub struct InviteUserRequest { pub email: pii::Email, pub name: Secret<String>, pub role_id: String, }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/payment_methods/cards.rs<|crate|> router anchor=get_payment_method_from_hs_locker kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="2625" end="2680"> pub async fn get_payment_method_from_hs_locker<'a>( state: &'a routes::SessionState, key_store: &domain::MerchantKeyStore, customer_id: &id_type::CustomerId, merchant_id: &id_type::MerchantId, payment_method_reference: &'a str, locker_choice: Option<api_enums::LockerChoice>, ) -> errors::CustomResult<Secret<String>, errors::VaultError> { let locker = &state.conf.locker; let jwekey = state.conf.jwekey.get_inner(); let payment_method_data = if !locker.mock_locker { let request = payment_methods::mk_get_card_request_hs( jwekey, locker, customer_id, merchant_id, payment_method_reference, locker_choice, state.tenant.tenant_id.clone(), state.request_id, ) .await .change_context(errors::VaultError::FetchPaymentMethodFailed) .attach_printable("Making get payment method request failed")?; let get_card_resp = call_locker_api::<payment_methods::RetrieveCardResp>( state, request, "get_pm_from_locker", locker_choice, ) .await .change_context(errors::VaultError::FetchPaymentMethodFailed)?; let retrieve_card_resp = get_card_resp .payload .get_required_value("RetrieveCardRespPayload") .change_context(errors::VaultError::FetchPaymentMethodFailed) .attach_printable("Failed to retrieve field - payload from RetrieveCardResp")?; let enc_card_data = retrieve_card_resp .enc_card_data .get_required_value("enc_card_data") .change_context(errors::VaultError::FetchPaymentMethodFailed) .attach_printable( "Failed to retrieve field - enc_card_data from RetrieveCardRespPayload", )?; decode_and_decrypt_locker_data(state, key_store, enc_card_data.peek().to_string()).await? } else { mock_get_payment_method(state, key_store, payment_method_reference) .await? .payment_method .payment_method_data }; Ok(payment_method_data) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="2624" end="2624"> key, ) .await .and_then(|val| val.try_into_optionaloperation()) .change_context(errors::VaultError::FetchPaymentMethodFailed)? .map_or( Err(report!(errors::VaultError::FetchPaymentMethodFailed)), |d| Ok(d.into_inner()), ) } #[instrument(skip_all)] pub async fn get_payment_method_from_hs_locker<'a>( state: &'a routes::SessionState, key_store: &domain::MerchantKeyStore, customer_id: &id_type::CustomerId, merchant_id: &id_type::MerchantId, payment_method_reference: &'a str, locker_choice: Option<api_enums::LockerChoice>, ) -> errors::CustomResult<Secret<String>, errors::VaultError> { let locker = &state.conf.locker; let jwekey = state.conf.jwekey.get_inner(); let payment_method_data = if !locker.mock_locker { let request = payment_methods::mk_get_card_request_hs( <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="2723" end="2775"> pub async fn call_locker_api<T>( state: &routes::SessionState, request: Request, flow_name: &str, locker_choice: Option<api_enums::LockerChoice>, ) -> errors::CustomResult<T, errors::VaultError> where T: serde::de::DeserializeOwned, { let locker = &state.conf.locker; let jwekey = state.conf.jwekey.get_inner(); let response_type_name = type_name!(T); let response = services::call_connector_api(state, request, flow_name) .await .change_context(errors::VaultError::ApiError)?; let is_locker_call_succeeded = response.is_ok(); let jwe_body = response .unwrap_or_else(|err| err) .response .parse_struct::<services::JweBody>("JweBody") .change_context(errors::VaultError::ResponseDeserializationFailed) .attach_printable("Failed while parsing locker response into JweBody")?; let decrypted_payload = payment_methods::get_decrypted_response_payload( jwekey, jwe_body, locker_choice, locker.decryption_scheme.clone(), ) .await .change_context(errors::VaultError::ResponseDeserializationFailed) .attach_printable("Failed while decrypting locker payload response")?; // Irrespective of locker's response status, payload is JWE + JWS decrypted. But based on locker's status, // if Ok, deserialize the decrypted payload into given type T // if Err, raise an error including locker error message too if is_locker_call_succeeded { let stored_card_resp: Result<T, error_stack::Report<errors::VaultError>> = decrypted_payload .parse_struct(response_type_name) .change_context(errors::VaultError::ResponseDeserializationFailed) .attach_printable_lazy(|| { format!("Failed while parsing locker response into {response_type_name}") }); stored_card_resp } else { Err::<T, error_stack::Report<errors::VaultError>>((errors::VaultError::ApiError).into()) .attach_printable_lazy(|| format!("Locker error response: {decrypted_payload:?}")) } } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="2683" end="2720"> pub async fn add_card_to_hs_locker( state: &routes::SessionState, payload: &payment_methods::StoreLockerReq, customer_id: &id_type::CustomerId, locker_choice: api_enums::LockerChoice, ) -> errors::CustomResult<payment_methods::StoreCardRespPayload, errors::VaultError> { let locker = &state.conf.locker; let jwekey = state.conf.jwekey.get_inner(); let db = &*state.store; let stored_card_response = if !locker.mock_locker { let request = payment_methods::mk_add_locker_request_hs( jwekey, locker, payload, locker_choice, state.tenant.tenant_id.clone(), state.request_id, ) .await?; call_locker_api::<payment_methods::StoreCardResp>( state, request, "add_card_to_hs_locker", Some(locker_choice), ) .await .change_context(errors::VaultError::SaveCardFailed)? } else { let card_id = generate_id(consts::ID_LENGTH, "card"); mock_call_to_locker_hs(db, &card_id, payload, None, None, Some(customer_id)).await? }; let stored_card = stored_card_response .payload .get_required_value("StoreCardRespPayload") .change_context(errors::VaultError::SaveCardFailed)?; Ok(stored_card) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="2594" end="2622"> pub async fn decode_and_decrypt_locker_data( state: &routes::SessionState, key_store: &domain::MerchantKeyStore, enc_card_data: String, ) -> errors::CustomResult<Secret<String>, errors::VaultError> { // Fetch key let key = key_store.key.get_inner().peek(); // Decode let decoded_bytes = hex::decode(&enc_card_data) .change_context(errors::VaultError::ResponseDeserializationFailed) .attach_printable("Failed to decode hex string into bytes")?; // Decrypt domain::types::crypto_operation( &state.into(), type_name!(payment_method::PaymentMethod), domain::types::CryptoOperation::DecryptOptional(Some(Encryption::new( decoded_bytes.into(), ))), Identifier::Merchant(key_store.merchant_id.clone()), key, ) .await .and_then(|val| val.try_into_optionaloperation()) .change_context(errors::VaultError::FetchPaymentMethodFailed)? .map_or( Err(report!(errors::VaultError::FetchPaymentMethodFailed)), |d| Ok(d.into_inner()), ) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="2550" end="2591"> pub async fn add_card_hs( state: &routes::SessionState, req: api::PaymentMethodCreate, card: &api::CardDetail, customer_id: &id_type::CustomerId, merchant_account: &domain::MerchantAccount, locker_choice: api_enums::LockerChoice, card_reference: Option<&str>, ) -> errors::CustomResult< ( api::PaymentMethodResponse, Option<payment_methods::DataDuplicationCheck>, ), errors::VaultError, > { let payload = payment_methods::StoreLockerReq::LockerCard(payment_methods::StoreCardReq { merchant_id: merchant_account.get_id().to_owned(), merchant_customer_id: customer_id.to_owned(), requestor_card_reference: card_reference.map(str::to_string), card: Card { card_number: card.card_number.to_owned(), name_on_card: card.card_holder_name.to_owned(), card_exp_month: card.card_exp_month.to_owned(), card_exp_year: card.card_exp_year.to_owned(), card_brand: card.card_network.as_ref().map(ToString::to_string), card_isin: None, nick_name: card.nick_name.as_ref().map(Secret::peek).cloned(), }, ttl: state.conf.locker.ttl_for_storage_in_secs, }); let store_card_payload = add_card_to_hs_locker(state, &payload, customer_id, locker_choice).await?; let payment_method_resp = payment_methods::mk_add_card_response_hs( card.clone(), store_card_payload.card_reference, req, merchant_account.get_id(), ); Ok((payment_method_resp, store_card_payload.duplication_check)) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="5598" end="5647"> pub async fn get_bank_from_hs_locker( state: &routes::SessionState, key_store: &domain::MerchantKeyStore, temp_token: Option<&String>, customer_id: &id_type::CustomerId, merchant_id: &id_type::MerchantId, token_ref: &str, ) -> errors::RouterResult<api::BankPayout> { let payment_method = get_payment_method_from_hs_locker( state, key_store, customer_id, merchant_id, token_ref, None, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error getting payment method from locker")?; let pm_parsed: api::PayoutMethodData = payment_method .peek() .to_string() .parse_struct("PayoutMethodData") .change_context(errors::ApiErrorResponse::InternalServerError)?; match &pm_parsed { api::PayoutMethodData::Bank(bank) => { if let Some(token) = temp_token { vault::Vault::store_payout_method_data_in_locker( state, Some(token.clone()), &pm_parsed, Some(customer_id.to_owned()), key_store, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error storing payout method data in temporary locker")?; } Ok(bank.to_owned()) } api::PayoutMethodData::Card(_) => Err(errors::ApiErrorResponse::InvalidRequestData { message: "Expected bank details, found card details instead".to_string(), } .into()), api::PayoutMethodData::Wallet(_) => Err(errors::ApiErrorResponse::InvalidRequestData { message: "Expected bank details, found wallet details instead".to_string(), } .into()), } } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="3065" end="3094"> pub async fn mock_get_payment_method<'a>( state: &routes::SessionState, key_store: &domain::MerchantKeyStore, card_id: &'a str, ) -> errors::CustomResult<payment_methods::GetPaymentMethodResponse, errors::VaultError> { let db = &*state.store; let locker_mock_up = db .find_locker_by_card_id(card_id) .await .change_context(errors::VaultError::FetchPaymentMethodFailed)?; let dec_data = if let Some(e) = locker_mock_up.enc_card_data { decode_and_decrypt_locker_data(state, key_store, e).await } else { Err(report!(errors::VaultError::FetchPaymentMethodFailed)) }?; let payment_method_response = payment_methods::AddPaymentMethodResponse { payment_method_id: locker_mock_up .payment_method_id .unwrap_or(locker_mock_up.card_id), external_id: locker_mock_up.external_id, merchant_id: Some(locker_mock_up.merchant_id.to_owned()), nickname: locker_mock_up.nickname, customer_id: locker_mock_up.customer_id, duplicate: locker_mock_up.duplicate, payment_method_data: dec_data, }; Ok(payment_methods::GetPaymentMethodResponse { payment_method: payment_method_response, }) } <file_sep path="hyperswitch/crates/router/tests/utils.rs" role="context" start="389" end="391"> pub struct MerchantId { merchant_id: common_utils::id_type::MerchantId, } <file_sep path="hyperswitch/migrations/2023-04-06-092008_create_merchant_ek/up.sql" role="context" start="1" end="6"> CREATE TABLE merchant_key_store( merchant_id VARCHAR(255) NOT NULL PRIMARY KEY, key bytea NOT NULL, created_at TIMESTAMP NOT NULL ); <file_sep path="hyperswitch/crates/api_models/src/admin.rs" role="context" start="698" end="700"> pub struct MerchantId { pub merchant_id: id_type::MerchantId, }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/payouts.rs<|crate|> router anchor=payouts_confirm_core kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="386" end="455"> pub async fn payouts_confirm_core( state: SessionState, merchant_account: domain::MerchantAccount, key_store: domain::MerchantKeyStore, req: payouts::PayoutCreateRequest, ) -> RouterResponse<payouts::PayoutCreateResponse> { let mut payout_data = make_payout_data( &state, &merchant_account, None, &key_store, &payouts::PayoutRequest::PayoutCreateRequest(Box::new(req.to_owned())), &state.locale, ) .await?; let payout_attempt = payout_data.payout_attempt.to_owned(); let status = payout_attempt.status; helpers::validate_payout_status_against_not_allowed_statuses( status, &[ storage_enums::PayoutStatus::Cancelled, storage_enums::PayoutStatus::Success, storage_enums::PayoutStatus::Failed, storage_enums::PayoutStatus::Pending, storage_enums::PayoutStatus::Ineligible, storage_enums::PayoutStatus::RequiresFulfillment, storage_enums::PayoutStatus::RequiresVendorAccountCreation, ], "confirm", )?; helpers::update_payouts_and_payout_attempt( &mut payout_data, &merchant_account, &req, &state, &key_store, ) .await?; let db = &*state.store; payout_data.payout_link = payout_data .payout_link .clone() .async_map(|pl| async move { let payout_link_update = storage::PayoutLinkUpdate::StatusUpdate { link_status: PayoutLinkStatus::Submitted, }; db.update_payout_link(pl, payout_link_update) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error updating payout links in db") }) .await .transpose()?; payouts_core( &state, &merchant_account, &key_store, &mut payout_data, req.routing.clone(), req.connector.clone(), ) .await?; response_handler(&state, &merchant_account, &payout_data).await } <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="385" end="385"> use api_models::{self, enums as api_enums, payouts::PayoutLinkResponse}; use common_utils::{ consts, ext_traits::{AsyncExt, ValueExt}, id_type::CustomerId, link_utils::{GenericLinkStatus, GenericLinkUiConfig, PayoutLinkData, PayoutLinkStatus}, types::{MinorUnit, UnifiedCode, UnifiedMessage}, }; use diesel_models::{ enums as storage_enums, generic_link::{GenericLinkNew, PayoutLink}, CommonMandateReference, PayoutsMandateReference, PayoutsMandateReferenceRecord, }; use crate::types::domain::behaviour::Conversion; use crate::{ core::{ errors::{ self, ConnectorErrorExt, CustomResult, RouterResponse, RouterResult, StorageErrorExt, }, payments::{self, customers, helpers as payment_helpers}, utils as core_utils, }, db::StorageInterface, routes::SessionState, services, types::{ self, api::{self, payments as payment_api_types, payouts}, domain, storage::{self, PaymentRoutingInfo}, transformers::ForeignFrom, }, utils::{self, OptionExt}, }; <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="540" end="582"> pub async fn payouts_retrieve_core( state: SessionState, merchant_account: domain::MerchantAccount, profile_id: Option<common_utils::id_type::ProfileId>, key_store: domain::MerchantKeyStore, req: payouts::PayoutRetrieveRequest, ) -> RouterResponse<payouts::PayoutCreateResponse> { let mut payout_data = make_payout_data( &state, &merchant_account, profile_id, &key_store, &payouts::PayoutRequest::PayoutRetrieveRequest(req.to_owned()), &state.locale, ) .await?; let payout_attempt = payout_data.payout_attempt.to_owned(); let status = payout_attempt.status; if matches!(req.force_sync, Some(true)) && helpers::should_call_retrieve(status) { // Form connector data let connector_call_type = get_connector_choice( &state, &merchant_account, &key_store, payout_attempt.connector.clone(), None, &mut payout_data, None, ) .await?; complete_payout_retrieve( &state, &merchant_account, connector_call_type, &mut payout_data, ) .await?; } response_handler(&state, &merchant_account, &payout_data).await } <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="457" end="536"> pub async fn payouts_update_core( state: SessionState, merchant_account: domain::MerchantAccount, key_store: domain::MerchantKeyStore, req: payouts::PayoutCreateRequest, ) -> RouterResponse<payouts::PayoutCreateResponse> { let payout_id = req.payout_id.clone().get_required_value("payout_id")?; let mut payout_data = make_payout_data( &state, &merchant_account, None, &key_store, &payouts::PayoutRequest::PayoutCreateRequest(Box::new(req.to_owned())), &state.locale, ) .await?; let payout_attempt = payout_data.payout_attempt.to_owned(); let status = payout_attempt.status; // Verify update feasibility if helpers::is_payout_terminal_state(status) || helpers::is_payout_initiated(status) { return Err(report!(errors::ApiErrorResponse::InvalidRequestData { message: format!( "Payout {} cannot be updated for status {}", payout_id, status ), })); } helpers::update_payouts_and_payout_attempt( &mut payout_data, &merchant_account, &req, &state, &key_store, ) .await?; let payout_attempt = payout_data.payout_attempt.to_owned(); if (req.connector.is_none(), payout_attempt.connector.is_some()) != (true, true) { // if the connector is not updated but was provided during payout create payout_data.payout_attempt.connector = None; payout_data.payout_attempt.routing_info = None; }; // Update payout method data in temp locker if req.payout_method_data.is_some() { let customer_id = payout_data .payouts .customer_id .clone() .get_required_value("customer_id when payout_method_data is provided")?; payout_data.payout_method_data = helpers::make_payout_method_data( &state, req.payout_method_data.as_ref(), payout_attempt.payout_token.as_deref(), &customer_id, &payout_attempt.merchant_id, payout_data.payouts.payout_type, &key_store, Some(&mut payout_data), merchant_account.storage_scheme, ) .await?; } if let Some(true) = payout_data.payouts.confirm { payouts_core( &state, &merchant_account, &key_store, &mut payout_data, req.routing.clone(), req.connector.clone(), ) .await?; } response_handler(&state, &merchant_account, &payout_data).await } <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="321" end="383"> pub async fn payouts_create_core( state: SessionState, merchant_account: domain::MerchantAccount, key_store: domain::MerchantKeyStore, req: payouts::PayoutCreateRequest, ) -> RouterResponse<payouts::PayoutCreateResponse> { // Validate create request let (payout_id, payout_method_data, profile_id, customer, payment_method) = validator::validate_create_request(&state, &merchant_account, &req, &key_store).await?; // Create DB entries let mut payout_data = payout_create_db_entries( &state, &merchant_account, &key_store, &req, &payout_id, &profile_id, payout_method_data.as_ref(), &state.locale, customer.as_ref(), payment_method.clone(), ) .await?; let payout_attempt = payout_data.payout_attempt.to_owned(); let payout_type = payout_data.payouts.payout_type.to_owned(); // Persist payout method data in temp locker if req.payout_method_data.is_some() { let customer_id = payout_data .payouts .customer_id .clone() .get_required_value("customer_id when payout_method_data is provided")?; payout_data.payout_method_data = helpers::make_payout_method_data( &state, req.payout_method_data.as_ref(), payout_attempt.payout_token.as_deref(), &customer_id, &payout_attempt.merchant_id, payout_type, &key_store, Some(&mut payout_data), merchant_account.storage_scheme, ) .await?; } if let Some(true) = payout_data.payouts.confirm { payouts_core( &state, &merchant_account, &key_store, &mut payout_data, req.routing.clone(), req.connector.clone(), ) .await? }; response_handler(&state, &merchant_account, &payout_data).await } <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="309" end="318"> pub async fn payouts_core( state: &SessionState, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, payout_data: &mut PayoutData, routing_algorithm: Option<serde_json::Value>, eligible_connectors: Option<Vec<api_enums::PayoutConnectors>>, ) -> RouterResult<()> { todo!() } <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="2864" end="3068"> pub async fn make_payout_data( state: &SessionState, merchant_account: &domain::MerchantAccount, auth_profile_id: Option<common_utils::id_type::ProfileId>, key_store: &domain::MerchantKeyStore, req: &payouts::PayoutRequest, locale: &str, ) -> RouterResult<PayoutData> { let db = &*state.store; let merchant_id = merchant_account.get_id(); let payout_id = match req { payouts::PayoutRequest::PayoutActionRequest(r) => r.payout_id.clone(), payouts::PayoutRequest::PayoutCreateRequest(r) => r.payout_id.clone().unwrap_or_default(), payouts::PayoutRequest::PayoutRetrieveRequest(r) => r.payout_id.clone(), }; let payouts = db .find_payout_by_merchant_id_payout_id( merchant_id, &payout_id, merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::PayoutNotFound)?; core_utils::validate_profile_id_from_auth_layer(auth_profile_id, &payouts)?; let payout_attempt_id = utils::get_payout_attempt_id(payout_id, payouts.attempt_count); let mut payout_attempt = db .find_payout_attempt_by_merchant_id_payout_attempt_id( merchant_id, &payout_attempt_id, merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::PayoutNotFound)?; let customer_id = payouts.customer_id.as_ref(); // We have to do this because the function that is being used to create / get address is from payments // which expects a payment_id let payout_id_as_payment_id_type = common_utils::id_type::PaymentId::try_from( std::borrow::Cow::Owned(payouts.payout_id.clone()), ) .change_context(errors::ApiErrorResponse::InvalidRequestData { message: "payout_id contains invalid data".to_string(), }) .attach_printable("Error converting payout_id to PaymentId type")?; let billing_address = payment_helpers::create_or_find_address_for_payment_by_request( state, None, payouts.address_id.as_deref(), merchant_id, customer_id, key_store, &payout_id_as_payment_id_type, merchant_account.storage_scheme, ) .await?; let payout_id = &payouts.payout_id; let customer_details = customer_id .async_map(|customer_id| async move { db.find_customer_optional_by_customer_id_merchant_id( &state.into(), customer_id, merchant_id, key_store, merchant_account.storage_scheme, ) .await .map_err(|err| err.change_context(errors::ApiErrorResponse::InternalServerError)) .attach_printable_lazy(|| { format!( "Failed while fetching optional customer [id - {:?}] for payout [id - {}]", customer_id, payout_id ) }) }) .await .transpose()? .and_then(|c| c); let profile_id = payout_attempt.profile_id.clone(); // Validate whether profile_id passed in request is valid and is linked to the merchant let business_profile = validate_and_get_business_profile(state, key_store, &profile_id, merchant_id).await?; let payout_method_data_req = match req { payouts::PayoutRequest::PayoutCreateRequest(r) => r.payout_method_data.to_owned(), payouts::PayoutRequest::PayoutActionRequest(_) => { match payout_attempt.payout_token.to_owned() { Some(payout_token) => { let customer_id = customer_details .as_ref() .map(|cd| cd.customer_id.to_owned()) .get_required_value("customer_id when payout_token is sent")?; helpers::make_payout_method_data( state, None, Some(&payout_token), &customer_id, merchant_account.get_id(), payouts.payout_type, key_store, None, merchant_account.storage_scheme, ) .await? } None => None, } } payouts::PayoutRequest::PayoutRetrieveRequest(_) => None, }; if let Some(payout_method_data) = payout_method_data_req.clone() { let additional_payout_method_data = helpers::get_additional_payout_data(&payout_method_data, &*state.store, &profile_id) .await; let update_additional_payout_method_data = storage::PayoutAttemptUpdate::AdditionalPayoutMethodDataUpdate { additional_payout_method_data, }; payout_attempt = db .update_payout_attempt( &payout_attempt, update_additional_payout_method_data, &payouts, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error updating additional payout method data in payout_attempt")?; }; let merchant_connector_account = if payout_attempt.connector.is_some() && payout_attempt.merchant_connector_id.is_some() { let connector_name = payout_attempt .connector .clone() .get_required_value("connector_name")?; Some( payment_helpers::get_merchant_connector_account( state, merchant_account.get_id(), None, key_store, &profile_id, connector_name.as_str(), payout_attempt.merchant_connector_id.as_ref(), ) .await?, ) } else { None }; let payout_link = payouts .payout_link_id .clone() .async_map(|link_id| async move { db.find_payout_link_by_link_id(&link_id) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error fetching payout links from db") }) .await .transpose()?; let payout_method_id = payouts.payout_method_id.clone(); let mut payment_method: Option<PaymentMethod> = None; if let Some(pm_id) = payout_method_id { payment_method = Some( db.find_payment_method( &(state.into()), key_store, &pm_id, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::PaymentMethodNotFound) .attach_printable("Unable to find payment method")?, ); } Ok(PayoutData { billing_address, business_profile, customer_details, payouts, payout_attempt, payout_method_data: payout_method_data_req.to_owned(), merchant_connector_account, should_terminate: false, profile_id, payout_link, current_locale: locale.to_string(), payment_method, }) } <file_sep path="hyperswitch/crates/router/tests/utils.rs" role="context" start="399" end="401"> pub struct Error { pub message: Message, } <file_sep path="hyperswitch/v2_compatible_migrations/2024-08-28-081757_drop_not_null_constraints_on_v1_columns/up.sql" role="context" start="5" end="21"> ALTER COLUMN org_id DROP NOT NULL; -- Create index on org_id in organization table -- This is done to mullify the effects of droping primary key for v1 CREATE INDEX idx_organization_org_id ON organization (org_id); ------------------------ Merchant Account ------------------- -- Drop not null in merchant_account table for v1 columns that are dropped in v2 ALTER TABLE merchant_account DROP CONSTRAINT merchant_account_pkey, ALTER COLUMN merchant_id DROP NOT NULL, ALTER COLUMN primary_business_details DROP NOT NULL, ALTER COLUMN is_recon_enabled DROP NOT NULL; -- This is done to mullify the effects of droping primary key for v1 CREATE INDEX idx_merchant_account_merchant_id ON merchant_account (merchant_id); <file_sep path="hyperswitch/postman/collection-dir/powertranz/Flow Testcases/Happy Cases/Scenario1-Create payment with confirm true/Payments - Create/event.test.js" role="context" start="61" end="78"> "INFO - Unable to assign variable {{client_secret}}, as jsonData.client_secret is undefined.", ); } // Response body should have value "succeeded" for "status" if (jsonData?.status) { pm.test( "[POST]::/payments - Content check if value for 'status' matches 'succeeded'", function () { pm.expect(jsonData.status).to.eql("succeeded"); }, ); }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/routing/helpers.rs<|crate|> router anchor=enable_specific_routing_algorithm kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/routing/helpers.rs" role="context" start="1443" end="1515"> pub async fn enable_specific_routing_algorithm<A>( state: &SessionState, key_store: domain::MerchantKeyStore, business_profile: domain::Profile, feature_to_enable: routing_types::DynamicRoutingFeatures, mut dynamic_routing_algo_ref: routing_types::DynamicRoutingAlgorithmRef, dynamic_routing_type: routing_types::DynamicRoutingType, algo_type: Option<A>, ) -> RouterResult<ApplicationResponse<routing_types::RoutingDictionaryRecord>> where A: routing_types::DynamicRoutingAlgoAccessor + Clone + Debug, { // Algorithm wasn't created yet let Some(mut algo_type) = algo_type else { return default_specific_dynamic_routing_setup( state, key_store, business_profile, feature_to_enable, dynamic_routing_algo_ref, dynamic_routing_type, ) .await; }; // Algorithm was in disabled state let Some(algo_type_algorithm_id) = algo_type .clone() .get_algorithm_id_with_timestamp() .algorithm_id else { return default_specific_dynamic_routing_setup( state, key_store, business_profile, feature_to_enable, dynamic_routing_algo_ref, dynamic_routing_type, ) .await; }; let db = state.store.as_ref(); let profile_id = business_profile.get_id().clone(); let algo_type_enabled_features = algo_type.get_enabled_features(); if *algo_type_enabled_features == feature_to_enable { // algorithm already has the required feature return Err(errors::ApiErrorResponse::PreconditionFailed { message: format!("{} is already enabled", dynamic_routing_type), } .into()); }; *algo_type_enabled_features = feature_to_enable; dynamic_routing_algo_ref.update_enabled_features(dynamic_routing_type, feature_to_enable); update_business_profile_active_dynamic_algorithm_ref( db, &state.into(), &key_store, business_profile, dynamic_routing_algo_ref.clone(), ) .await?; let routing_algorithm = db .find_routing_algorithm_by_profile_id_algorithm_id(&profile_id, &algo_type_algorithm_id) .await .to_not_found_response(errors::ApiErrorResponse::ResourceIdNotFound)?; let updated_routing_record = routing_algorithm.foreign_into(); core_metrics::ROUTING_CREATE_SUCCESS_RESPONSE.add( 1, router_env::metric_attributes!(("profile_id", profile_id.clone())), ); Ok(ApplicationResponse::Json(updated_routing_record)) } <file_sep path="hyperswitch/crates/router/src/core/routing/helpers.rs" role="context" start="1442" end="1442"> use std::fmt::Debug; use api_models::routing as routing_types; use diesel_models::routing_algorithm; use hyperswitch_domain_models::api::ApplicationResponse; use router_env::logger; use router_env::{instrument, tracing}; use crate::db::errors::StorageErrorExt; use crate::types::domain::MerchantConnectorAccount; use crate::{ core::errors::{self, RouterResult}, db::StorageInterface, routes::SessionState, types::{domain, storage}, utils::StringExt, }; use crate::{core::metrics as core_metrics, types::transformers::ForeignInto}; <file_sep path="hyperswitch/crates/router/src/core/routing/helpers.rs" role="context" start="1616" end="1634"> pub fn new( payment_method: Option<common_enums::PaymentMethod>, payment_method_type: Option<common_enums::PaymentMethodType>, authentication_type: Option<common_enums::AuthenticationType>, currency: Option<common_enums::Currency>, country: Option<common_enums::CountryAlpha2>, card_network: Option<String>, card_bin: Option<String>, ) -> Self { Self { payment_method, payment_method_type, authentication_type, currency, country, card_network, card_bin, } } <file_sep path="hyperswitch/crates/router/src/core/routing/helpers.rs" role="context" start="1519" end="1602"> pub async fn default_specific_dynamic_routing_setup( state: &SessionState, key_store: domain::MerchantKeyStore, business_profile: domain::Profile, feature_to_enable: routing_types::DynamicRoutingFeatures, mut dynamic_routing_algo_ref: routing_types::DynamicRoutingAlgorithmRef, dynamic_routing_type: routing_types::DynamicRoutingType, ) -> RouterResult<ApplicationResponse<routing_types::RoutingDictionaryRecord>> { let db = state.store.as_ref(); let key_manager_state = &state.into(); let profile_id = business_profile.get_id().clone(); let merchant_id = business_profile.merchant_id.clone(); let algorithm_id = common_utils::generate_routing_id_of_default_length(); let timestamp = common_utils::date_time::now(); let algo = match dynamic_routing_type { routing_types::DynamicRoutingType::SuccessRateBasedRouting => { let default_success_based_routing_config = routing_types::SuccessBasedRoutingConfig::default(); routing_algorithm::RoutingAlgorithm { algorithm_id: algorithm_id.clone(), profile_id: profile_id.clone(), merchant_id, name: SUCCESS_BASED_DYNAMIC_ROUTING_ALGORITHM.to_string(), description: None, kind: diesel_models::enums::RoutingAlgorithmKind::Dynamic, algorithm_data: serde_json::json!(default_success_based_routing_config), created_at: timestamp, modified_at: timestamp, algorithm_for: common_enums::TransactionType::Payment, } } routing_types::DynamicRoutingType::EliminationRouting => { let default_elimination_routing_config = routing_types::EliminationRoutingConfig::default(); routing_algorithm::RoutingAlgorithm { algorithm_id: algorithm_id.clone(), profile_id: profile_id.clone(), merchant_id, name: ELIMINATION_BASED_DYNAMIC_ROUTING_ALGORITHM.to_string(), description: None, kind: diesel_models::enums::RoutingAlgorithmKind::Dynamic, algorithm_data: serde_json::json!(default_elimination_routing_config), created_at: timestamp, modified_at: timestamp, algorithm_for: common_enums::TransactionType::Payment, } } routing_types::DynamicRoutingType::ContractBasedRouting => { return Err((errors::ApiErrorResponse::InvalidRequestData { message: "Contract routing cannot be set as default".to_string(), }) .into()) } }; let record = db .insert_routing_algorithm(algo) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to insert record in routing algorithm table")?; dynamic_routing_algo_ref.update_algorithm_id( algorithm_id, feature_to_enable, dynamic_routing_type, ); update_business_profile_active_dynamic_algorithm_ref( db, key_manager_state, &key_store, business_profile, dynamic_routing_algo_ref, ) .await?; let new_record = record.foreign_into(); core_metrics::ROUTING_CREATE_SUCCESS_RESPONSE.add( 1, router_env::metric_attributes!(("profile_id", profile_id.clone())), ); Ok(ApplicationResponse::Json(new_record)) } <file_sep path="hyperswitch/crates/router/src/core/routing/helpers.rs" role="context" start="1396" end="1440"> pub async fn enable_dynamic_routing_algorithm( state: &SessionState, key_store: domain::MerchantKeyStore, business_profile: domain::Profile, feature_to_enable: routing_types::DynamicRoutingFeatures, dynamic_routing_algo_ref: routing_types::DynamicRoutingAlgorithmRef, dynamic_routing_type: routing_types::DynamicRoutingType, ) -> RouterResult<ApplicationResponse<routing_types::RoutingDictionaryRecord>> { let mut dynamic_routing = dynamic_routing_algo_ref.clone(); match dynamic_routing_type { routing_types::DynamicRoutingType::SuccessRateBasedRouting => { dynamic_routing .disable_algorithm_id(routing_types::DynamicRoutingType::ContractBasedRouting); enable_specific_routing_algorithm( state, key_store, business_profile, feature_to_enable, dynamic_routing.clone(), dynamic_routing_type, dynamic_routing.success_based_algorithm, ) .await } routing_types::DynamicRoutingType::EliminationRouting => { enable_specific_routing_algorithm( state, key_store, business_profile, feature_to_enable, dynamic_routing.clone(), dynamic_routing_type, dynamic_routing.elimination_routing_algorithm, ) .await } routing_types::DynamicRoutingType::ContractBasedRouting => { Err((errors::ApiErrorResponse::InvalidRequestData { message: "Contract routing cannot be set as default".to_string(), }) .into()) } } } <file_sep path="hyperswitch/crates/router/src/core/routing/helpers.rs" role="context" start="1231" end="1393"> pub async fn disable_dynamic_routing_algorithm( state: &SessionState, key_store: domain::MerchantKeyStore, business_profile: domain::Profile, dynamic_routing_algo_ref: routing_types::DynamicRoutingAlgorithmRef, dynamic_routing_type: routing_types::DynamicRoutingType, ) -> RouterResult<ApplicationResponse<routing_types::RoutingDictionaryRecord>> { let db = state.store.as_ref(); let key_manager_state = &state.into(); let profile_id = business_profile.get_id().clone(); let (algorithm_id, dynamic_routing_algorithm, cache_entries_to_redact) = match dynamic_routing_type { routing_types::DynamicRoutingType::SuccessRateBasedRouting => { let Some(algorithm_ref) = dynamic_routing_algo_ref.success_based_algorithm else { Err(errors::ApiErrorResponse::PreconditionFailed { message: "Success rate based routing is already disabled".to_string(), })? }; let Some(algorithm_id) = algorithm_ref.algorithm_id_with_timestamp.algorithm_id else { Err(errors::ApiErrorResponse::PreconditionFailed { message: "Algorithm is already inactive".to_string(), })? }; let cache_key = format!( "{}_{}", business_profile.get_id().get_string_repr(), algorithm_id.get_string_repr() ); let cache_entries_to_redact = vec![cache::CacheKind::SuccessBasedDynamicRoutingCache( cache_key.into(), )]; ( algorithm_id, routing_types::DynamicRoutingAlgorithmRef { success_based_algorithm: Some(routing_types::SuccessBasedAlgorithm { algorithm_id_with_timestamp: routing_types::DynamicAlgorithmWithTimestamp::new(None), enabled_feature: routing_types::DynamicRoutingFeatures::None, }), elimination_routing_algorithm: dynamic_routing_algo_ref .elimination_routing_algorithm, contract_based_routing: dynamic_routing_algo_ref.contract_based_routing, dynamic_routing_volume_split: dynamic_routing_algo_ref .dynamic_routing_volume_split, }, cache_entries_to_redact, ) } routing_types::DynamicRoutingType::EliminationRouting => { let Some(algorithm_ref) = dynamic_routing_algo_ref.elimination_routing_algorithm else { Err(errors::ApiErrorResponse::PreconditionFailed { message: "Elimination routing is already disabled".to_string(), })? }; let Some(algorithm_id) = algorithm_ref.algorithm_id_with_timestamp.algorithm_id else { Err(errors::ApiErrorResponse::PreconditionFailed { message: "Algorithm is already inactive".to_string(), })? }; let cache_key = format!( "{}_{}", business_profile.get_id().get_string_repr(), algorithm_id.get_string_repr() ); let cache_entries_to_redact = vec![cache::CacheKind::EliminationBasedDynamicRoutingCache( cache_key.into(), )]; ( algorithm_id, routing_types::DynamicRoutingAlgorithmRef { success_based_algorithm: dynamic_routing_algo_ref.success_based_algorithm, dynamic_routing_volume_split: dynamic_routing_algo_ref .dynamic_routing_volume_split, elimination_routing_algorithm: Some( routing_types::EliminationRoutingAlgorithm { algorithm_id_with_timestamp: routing_types::DynamicAlgorithmWithTimestamp::new(None), enabled_feature: routing_types::DynamicRoutingFeatures::None, }, ), contract_based_routing: dynamic_routing_algo_ref.contract_based_routing, }, cache_entries_to_redact, ) } routing_types::DynamicRoutingType::ContractBasedRouting => { let Some(algorithm_ref) = dynamic_routing_algo_ref.contract_based_routing else { Err(errors::ApiErrorResponse::PreconditionFailed { message: "Contract routing is already disabled".to_string(), })? }; let Some(algorithm_id) = algorithm_ref.algorithm_id_with_timestamp.algorithm_id else { Err(errors::ApiErrorResponse::PreconditionFailed { message: "Algorithm is already inactive".to_string(), })? }; let cache_key = format!( "{}_{}", business_profile.get_id().get_string_repr(), algorithm_id.get_string_repr() ); let cache_entries_to_redact = vec![cache::CacheKind::ContractBasedDynamicRoutingCache( cache_key.into(), )]; ( algorithm_id, routing_types::DynamicRoutingAlgorithmRef { success_based_algorithm: dynamic_routing_algo_ref.success_based_algorithm, elimination_routing_algorithm: dynamic_routing_algo_ref .elimination_routing_algorithm, dynamic_routing_volume_split: dynamic_routing_algo_ref .dynamic_routing_volume_split, contract_based_routing: Some(routing_types::ContractRoutingAlgorithm { algorithm_id_with_timestamp: routing_types::DynamicAlgorithmWithTimestamp::new(None), enabled_feature: routing_types::DynamicRoutingFeatures::None, }), }, cache_entries_to_redact, ) } }; // redact cache for dynamic routing config let _ = cache::redact_from_redis_and_publish( state.store.get_cache_store().as_ref(), cache_entries_to_redact, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable( "unable to publish into the redact channel for evicting the dynamic routing config cache", )?; let record = db .find_routing_algorithm_by_profile_id_algorithm_id(business_profile.get_id(), &algorithm_id) .await .to_not_found_response(errors::ApiErrorResponse::ResourceIdNotFound)?; let response = record.foreign_into(); update_business_profile_active_dynamic_algorithm_ref( db, key_manager_state, &key_store, business_profile, dynamic_routing_algorithm, ) .await?; core_metrics::ROUTING_UNLINK_CONFIG_SUCCESS_RESPONSE.add( 1, router_env::metric_attributes!(("profile_id", profile_id)), ); Ok(ApplicationResponse::Json(response)) } <file_sep path="hyperswitch/crates/router/src/core/routing/helpers.rs" role="context" start="264" end="288"> pub async fn update_business_profile_active_dynamic_algorithm_ref( db: &dyn StorageInterface, key_manager_state: &KeyManagerState, merchant_key_store: &domain::MerchantKeyStore, current_business_profile: domain::Profile, dynamic_routing_algorithm_ref: routing_types::DynamicRoutingAlgorithmRef, ) -> RouterResult<()> { let ref_val = dynamic_routing_algorithm_ref .encode_to_value() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to convert dynamic routing ref to value")?; let business_profile_update = domain::ProfileUpdate::DynamicRoutingAlgorithmUpdate { dynamic_routing_algorithm: Some(ref_val), }; db.update_profile_by_profile_id( key_manager_state, merchant_key_store, current_business_profile, business_profile_update, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to update dynamic routing algorithm ref in business profile")?; Ok(()) } <file_sep path="hyperswitch/crates/router/src/routes/app.rs" role="context" start="1906" end="1906"> pub struct Profile; <file_sep path="hyperswitch/migrations/2023-04-06-092008_create_merchant_ek/up.sql" role="context" start="1" end="6"> CREATE TABLE merchant_key_store( merchant_id VARCHAR(255) NOT NULL PRIMARY KEY, key bytea NOT NULL, created_at TIMESTAMP NOT NULL );
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/webhooks/incoming.rs<|crate|> router anchor=disputes_incoming_webhook_flow kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/webhooks/incoming.rs" role="context" start="1611" end="1680"> async fn disputes_incoming_webhook_flow( state: SessionState, merchant_account: domain::MerchantAccount, business_profile: domain::Profile, key_store: domain::MerchantKeyStore, webhook_details: api::IncomingWebhookDetails, source_verified: bool, connector: &ConnectorEnum, request_details: &IncomingWebhookRequestDetails<'_>, event_type: webhooks::IncomingWebhookEvent, ) -> CustomResult<WebhookResponseTracker, errors::ApiErrorResponse> { metrics::INCOMING_DISPUTE_WEBHOOK_METRIC.add(1, &[]); if source_verified { let db = &*state.store; let dispute_details = connector.get_dispute_details(request_details).switch()?; let payment_attempt = get_payment_attempt_from_object_reference_id( &state, webhook_details.object_reference_id, &merchant_account, ) .await?; let option_dispute = db .find_by_merchant_id_payment_id_connector_dispute_id( merchant_account.get_id(), &payment_attempt.payment_id, &dispute_details.connector_dispute_id, ) .await .to_not_found_response(errors::ApiErrorResponse::WebhookResourceNotFound)?; let dispute_object = get_or_update_dispute_object( state.clone(), option_dispute, dispute_details, merchant_account.get_id(), &merchant_account.organization_id, &payment_attempt, event_type, &business_profile, connector.id(), ) .await?; let disputes_response = Box::new(dispute_object.clone().foreign_into()); let event_type: enums::EventType = dispute_object.dispute_status.foreign_into(); Box::pin(super::create_event_and_trigger_outgoing_webhook( state, merchant_account, business_profile, &key_store, event_type, enums::EventClass::Disputes, dispute_object.dispute_id.clone(), enums::EventObjectType::DisputeDetails, api::OutgoingWebhookContent::DisputeDetails(disputes_response), Some(dispute_object.created_at), )) .await?; metrics::INCOMING_DISPUTE_WEBHOOK_MERCHANT_NOTIFIED_METRIC.add(1, &[]); Ok(WebhookResponseTracker::Dispute { dispute_id: dispute_object.dispute_id, payment_id: dispute_object.payment_id, status: dispute_object.dispute_status, }) } else { metrics::INCOMING_DISPUTE_WEBHOOK_SIGNATURE_FAILURE_METRIC.add(1, &[]); Err(report!( errors::ApiErrorResponse::WebhookAuthenticationFailed )) } } <file_sep path="hyperswitch/crates/router/src/core/webhooks/incoming.rs" role="context" start="1610" end="1610"> )?, } } else { logger::error!("Webhook source verification failed for frm webhooks flow"); Err(report!( errors::ApiErrorResponse::WebhookAuthenticationFailed )) } } #[allow(clippy::too_many_arguments)] #[instrument(skip_all)] async fn disputes_incoming_webhook_flow( state: SessionState, merchant_account: domain::MerchantAccount, business_profile: domain::Profile, key_store: domain::MerchantKeyStore, webhook_details: api::IncomingWebhookDetails, source_verified: bool, connector: &ConnectorEnum, request_details: &IncomingWebhookRequestDetails<'_>, event_type: webhooks::IncomingWebhookEvent, ) -> CustomResult<WebhookResponseTracker, errors::ApiErrorResponse> { metrics::INCOMING_DISPUTE_WEBHOOK_METRIC.add(1, &[]); if source_verified { <file_sep path="hyperswitch/crates/router/src/core/webhooks/incoming.rs" role="context" start="1768" end="1803"> async fn get_payment_id( db: &dyn StorageInterface, payment_id: &api::PaymentIdType, merchant_id: &common_utils::id_type::MerchantId, storage_scheme: enums::MerchantStorageScheme, ) -> errors::RouterResult<common_utils::id_type::PaymentId> { let pay_id = || async { match payment_id { api_models::payments::PaymentIdType::PaymentIntentId(ref id) => Ok(id.to_owned()), api_models::payments::PaymentIdType::ConnectorTransactionId(ref id) => db .find_payment_attempt_by_merchant_id_connector_txn_id( merchant_id, id, storage_scheme, ) .await .map(|p| p.payment_id), api_models::payments::PaymentIdType::PaymentAttemptId(ref id) => db .find_payment_attempt_by_attempt_id_merchant_id(id, merchant_id, storage_scheme) .await .map(|p| p.payment_id), api_models::payments::PaymentIdType::PreprocessingId(ref id) => db .find_payment_attempt_by_preprocessing_id_merchant_id( id, merchant_id, storage_scheme, ) .await .map(|p| p.payment_id), } }; pay_id() .await .to_not_found_response(errors::ApiErrorResponse::PaymentNotFound) } <file_sep path="hyperswitch/crates/router/src/core/webhooks/incoming.rs" role="context" start="1683" end="1766"> async fn bank_transfer_webhook_flow( state: SessionState, req_state: ReqState, merchant_account: domain::MerchantAccount, business_profile: domain::Profile, key_store: domain::MerchantKeyStore, webhook_details: api::IncomingWebhookDetails, source_verified: bool, ) -> CustomResult<WebhookResponseTracker, errors::ApiErrorResponse> { let response = if source_verified { let payment_attempt = get_payment_attempt_from_object_reference_id( &state, webhook_details.object_reference_id, &merchant_account, ) .await?; let payment_id = payment_attempt.payment_id; let request = api::PaymentsRequest { payment_id: Some(api_models::payments::PaymentIdType::PaymentIntentId( payment_id, )), payment_token: payment_attempt.payment_token, ..Default::default() }; Box::pin(payments::payments_core::< api::Authorize, api::PaymentsResponse, _, _, _, payments::PaymentData<api::Authorize>, >( state.clone(), req_state, merchant_account.to_owned(), None, key_store.clone(), payments::PaymentConfirm, request, services::api::AuthFlow::Merchant, payments::CallConnectorAction::Trigger, None, HeaderPayload::with_source(common_enums::PaymentSource::Webhook), None, //Platform merchant account )) .await } else { Err(report!( errors::ApiErrorResponse::WebhookAuthenticationFailed )) }; match response? { services::ApplicationResponse::JsonWithHeaders((payments_response, _)) => { let payment_id = payments_response.payment_id.clone(); let event_type: Option<enums::EventType> = payments_response.status.foreign_into(); let status = payments_response.status; // If event is NOT an UnsupportedEvent, trigger Outgoing Webhook if let Some(outgoing_event_type) = event_type { let primary_object_created_at = payments_response.created; Box::pin(super::create_event_and_trigger_outgoing_webhook( state, merchant_account, business_profile, &key_store, outgoing_event_type, enums::EventClass::Payments, payment_id.get_string_repr().to_owned(), enums::EventObjectType::PaymentDetails, api::OutgoingWebhookContent::PaymentDetails(Box::new(payments_response)), primary_object_created_at, )) .await?; } Ok(WebhookResponseTracker::Payment { payment_id, status }) } _ => Err(errors::ApiErrorResponse::WebhookProcessingFailure) .attach_printable("received non-json response from payments core")?, } } <file_sep path="hyperswitch/crates/router/src/core/webhooks/incoming.rs" role="context" start="1498" end="1607"> async fn frm_incoming_webhook_flow( state: SessionState, req_state: ReqState, merchant_account: domain::MerchantAccount, key_store: domain::MerchantKeyStore, source_verified: bool, event_type: webhooks::IncomingWebhookEvent, object_ref_id: api::ObjectReferenceId, business_profile: domain::Profile, ) -> CustomResult<WebhookResponseTracker, errors::ApiErrorResponse> { if source_verified { let payment_attempt = get_payment_attempt_from_object_reference_id(&state, object_ref_id, &merchant_account) .await?; let payment_response = match event_type { webhooks::IncomingWebhookEvent::FrmApproved => { Box::pin(payments::payments_core::< api::Capture, api::PaymentsResponse, _, _, _, payments::PaymentData<api::Capture>, >( state.clone(), req_state, merchant_account.clone(), None, key_store.clone(), payments::PaymentApprove, api::PaymentsCaptureRequest { payment_id: payment_attempt.payment_id, amount_to_capture: payment_attempt.amount_to_capture, ..Default::default() }, services::api::AuthFlow::Merchant, payments::CallConnectorAction::Trigger, None, HeaderPayload::default(), None, // Platform merchant account )) .await? } webhooks::IncomingWebhookEvent::FrmRejected => { Box::pin(payments::payments_core::< api::Void, api::PaymentsResponse, _, _, _, payments::PaymentData<api::Void>, >( state.clone(), req_state, merchant_account.clone(), None, key_store.clone(), payments::PaymentReject, api::PaymentsCancelRequest { payment_id: payment_attempt.payment_id.clone(), cancellation_reason: Some( "Rejected by merchant based on FRM decision".to_string(), ), ..Default::default() }, services::api::AuthFlow::Merchant, payments::CallConnectorAction::Trigger, None, HeaderPayload::default(), None, // Platform merchant account )) .await? } _ => Err(errors::ApiErrorResponse::EventNotFound)?, }; match payment_response { services::ApplicationResponse::JsonWithHeaders((payments_response, _)) => { let payment_id = payments_response.payment_id.clone(); let status = payments_response.status; let event_type: Option<enums::EventType> = payments_response.status.foreign_into(); if let Some(outgoing_event_type) = event_type { let primary_object_created_at = payments_response.created; Box::pin(super::create_event_and_trigger_outgoing_webhook( state, merchant_account, business_profile, &key_store, outgoing_event_type, enums::EventClass::Payments, payment_id.get_string_repr().to_owned(), enums::EventObjectType::PaymentDetails, api::OutgoingWebhookContent::PaymentDetails(Box::new(payments_response)), primary_object_created_at, )) .await?; }; let response = WebhookResponseTracker::Payment { payment_id, status }; Ok(response) } _ => Err(errors::ApiErrorResponse::WebhookProcessingFailure).attach_printable( "Did not get payment id as object reference id in webhook payments flow", )?, } } else { logger::error!("Webhook source verification failed for frm webhooks flow"); Err(report!( errors::ApiErrorResponse::WebhookAuthenticationFailed )) } } <file_sep path="hyperswitch/crates/router/src/core/webhooks/incoming.rs" role="context" start="1410" end="1494"> async fn mandates_incoming_webhook_flow( state: SessionState, merchant_account: domain::MerchantAccount, business_profile: domain::Profile, key_store: domain::MerchantKeyStore, webhook_details: api::IncomingWebhookDetails, source_verified: bool, event_type: webhooks::IncomingWebhookEvent, ) -> CustomResult<WebhookResponseTracker, errors::ApiErrorResponse> { if source_verified { let db = &*state.store; let mandate = match webhook_details.object_reference_id { webhooks::ObjectReferenceId::MandateId(webhooks::MandateIdType::MandateId( mandate_id, )) => db .find_mandate_by_merchant_id_mandate_id( merchant_account.get_id(), mandate_id.as_str(), merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::MandateNotFound)?, webhooks::ObjectReferenceId::MandateId( webhooks::MandateIdType::ConnectorMandateId(connector_mandate_id), ) => db .find_mandate_by_merchant_id_connector_mandate_id( merchant_account.get_id(), connector_mandate_id.as_str(), merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::MandateNotFound)?, _ => Err(errors::ApiErrorResponse::WebhookProcessingFailure) .attach_printable("received a non-mandate id for retrieving mandate")?, }; let mandate_status = common_enums::MandateStatus::foreign_try_from(event_type) .change_context(errors::ApiErrorResponse::WebhookProcessingFailure) .attach_printable("event type to mandate status mapping failed")?; let mandate_id = mandate.mandate_id.clone(); let updated_mandate = db .update_mandate_by_merchant_id_mandate_id( merchant_account.get_id(), &mandate_id, storage::MandateUpdate::StatusUpdate { mandate_status }, mandate, merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::MandateNotFound)?; let mandates_response = Box::new( api::mandates::MandateResponse::from_db_mandate( &state, key_store.clone(), updated_mandate.clone(), merchant_account.storage_scheme, ) .await?, ); let event_type: Option<enums::EventType> = updated_mandate.mandate_status.foreign_into(); if let Some(outgoing_event_type) = event_type { Box::pin(super::create_event_and_trigger_outgoing_webhook( state, merchant_account, business_profile, &key_store, outgoing_event_type, enums::EventClass::Mandates, updated_mandate.mandate_id.clone(), enums::EventObjectType::MandateDetails, api::OutgoingWebhookContent::MandateDetails(mandates_response), Some(updated_mandate.created_at), )) .await?; } Ok(WebhookResponseTracker::Mandate { mandate_id: updated_mandate.mandate_id, status: updated_mandate.mandate_status, }) } else { logger::error!("Webhook source verification failed for mandates webhook flow"); Err(report!( errors::ApiErrorResponse::WebhookAuthenticationFailed )) } } <file_sep path="hyperswitch/crates/router/src/core/webhooks/incoming.rs" role="context" start="126" end="556"> async fn incoming_webhooks_core<W: types::OutgoingWebhookType>( state: SessionState, req_state: ReqState, req: &actix_web::HttpRequest, merchant_account: domain::MerchantAccount, key_store: domain::MerchantKeyStore, connector_name_or_mca_id: &str, body: actix_web::web::Bytes, is_relay_webhook: bool, ) -> errors::RouterResult<( services::ApplicationResponse<serde_json::Value>, WebhookResponseTracker, serde_json::Value, )> { let key_manager_state = &(&state).into(); metrics::WEBHOOK_INCOMING_COUNT.add( 1, router_env::metric_attributes!((MERCHANT_ID, merchant_account.get_id().clone())), ); let mut request_details = IncomingWebhookRequestDetails { method: req.method().clone(), uri: req.uri().clone(), headers: req.headers(), query_params: req.query_string().to_string(), body: &body, }; // Fetch the merchant connector account to get the webhooks source secret // `webhooks source secret` is a secret shared between the merchant and connector // This is used for source verification and webhooks integrity let (merchant_connector_account, connector, connector_name) = fetch_optional_mca_and_connector( &state, &merchant_account, connector_name_or_mca_id, &key_store, ) .await?; let decoded_body = connector .decode_webhook_body( &request_details, merchant_account.get_id(), merchant_connector_account .clone() .and_then(|merchant_connector_account| { merchant_connector_account.connector_webhook_details }), connector_name.as_str(), ) .await .switch() .attach_printable("There was an error in incoming webhook body decoding")?; request_details.body = &decoded_body; let event_type = match connector .get_webhook_event_type(&request_details) .allow_webhook_event_type_not_found( state .clone() .conf .webhooks .ignore_error .event_type .unwrap_or(true), ) .switch() .attach_printable("Could not find event type in incoming webhook body")? { Some(event_type) => event_type, // Early return allows us to acknowledge the webhooks that we do not support None => { logger::error!( webhook_payload =? request_details.body, "Failed while identifying the event type", ); metrics::WEBHOOK_EVENT_TYPE_IDENTIFICATION_FAILURE_COUNT.add( 1, router_env::metric_attributes!( (MERCHANT_ID, merchant_account.get_id().clone()), ("connector", connector_name) ), ); let response = connector .get_webhook_api_response(&request_details, None) .switch() .attach_printable("Failed while early return in case of event type parsing")?; return Ok(( response, WebhookResponseTracker::NoEffect, serde_json::Value::Null, )); } }; logger::info!(event_type=?event_type); let is_webhook_event_supported = !matches!( event_type, webhooks::IncomingWebhookEvent::EventNotSupported ); let is_webhook_event_enabled = !utils::is_webhook_event_disabled( &*state.clone().store, connector_name.as_str(), merchant_account.get_id(), &event_type, ) .await; //process webhook further only if webhook event is enabled and is not event_not_supported let process_webhook_further = is_webhook_event_enabled && is_webhook_event_supported; logger::info!(process_webhook=?process_webhook_further); let flow_type: api::WebhookFlow = event_type.into(); let mut event_object: Box<dyn masking::ErasedMaskSerialize> = Box::new(serde_json::Value::Null); let webhook_effect = if process_webhook_further && !matches!(flow_type, api::WebhookFlow::ReturnResponse) { let object_ref_id = connector .get_webhook_object_reference_id(&request_details) .switch() .attach_printable("Could not find object reference id in incoming webhook body")?; let connector_enum = api_models::enums::Connector::from_str(&connector_name) .change_context(errors::ApiErrorResponse::InvalidDataValue { field_name: "connector", }) .attach_printable_lazy(|| { format!("unable to parse connector name {connector_name:?}") })?; let connectors_with_source_verification_call = &state.conf.webhook_source_verification_call; let merchant_connector_account = match merchant_connector_account { Some(merchant_connector_account) => merchant_connector_account, None => { match Box::pin(helper_utils::get_mca_from_object_reference_id( &state, object_ref_id.clone(), &merchant_account, &connector_name, &key_store, )) .await { Ok(mca) => mca, Err(error) => { return handle_incoming_webhook_error( error, &connector, connector_name.as_str(), &request_details, ); } } } }; let source_verified = if connectors_with_source_verification_call .connectors_with_webhook_source_verification_call .contains(&connector_enum) { verify_webhook_source_verification_call( connector.clone(), &state, &merchant_account, merchant_connector_account.clone(), &connector_name, &request_details, ) .await .or_else(|error| match error.current_context() { errors::ConnectorError::WebhookSourceVerificationFailed => { logger::error!(?error, "Source Verification Failed"); Ok(false) } _ => Err(error), }) .switch() .attach_printable("There was an issue in incoming webhook source verification")? } else { connector .clone() .verify_webhook_source( &request_details, merchant_account.get_id(), merchant_connector_account.connector_webhook_details.clone(), merchant_connector_account.connector_account_details.clone(), connector_name.as_str(), ) .await .or_else(|error| match error.current_context() { errors::ConnectorError::WebhookSourceVerificationFailed => { logger::error!(?error, "Source Verification Failed"); Ok(false) } _ => Err(error), }) .switch() .attach_printable("There was an issue in incoming webhook source verification")? }; if source_verified { metrics::WEBHOOK_SOURCE_VERIFIED_COUNT.add( 1, router_env::metric_attributes!((MERCHANT_ID, merchant_account.get_id().clone())), ); } else if connector.is_webhook_source_verification_mandatory() { // if webhook consumption is mandatory for connector, fail webhook // so that merchant can retrigger it after updating merchant_secret return Err(errors::ApiErrorResponse::WebhookAuthenticationFailed.into()); } logger::info!(source_verified=?source_verified); event_object = connector .get_webhook_resource_object(&request_details) .switch() .attach_printable("Could not find resource object in incoming webhook body")?; let webhook_details = api::IncomingWebhookDetails { object_reference_id: object_ref_id.clone(), resource_object: serde_json::to_vec(&event_object) .change_context(errors::ParsingError::EncodeError("byte-vec")) .attach_printable("Unable to convert webhook payload to a value") .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable( "There was an issue when encoding the incoming webhook body to bytes", )?, }; let profile_id = &merchant_connector_account.profile_id; let business_profile = state .store .find_business_profile_by_profile_id(key_manager_state, &key_store, profile_id) .await .to_not_found_response(errors::ApiErrorResponse::ProfileNotFound { id: profile_id.get_string_repr().to_owned(), })?; // If the incoming webhook is a relay webhook, then we need to trigger the relay webhook flow let result_response = if is_relay_webhook { let relay_webhook_response = Box::pin(relay_incoming_webhook_flow( state.clone(), merchant_account, business_profile, key_store, webhook_details, event_type, source_verified, )) .await .attach_printable("Incoming webhook flow for relay failed"); // Using early return ensures unsupported webhooks are acknowledged to the connector if let Some(errors::ApiErrorResponse::NotSupported { .. }) = relay_webhook_response .as_ref() .err() .map(|a| a.current_context()) { logger::error!( webhook_payload =? request_details.body, "Failed while identifying the event type", ); let response = connector .get_webhook_api_response(&request_details, None) .switch() .attach_printable( "Failed while early return in case of not supported event type in relay webhooks", )?; return Ok(( response, WebhookResponseTracker::NoEffect, serde_json::Value::Null, )); }; relay_webhook_response } else { match flow_type { api::WebhookFlow::Payment => Box::pin(payments_incoming_webhook_flow( state.clone(), req_state, merchant_account, business_profile, key_store, webhook_details, source_verified, &connector, &request_details, event_type, )) .await .attach_printable("Incoming webhook flow for payments failed"), api::WebhookFlow::Refund => Box::pin(refunds_incoming_webhook_flow( state.clone(), merchant_account, business_profile, key_store, webhook_details, connector_name.as_str(), source_verified, event_type, )) .await .attach_printable("Incoming webhook flow for refunds failed"), api::WebhookFlow::Dispute => Box::pin(disputes_incoming_webhook_flow( state.clone(), merchant_account, business_profile, key_store, webhook_details, source_verified, &connector, &request_details, event_type, )) .await .attach_printable("Incoming webhook flow for disputes failed"), api::WebhookFlow::BankTransfer => Box::pin(bank_transfer_webhook_flow( state.clone(), req_state, merchant_account, business_profile, key_store, webhook_details, source_verified, )) .await .attach_printable("Incoming bank-transfer webhook flow failed"), api::WebhookFlow::ReturnResponse => Ok(WebhookResponseTracker::NoEffect), api::WebhookFlow::Mandate => Box::pin(mandates_incoming_webhook_flow( state.clone(), merchant_account, business_profile, key_store, webhook_details, source_verified, event_type, )) .await .attach_printable("Incoming webhook flow for mandates failed"), api::WebhookFlow::ExternalAuthentication => { Box::pin(external_authentication_incoming_webhook_flow( state.clone(), req_state, merchant_account, key_store, source_verified, event_type, &request_details, &connector, object_ref_id, business_profile, merchant_connector_account, )) .await .attach_printable("Incoming webhook flow for external authentication failed") } api::WebhookFlow::FraudCheck => Box::pin(frm_incoming_webhook_flow( state.clone(), req_state, merchant_account, key_store, source_verified, event_type, object_ref_id, business_profile, )) .await .attach_printable("Incoming webhook flow for fraud check failed"), #[cfg(feature = "payouts")] api::WebhookFlow::Payout => Box::pin(payouts_incoming_webhook_flow( state.clone(), merchant_account, business_profile, key_store, webhook_details, event_type, source_verified, )) .await .attach_printable("Incoming webhook flow for payouts failed"), _ => Err(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unsupported Flow Type received in incoming webhooks"), } }; match result_response { Ok(response) => response, Err(error) => { return handle_incoming_webhook_error( error, &connector, connector_name.as_str(), &request_details, ); } } } else { metrics::WEBHOOK_INCOMING_FILTERED_COUNT.add( 1, router_env::metric_attributes!((MERCHANT_ID, merchant_account.get_id().clone())), ); WebhookResponseTracker::NoEffect }; let response = connector .get_webhook_api_response(&request_details, None) .switch() .attach_printable("Could not get incoming webhook api response from connector")?; let serialized_request = event_object .masked_serialize() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Could not convert webhook effect to string")?; Ok((response, webhook_effect, serialized_request)) } <file_sep path="hyperswitch/crates/router/src/core/webhooks/incoming.rs" role="context" start="1154" end="1230"> async fn get_or_update_dispute_object( state: SessionState, option_dispute: Option<diesel_models::dispute::Dispute>, dispute_details: api::disputes::DisputePayload, merchant_id: &common_utils::id_type::MerchantId, organization_id: &common_utils::id_type::OrganizationId, payment_attempt: &PaymentAttempt, event_type: webhooks::IncomingWebhookEvent, business_profile: &domain::Profile, connector_name: &str, ) -> CustomResult<diesel_models::dispute::Dispute, errors::ApiErrorResponse> { let db = &*state.store; match option_dispute { None => { metrics::INCOMING_DISPUTE_WEBHOOK_NEW_RECORD_METRIC.add(1, &[]); let dispute_id = generate_id(consts::ID_LENGTH, "dp"); let new_dispute = diesel_models::dispute::DisputeNew { dispute_id, amount: dispute_details.amount.clone(), currency: dispute_details.currency.to_string(), dispute_stage: dispute_details.dispute_stage, dispute_status: common_enums::DisputeStatus::foreign_try_from(event_type) .change_context(errors::ApiErrorResponse::WebhookProcessingFailure) .attach_printable("event type to dispute status mapping failed")?, payment_id: payment_attempt.payment_id.to_owned(), connector: connector_name.to_owned(), attempt_id: payment_attempt.attempt_id.to_owned(), merchant_id: merchant_id.to_owned(), connector_status: dispute_details.connector_status, connector_dispute_id: dispute_details.connector_dispute_id, connector_reason: dispute_details.connector_reason, connector_reason_code: dispute_details.connector_reason_code, challenge_required_by: dispute_details.challenge_required_by, connector_created_at: dispute_details.created_at, connector_updated_at: dispute_details.updated_at, profile_id: Some(business_profile.get_id().to_owned()), evidence: None, merchant_connector_id: payment_attempt.merchant_connector_id.clone(), dispute_amount: dispute_details.amount.parse::<i64>().unwrap_or(0), organization_id: organization_id.clone(), dispute_currency: Some(dispute_details.currency), }; state .store .insert_dispute(new_dispute.clone()) .await .to_not_found_response(errors::ApiErrorResponse::WebhookResourceNotFound) } Some(dispute) => { logger::info!("Dispute Already exists, Updating the dispute details"); metrics::INCOMING_DISPUTE_WEBHOOK_UPDATE_RECORD_METRIC.add(1, &[]); let dispute_status = diesel_models::enums::DisputeStatus::foreign_try_from(event_type) .change_context(errors::ApiErrorResponse::WebhookProcessingFailure) .attach_printable("event type to dispute state conversion failure")?; crate::core::utils::validate_dispute_stage_and_dispute_status( dispute.dispute_stage, dispute.dispute_status, dispute_details.dispute_stage, dispute_status, ) .change_context(errors::ApiErrorResponse::WebhookProcessingFailure) .attach_printable("dispute stage and status validation failed")?; let update_dispute = diesel_models::dispute::DisputeUpdate::Update { dispute_stage: dispute_details.dispute_stage, dispute_status, connector_status: dispute_details.connector_status, connector_reason: dispute_details.connector_reason, connector_reason_code: dispute_details.connector_reason_code, challenge_required_by: dispute_details.challenge_required_by, connector_updated_at: dispute_details.updated_at, }; db.update_dispute(dispute, update_dispute) .await .to_not_found_response(errors::ApiErrorResponse::WebhookResourceNotFound) } } } <file_sep path="hyperswitch/crates/router/src/core/webhooks/incoming.rs" role="context" start="1117" end="1151"> async fn get_payment_attempt_from_object_reference_id( state: &SessionState, object_reference_id: webhooks::ObjectReferenceId, merchant_account: &domain::MerchantAccount, ) -> CustomResult<PaymentAttempt, errors::ApiErrorResponse> { let db = &*state.store; match object_reference_id { api::ObjectReferenceId::PaymentId(api::PaymentIdType::ConnectorTransactionId(ref id)) => db .find_payment_attempt_by_merchant_id_connector_txn_id( merchant_account.get_id(), id, merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::WebhookResourceNotFound), api::ObjectReferenceId::PaymentId(api::PaymentIdType::PaymentAttemptId(ref id)) => db .find_payment_attempt_by_attempt_id_merchant_id( id, merchant_account.get_id(), merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::WebhookResourceNotFound), api::ObjectReferenceId::PaymentId(api::PaymentIdType::PreprocessingId(ref id)) => db .find_payment_attempt_by_preprocessing_id_merchant_id( id, merchant_account.get_id(), merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::WebhookResourceNotFound), _ => Err(errors::ApiErrorResponse::WebhookProcessingFailure) .attach_printable("received a non-payment id for retrieving payment")?, } } <file_sep path="hyperswitch/crates/router/src/routes/app.rs" role="context" start="1906" end="1906"> pub struct Profile; <file_sep path="hyperswitch/migrations/2024-08-20-112035_add-profile-id-to-txn-tables/up.sql" role="context" start="10" end="26"> ALTER TABLE payment_intent ADD COLUMN IF NOT EXISTS organization_id VARCHAR(32) NOT NULL DEFAULT 'default_org'; -- Add organization_id to refund table ALTER TABLE refund ADD COLUMN IF NOT EXISTS organization_id VARCHAR(32) NOT NULL DEFAULT 'default_org'; -- Add organization_id to dispute table ALTER TABLE dispute ADD COLUMN IF NOT EXISTS organization_id VARCHAR(32) NOT NULL DEFAULT 'default_org'; -- This doesn't work on V2 -- The below backfill step has to be run after the code deployment -- UPDATE payment_attempt pa -- SET organization_id = ma.organization_id -- FROM merchant_account ma -- WHERE pa.merchant_id = ma.merchant_id;
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/fraud_check.rs<|crate|> router anchor=call_frm_before_connector_call kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/fraud_check.rs" role="context" start="677" end="755"> pub async fn call_frm_before_connector_call<F, Req, D>( operation: &BoxedOperation<'_, F, Req, D>, merchant_account: &domain::MerchantAccount, payment_data: &mut D, state: &SessionState, frm_info: &mut Option<FrmInfo<F, D>>, customer: &Option<domain::Customer>, should_continue_transaction: &mut bool, should_continue_capture: &mut bool, key_store: domain::MerchantKeyStore, ) -> RouterResult<Option<FrmConfigsObject>> where F: Send + Clone, D: payments::OperationSessionGetters<F> + payments::OperationSessionSetters<F> + Send + Sync + Clone, { let (is_frm_enabled, frm_routing_algorithm, frm_connector_label, frm_configs) = should_call_frm(merchant_account, payment_data, state, key_store.clone()).await?; if let Some((frm_routing_algorithm_val, profile_id)) = frm_routing_algorithm.zip(frm_connector_label) { if let Some(frm_configs) = frm_configs.clone() { let mut updated_frm_info = Box::pin(make_frm_data_and_fraud_check_operation( &*state.store, state, merchant_account, payment_data.to_owned(), frm_routing_algorithm_val, profile_id, frm_configs.clone(), customer, )) .await?; if is_frm_enabled { pre_payment_frm_core( state, merchant_account, payment_data, &mut updated_frm_info, frm_configs, customer, should_continue_transaction, should_continue_capture, key_store, operation, ) .await?; } *frm_info = Some(updated_frm_info); } } let fraud_capture_method = frm_info.as_ref().and_then(|frm_info| { frm_info .frm_data .as_ref() .map(|frm_data| frm_data.fraud_check.payment_capture_method) }); if matches!(fraud_capture_method, Some(Some(CaptureMethod::Manual))) && matches!( payment_data.get_payment_attempt().status, AttemptStatus::Unresolved ) { if let Some(info) = frm_info { info.suggested_action = Some(FrmSuggestion::FrmAuthorizeTransaction) }; *should_continue_transaction = false; logger::debug!( "skipping connector call since payment_capture_method is already {:?}", fraud_capture_method ); }; logger::debug!("frm_configs: {:?} {:?}", frm_configs, is_frm_enabled); Ok(frm_configs) } <file_sep path="hyperswitch/crates/router/src/core/fraud_check.rs" role="context" start="676" end="676"> use common_enums::CaptureMethod; use router_env::{ logger, tracing::{self, instrument}, }; use self::{ flows::{self as frm_flows, FeatureFrm}, types::{ self as frm_core_types, ConnectorDetailsCore, FrmConfigsObject, FrmData, FrmInfo, PaymentDetails, PaymentToFrmData, }, }; use crate::{ core::{ errors::{self, RouterResult}, payments::{self, flows::ConstructFlowSpecificData, operations::BoxedOperation}, }, db::StorageInterface, routes::{app::ReqState, SessionState}, services, types::{ self as oss_types, api::{ fraud_check as frm_api, routing::FrmRoutingAlgorithm, Connector, FraudCheckConnectorData, Fulfillment, }, domain, fraud_check as frm_types, storage::{ enums::{ AttemptStatus, FraudCheckLastStep, FraudCheckStatus, FraudCheckType, FrmSuggestion, IntentStatus, }, fraud_check::{FraudCheck, FraudCheckUpdate}, PaymentIntent, }, }, utils::ValueExt, }; <file_sep path="hyperswitch/crates/router/src/core/fraud_check.rs" role="context" start="770" end="778"> fn from(payment_data: PaymentToFrmData) -> Self { Self { amount: common_utils::types::MinorUnit::from(payment_data.amount).get_amount_as_i64(), currency: payment_data.payment_attempt.currency, payment_method: payment_data.payment_attempt.payment_method, payment_method_type: payment_data.payment_attempt.payment_method_type, refund_transaction_id: None, } } <file_sep path="hyperswitch/crates/router/src/core/fraud_check.rs" role="context" start="757" end="766"> pub fn is_operation_allowed<Op: Debug>(operation: &Op) -> bool { ![ "PaymentSession", "PaymentApprove", "PaymentReject", "PaymentCapture", "PaymentsCancel", ] .contains(&format!("{operation:?}").as_str()) } <file_sep path="hyperswitch/crates/router/src/core/fraud_check.rs" role="context" start="581" end="674"> pub async fn post_payment_frm_core<F, D>( state: &SessionState, req_state: ReqState, merchant_account: &domain::MerchantAccount, payment_data: &mut D, frm_info: &mut FrmInfo<F, D>, frm_configs: FrmConfigsObject, customer: &Option<domain::Customer>, key_store: domain::MerchantKeyStore, should_continue_capture: &mut bool, platform_merchant_account: Option<&domain::MerchantAccount>, ) -> RouterResult<Option<FrmData>> where F: Send + Clone, D: payments::OperationSessionGetters<F> + payments::OperationSessionSetters<F> + Send + Sync + Clone, { if let Some(frm_data) = &mut frm_info.frm_data { // Allow the Post flow only if the payment is authorized, // this logic has to be removed if we are going to call /sale or /transaction after failed transaction let fraud_check_operation = &mut frm_info.fraud_check_operation; if payment_data.get_payment_attempt().status == AttemptStatus::Authorized { let frm_router_data_opt = fraud_check_operation .to_domain()? .post_payment_frm( state, req_state.clone(), payment_data, frm_data, merchant_account, customer, key_store.clone(), ) .await?; if let Some(frm_router_data) = frm_router_data_opt { let mut frm_data = fraud_check_operation .to_update_tracker()? .update_tracker( state, &key_store, frm_data.to_owned(), payment_data, None, frm_router_data.to_owned(), ) .await?; let frm_fraud_check = frm_data.fraud_check.clone(); let mut frm_suggestion = None; payment_data.set_frm_message(frm_fraud_check.clone()); if matches!(frm_fraud_check.frm_status, FraudCheckStatus::Fraud) { frm_info.suggested_action = Some(FrmSuggestion::FrmCancelTransaction); } else if matches!(frm_fraud_check.frm_status, FraudCheckStatus::ManualReview) { frm_info.suggested_action = Some(FrmSuggestion::FrmManualReview); } fraud_check_operation .to_domain()? .execute_post_tasks( state, req_state, &mut frm_data, merchant_account, frm_configs, &mut frm_suggestion, key_store.clone(), payment_data, customer, should_continue_capture, platform_merchant_account, ) .await?; logger::debug!("frm_post_tasks_data: {:?}", frm_data); let updated_frm_data = fraud_check_operation .to_update_tracker()? .update_tracker( state, &key_store, frm_data.to_owned(), payment_data, frm_suggestion, frm_router_data.to_owned(), ) .await?; return Ok(Some(updated_frm_data)); } } Ok(Some(frm_data.to_owned())) } else { Ok(None) } } <file_sep path="hyperswitch/crates/router/src/core/fraud_check.rs" role="context" start="489" end="578"> pub async fn pre_payment_frm_core<F, Req, D>( state: &SessionState, merchant_account: &domain::MerchantAccount, payment_data: &mut D, frm_info: &mut FrmInfo<F, D>, frm_configs: FrmConfigsObject, customer: &Option<domain::Customer>, should_continue_transaction: &mut bool, should_continue_capture: &mut bool, key_store: domain::MerchantKeyStore, operation: &BoxedOperation<'_, F, Req, D>, ) -> RouterResult<Option<FrmData>> where F: Send + Clone, D: payments::OperationSessionGetters<F> + payments::OperationSessionSetters<F> + Send + Sync + Clone, { let mut frm_data = None; if is_operation_allowed(operation) { frm_data = if let Some(frm_data) = &mut frm_info.frm_data { if matches!( frm_configs.frm_preferred_flow_type, api_enums::FrmPreferredFlowTypes::Pre ) { let fraud_check_operation = &mut frm_info.fraud_check_operation; let frm_router_data = fraud_check_operation .to_domain()? .pre_payment_frm( state, payment_data, frm_data, merchant_account, customer, key_store.clone(), ) .await?; let _router_data = call_frm_service::<F, frm_api::Transaction, _, D>( state, payment_data, frm_data, merchant_account, &key_store, customer, ) .await?; let frm_data_updated = fraud_check_operation .to_update_tracker()? .update_tracker( state, &key_store, frm_data.clone(), payment_data, None, frm_router_data, ) .await?; let frm_fraud_check = frm_data_updated.fraud_check.clone(); payment_data.set_frm_message(frm_fraud_check.clone()); if matches!(frm_fraud_check.frm_status, FraudCheckStatus::Fraud) { *should_continue_transaction = false; frm_info.suggested_action = Some(FrmSuggestion::FrmCancelTransaction); } logger::debug!( "frm_updated_data: {:?} {:?}", frm_info.fraud_check_operation, frm_info.suggested_action ); Some(frm_data_updated) } else if matches!( frm_configs.frm_preferred_flow_type, api_enums::FrmPreferredFlowTypes::Post ) && !matches!( frm_data.fraud_check.frm_status, FraudCheckStatus::TransactionFailure // Incase of TransactionFailure frm status(No frm decision is taken by frm processor), if capture method is automatic we should not change it to manual. ) { *should_continue_capture = false; Some(frm_data.to_owned()) } else { Some(frm_data.to_owned()) } } else { None }; } Ok(frm_data) } <file_sep path="hyperswitch/crates/router/src/core/fraud_check.rs" role="context" start="173" end="378"> pub async fn should_call_frm<F, D>( merchant_account: &domain::MerchantAccount, payment_data: &D, state: &SessionState, key_store: domain::MerchantKeyStore, ) -> RouterResult<( bool, Option<FrmRoutingAlgorithm>, Option<common_utils::id_type::ProfileId>, Option<FrmConfigsObject>, )> where F: Send + Clone, D: payments::OperationSessionGetters<F> + Send + Sync + Clone, { use common_utils::ext_traits::OptionExt; use masking::ExposeInterface; let db = &*state.store; match merchant_account.frm_routing_algorithm.clone() { Some(frm_routing_algorithm_value) => { let frm_routing_algorithm_struct: FrmRoutingAlgorithm = frm_routing_algorithm_value .clone() .parse_value("FrmRoutingAlgorithm") .change_context(errors::ApiErrorResponse::MissingRequiredField { field_name: "frm_routing_algorithm", }) .attach_printable("Data field not found in frm_routing_algorithm")?; let profile_id = payment_data .get_payment_intent() .profile_id .as_ref() .get_required_value("profile_id") .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("profile_id is not set in payment_intent")? .clone(); #[cfg(feature = "v1")] let merchant_connector_account_from_db_option = db .find_merchant_connector_account_by_profile_id_connector_name( &state.into(), &profile_id, &frm_routing_algorithm_struct.data, &key_store, ) .await .map_err(|error| { logger::error!( "{:?}", error.change_context( errors::ApiErrorResponse::MerchantConnectorAccountNotFound { id: merchant_account.get_id().get_string_repr().to_owned(), } ) ) }) .ok(); let enabled_merchant_connector_account_from_db_option = merchant_connector_account_from_db_option.and_then(|mca| { if mca.disabled.unwrap_or(false) { logger::info!("No eligible connector found for FRM"); None } else { Some(mca) } }); #[cfg(feature = "v2")] let merchant_connector_account_from_db_option: Option< domain::MerchantConnectorAccount, > = { let _ = key_store; let _ = frm_routing_algorithm_struct; let _ = profile_id; todo!() }; match enabled_merchant_connector_account_from_db_option { Some(merchant_connector_account_from_db) => { let frm_configs_option = merchant_connector_account_from_db .frm_configs .ok_or(errors::ApiErrorResponse::MissingRequiredField { field_name: "frm_configs", }) .ok(); match frm_configs_option { Some(frm_configs_value) => { let frm_configs_struct: Vec<api_models::admin::FrmConfigs> = frm_configs_value .into_iter() .map(|config| { config .expose() .parse_value("FrmConfigs") .change_context(errors::ApiErrorResponse::InvalidDataFormat { field_name: "frm_configs".to_string(), expected_format: r#"[{ "gateway": "stripe", "payment_methods": [{ "payment_method": "card","flow": "post"}]}]"#.to_string(), }) }) .collect::<Result<Vec<_>, _>>()?; let mut is_frm_connector_enabled = false; let mut is_frm_pm_enabled = false; let connector = payment_data.get_payment_attempt().connector.clone(); let filtered_frm_config = frm_configs_struct .iter() .filter(|frm_config| match (&connector, &frm_config.gateway) { (Some(current_connector), Some(configured_connector)) => { let is_enabled = *current_connector == configured_connector.to_string(); if is_enabled { is_frm_connector_enabled = true; } is_enabled } (None, _) | (_, None) => true, }) .collect::<Vec<_>>(); let filtered_payment_methods = filtered_frm_config .iter() .map(|frm_config| { let filtered_frm_config_by_pm = frm_config .payment_methods .iter() .filter(|frm_config_pm| { match ( payment_data.get_payment_attempt().payment_method, frm_config_pm.payment_method, ) { ( Some(current_pm), Some(configured_connector_pm), ) => { let is_enabled = current_pm.to_string() == configured_connector_pm.to_string(); if is_enabled { is_frm_pm_enabled = true; } is_enabled } (None, _) | (_, None) => true, } }) .collect::<Vec<_>>(); filtered_frm_config_by_pm }) .collect::<Vec<_>>() .concat(); let is_frm_enabled = is_frm_connector_enabled && is_frm_pm_enabled; logger::debug!( "is_frm_connector_enabled {:?}, is_frm_pm_enabled: {:?}, is_frm_enabled :{:?}", is_frm_connector_enabled, is_frm_pm_enabled, is_frm_enabled ); // filtered_frm_config... // Panic Safety: we are first checking if the object is present... only if present, we try to fetch index 0 let frm_configs_object = FrmConfigsObject { frm_enabled_gateway: filtered_frm_config .first() .and_then(|c| c.gateway), frm_enabled_pm: filtered_payment_methods .first() .and_then(|pm| pm.payment_method), // flow type should be consumed from payment_method.flow. To provide backward compatibility, if we don't find it there, we consume it from payment_method.payment_method_types[0].flow_type. frm_preferred_flow_type: filtered_payment_methods .first() .and_then(|pm| pm.flow.clone()) .or(filtered_payment_methods.first().and_then(|pm| { pm.payment_method_types.as_ref().and_then(|pmt| { pmt.first().map(|pmts| pmts.flow.clone()) }) })) .ok_or(errors::ApiErrorResponse::InvalidDataFormat { field_name: "frm_configs".to_string(), expected_format: r#"[{ "gateway": "stripe", "payment_methods": [{ "payment_method": "card","flow": "post"}]}]"#.to_string(), })?, }; logger::debug!( "frm_routing_configs: {:?} {:?} {:?} {:?}", frm_routing_algorithm_struct, profile_id, frm_configs_object, is_frm_enabled ); Ok(( is_frm_enabled, Some(frm_routing_algorithm_struct), Some(profile_id), Some(frm_configs_object), )) } None => { logger::error!("Cannot find frm_configs for FRM provider"); Ok((false, None, None, None)) } } } None => { logger::error!("Cannot find merchant connector account for FRM provider"); Ok((false, None, None, None)) } } } _ => Ok((false, None, None, None)), } } <file_sep path="hyperswitch/crates/router/src/core/fraud_check/types.rs" role="context" start="66" end="70"> pub struct FrmInfo<F, D> { pub fraud_check_operation: BoxedFraudCheckOperation<F, D>, pub frm_data: Option<FrmData>, pub suggested_action: Option<FrmSuggestion>, } <file_sep path="hyperswitch/v2_compatible_migrations/2024-08-28-081721_add_v2_columns/up.sql" role="context" start="1" end="11"> -- This file contains all new columns being added as part of v2 refactoring. -- The new columns added should work with both v1 and v2 applications. ALTER TABLE customers ADD COLUMN IF NOT EXISTS merchant_reference_id VARCHAR(64), ADD COLUMN IF NOT EXISTS default_billing_address BYTEA DEFAULT NULL, ADD COLUMN IF NOT EXISTS default_shipping_address BYTEA DEFAULT NULL, ADD COLUMN IF NOT EXISTS status "DeleteStatus"; CREATE TYPE "OrderFulfillmentTimeOrigin" AS ENUM ('create', 'confirm'); ALTER TABLE business_profile
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/payment_methods.rs<|crate|> router anchor=create_pm_additional_data_update kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/payment_methods.rs" role="context" start="1614" end="1677"> pub async fn create_pm_additional_data_update( pmd: Option<&domain::PaymentMethodVaultingData>, state: &SessionState, key_store: &domain::MerchantKeyStore, vault_id: Option<String>, vault_fingerprint_id: Option<String>, payment_method: &domain::PaymentMethod, connector_token_details: Option<payment_methods::ConnectorTokenDetails>, nt_data: Option<NetworkTokenPaymentMethodDetails>, payment_method_type: Option<common_enums::PaymentMethod>, payment_method_subtype: Option<common_enums::PaymentMethodType>, ) -> RouterResult<storage::PaymentMethodUpdate> { let encrypted_payment_method_data = pmd .map( |payment_method_vaulting_data| match payment_method_vaulting_data { domain::PaymentMethodVaultingData::Card(card) => { payment_method_data::PaymentMethodsData::Card( payment_method_data::CardDetailsPaymentMethod::from(card.clone()), ) } domain::PaymentMethodVaultingData::NetworkToken(network_token) => { payment_method_data::PaymentMethodsData::NetworkToken( payment_method_data::NetworkTokenDetailsPaymentMethod::from( network_token.clone(), ), ) } }, ) .async_map(|payment_method_details| async { let key_manager_state = &(state).into(); cards::create_encrypted_data(key_manager_state, key_store, payment_method_details) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to encrypt Payment method data") }) .await .transpose()? .map(From::from); let connector_mandate_details_update = connector_token_details .map(|connector_token| { create_connector_token_details_update(connector_token, payment_method) }) .map(From::from); let pm_update = storage::PaymentMethodUpdate::GenericUpdate { status: Some(enums::PaymentMethodStatus::Active), locker_id: vault_id, payment_method_type_v2: payment_method_type, payment_method_subtype, payment_method_data: encrypted_payment_method_data, network_token_requestor_reference_id: nt_data .clone() .map(|data| data.network_token_requestor_reference_id), network_token_locker_id: nt_data.clone().map(|data| data.network_token_locker_id), network_token_payment_method_data: nt_data.map(|data| data.network_token_pmd.into()), connector_mandate_details: connector_mandate_details_update, locker_fingerprint_id: vault_fingerprint_id, }; Ok(pm_update) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods.rs" role="context" start="1613" end="1613"> reference_record_hash_map, ); hyperswitch_domain_models::mandates::CommonMandateReference { payments: Some(payments_mandate_reference), payouts: None, } } } } #[cfg(all(feature = "v2", feature = "payment_methods_v2"))] #[allow(clippy::too_many_arguments)] pub async fn create_pm_additional_data_update( pmd: Option<&domain::PaymentMethodVaultingData>, state: &SessionState, key_store: &domain::MerchantKeyStore, vault_id: Option<String>, vault_fingerprint_id: Option<String>, payment_method: &domain::PaymentMethod, connector_token_details: Option<payment_methods::ConnectorTokenDetails>, nt_data: Option<NetworkTokenPaymentMethodDetails>, payment_method_type: Option<common_enums::PaymentMethod>, payment_method_subtype: Option<common_enums::PaymentMethodType>, ) -> RouterResult<storage::PaymentMethodUpdate> { let encrypted_payment_method_data = pmd <file_sep path="hyperswitch/crates/router/src/core/payment_methods.rs" role="context" start="1732" end="1812"> fn get_pm_list_context( payment_method_type: enums::PaymentMethod, payment_method: &domain::PaymentMethod, is_payment_associated: bool, ) -> Result<Option<PaymentMethodListContext>, error_stack::Report<errors::ApiErrorResponse>> { let payment_method_data = payment_method .payment_method_data .clone() .map(|payment_method_data| payment_method_data.into_inner()); let payment_method_retrieval_context = match payment_method_data { Some(payment_methods::PaymentMethodsData::Card(card)) => { Some(PaymentMethodListContext::Card { card_details: api::CardDetailFromLocker::from(card), token_data: is_payment_associated.then_some( storage::PaymentTokenData::permanent_card( Some(payment_method.get_id().clone()), payment_method .locker_id .as_ref() .map(|id| id.get_string_repr().to_owned()) .or_else(|| Some(payment_method.get_id().get_string_repr().to_owned())), payment_method .locker_id .as_ref() .map(|id| id.get_string_repr().to_owned()) .unwrap_or_else(|| { payment_method.get_id().get_string_repr().to_owned() }), ), ), }) } Some(payment_methods::PaymentMethodsData::BankDetails(bank_details)) => { let get_bank_account_token_data = || -> CustomResult<payment_methods::BankAccountTokenData,errors::ApiErrorResponse> { let connector_details = bank_details .connector_details .first() .cloned() .ok_or(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to obtain bank account connector details")?; let payment_method_subtype = payment_method .get_payment_method_subtype() .get_required_value("payment_method_subtype") .attach_printable("PaymentMethodType not found")?; Ok(payment_methods::BankAccountTokenData { payment_method_type: payment_method_subtype, payment_method: payment_method_type, connector_details, }) }; // Retrieve the pm_auth connector details so that it can be tokenized let bank_account_token_data = get_bank_account_token_data() .inspect_err(|error| logger::error!(?error)) .ok(); bank_account_token_data.map(|data| { let token_data = storage::PaymentTokenData::AuthBankDebit(data); PaymentMethodListContext::Bank { token_data: is_payment_associated.then_some(token_data), } }) } Some(payment_methods::PaymentMethodsData::WalletDetails(_)) | None => { Some(PaymentMethodListContext::TemporaryToken { token_data: is_payment_associated.then_some( storage::PaymentTokenData::temporary_generic(generate_id( consts::ID_LENGTH, "token", )), ), }) } }; Ok(payment_method_retrieval_context) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods.rs" role="context" start="1681" end="1723"> pub async fn vault_payment_method( state: &SessionState, pmd: &domain::PaymentMethodVaultingData, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, existing_vault_id: Option<domain::VaultId>, customer_id: &id_type::GlobalCustomerId, ) -> RouterResult<(pm_types::AddVaultResponse, String)> { let db = &*state.store; // get fingerprint_id from vault let fingerprint_id_from_vault = vault::get_fingerprint_id_from_vault(state, pmd, customer_id.get_string_repr().to_owned()) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to get fingerprint_id from vault")?; // throw back error if payment method is duplicated when( db.find_payment_method_by_fingerprint_id( &(state.into()), key_store, &fingerprint_id_from_vault, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to find payment method by fingerprint_id") .inspect_err(|e| logger::error!("Vault Fingerprint_id error: {:?}", e)) .is_ok(), || { Err(report!(errors::ApiErrorResponse::DuplicatePaymentMethod) .attach_printable("Cannot vault duplicate payment method")) }, )?; let resp_from_vault = vault::add_payment_method_to_vault(state, merchant_account, pmd, existing_vault_id) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to add payment method in vault")?; Ok((resp_from_vault, fingerprint_id_from_vault)) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods.rs" role="context" start="1577" end="1610"> fn create_connector_token_details_update( token_details: payment_methods::ConnectorTokenDetails, payment_method: &domain::PaymentMethod, ) -> hyperswitch_domain_models::mandates::CommonMandateReference { let connector_id = token_details.connector_id.clone(); let reference_record = hyperswitch_domain_models::mandates::ConnectorTokenReferenceRecord::foreign_from( token_details, ); let connector_token_details = payment_method.connector_mandate_details.clone(); match connector_token_details { Some(mut connector_mandate_reference) => { connector_mandate_reference .insert_payment_token_reference_record(&connector_id, reference_record); connector_mandate_reference } None => { let reference_record_hash_map = std::collections::HashMap::from([(connector_id, reference_record)]); let payments_mandate_reference = hyperswitch_domain_models::mandates::PaymentsTokenReference( reference_record_hash_map, ); hyperswitch_domain_models::mandates::CommonMandateReference { payments: Some(payments_mandate_reference), payouts: None, } } } } <file_sep path="hyperswitch/crates/router/src/core/payment_methods.rs" role="context" start="1521" end="1572"> pub async fn create_payment_method_for_intent( state: &SessionState, metadata: Option<common_utils::pii::SecretSerdeValue>, customer_id: &id_type::GlobalCustomerId, payment_method_id: id_type::GlobalPaymentMethodId, merchant_id: &id_type::MerchantId, key_store: &domain::MerchantKeyStore, storage_scheme: enums::MerchantStorageScheme, payment_method_billing_address: Option< Encryptable<hyperswitch_domain_models::address::Address>, >, ) -> CustomResult<domain::PaymentMethod, errors::ApiErrorResponse> { let db = &*state.store; let current_time = common_utils::date_time::now(); let response = db .insert_payment_method( &state.into(), key_store, domain::PaymentMethod { customer_id: customer_id.to_owned(), merchant_id: merchant_id.to_owned(), id: payment_method_id, locker_id: None, payment_method_type: None, payment_method_subtype: None, payment_method_data: None, connector_mandate_details: None, customer_acceptance: None, client_secret: None, status: enums::PaymentMethodStatus::AwaitingData, network_transaction_id: None, created_at: current_time, last_modified: current_time, last_used_at: current_time, payment_method_billing_address, updated_by: None, version: common_types::consts::API_VERSION, locker_fingerprint_id: None, network_token_locker_id: None, network_token_payment_method_data: None, network_token_requestor_reference_id: None, }, storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to add payment method in db")?; Ok(response) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods.rs" role="context" start="882" end="1022"> pub async fn create_payment_method_core( state: &SessionState, _request_state: &routes::app::ReqState, req: api::PaymentMethodCreate, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, profile: &domain::Profile, ) -> RouterResult<api::PaymentMethodResponse> { use common_utils::ext_traits::ValueExt; req.validate()?; let db = &*state.store; let merchant_id = merchant_account.get_id(); let customer_id = req.customer_id.to_owned(); let key_manager_state = &(state).into(); db.find_customer_by_global_id( key_manager_state, &customer_id, merchant_account.get_id(), key_store, merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::CustomerNotFound) .attach_printable("Customer not found for the payment method")?; let payment_method_billing_address = req .billing .clone() .async_map(|billing| cards::create_encrypted_data(key_manager_state, key_store, billing)) .await .transpose() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to encrypt Payment method billing address")? .map(|encoded_address| { encoded_address.deserialize_inner_value(|value| value.parse_value("Address")) }) .transpose() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to parse Payment method billing address")?; let payment_method_id = id_type::GlobalPaymentMethodId::generate(&state.conf.cell_information.id) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to generate GlobalPaymentMethodId")?; let payment_method = create_payment_method_for_intent( state, req.metadata.clone(), &customer_id, payment_method_id, merchant_id, key_store, merchant_account.storage_scheme, payment_method_billing_address, ) .await .attach_printable("Failed to add Payment method to DB")?; let payment_method_data = domain::PaymentMethodVaultingData::from(req.payment_method_data) .populate_bin_details_for_payment_method(state) .await; let vaulting_result = vault_payment_method( state, &payment_method_data, merchant_account, key_store, None, &customer_id, ) .await; let network_tokenization_resp = network_tokenize_and_vault_the_pmd( state, &payment_method_data, merchant_account, key_store, req.network_tokenization.clone(), profile.is_network_tokenization_enabled, &customer_id, ) .await; let (response, payment_method) = match vaulting_result { Ok((vaulting_resp, fingerprint_id)) => { let pm_update = create_pm_additional_data_update( Some(&payment_method_data), state, key_store, Some(vaulting_resp.vault_id.get_string_repr().clone()), Some(fingerprint_id), &payment_method, None, network_tokenization_resp, Some(req.payment_method_type), Some(req.payment_method_subtype), ) .await .attach_printable("Unable to create Payment method data")?; let payment_method = db .update_payment_method( &(state.into()), key_store, payment_method, pm_update, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to update payment method in db")?; let resp = pm_transforms::generate_payment_method_response(&payment_method, &None)?; Ok((resp, payment_method)) } Err(e) => { let pm_update = storage::PaymentMethodUpdate::StatusUpdate { status: Some(enums::PaymentMethodStatus::Inactive), }; db.update_payment_method( &(state.into()), key_store, payment_method, pm_update, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to update payment method in db")?; Err(e) } }?; Ok(response) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods.rs" role="context" start="1928" end="2027"> pub async fn update_payment_method_core( state: &SessionState, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, request: api::PaymentMethodUpdate, payment_method_id: &id_type::GlobalPaymentMethodId, ) -> RouterResult<api::PaymentMethodResponse> { let db = state.store.as_ref(); let payment_method = db .find_payment_method( &((state).into()), key_store, payment_method_id, merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::PaymentMethodNotFound)?; let current_vault_id = payment_method.locker_id.clone(); when( payment_method.status == enums::PaymentMethodStatus::AwaitingData, || { Err(errors::ApiErrorResponse::InvalidRequestData { message: "This Payment method is awaiting data and hence cannot be updated" .to_string(), }) }, )?; let pmd: domain::PaymentMethodVaultingData = vault::retrieve_payment_method_from_vault(state, merchant_account, &payment_method) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to retrieve payment method from vault")? .data; let vault_request_data = request.payment_method_data.map(|payment_method_data| { pm_transforms::generate_pm_vaulting_req_from_update_request(pmd, payment_method_data) }); let (vaulting_response, fingerprint_id) = match vault_request_data { // cannot use async map because of problems related to lifetimes // to overcome this, we will have to use a move closure and add some clones Some(ref vault_request_data) => { Some( vault_payment_method( state, vault_request_data, merchant_account, key_store, // using current vault_id for now, // will have to refactor this to generate new one on each vaulting later on current_vault_id, &payment_method.customer_id, ) .await .attach_printable("Failed to add payment method in vault")?, ) } None => None, } .unzip(); let vault_id = vaulting_response .map(|vaulting_response| vaulting_response.vault_id.get_string_repr().clone()); let pm_update = create_pm_additional_data_update( vault_request_data.as_ref(), state, key_store, vault_id, fingerprint_id, &payment_method, request.connector_token_details, None, None, None, ) .await .attach_printable("Unable to create Payment method data")?; let payment_method = db .update_payment_method( &((state).into()), key_store, payment_method, pm_update, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to update payment method in db")?; let response = pm_transforms::generate_payment_method_response(&payment_method, &None)?; // Add a PT task to handle payment_method delete from vault Ok(response) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods.rs" role="context" start="1026" end="1030"> pub struct NetworkTokenPaymentMethodDetails { network_token_requestor_reference_id: String, network_token_locker_id: String, network_token_pmd: Encryptable<Secret<serde_json::Value>>, } <file_sep path="hyperswitch/crates/router/src/connector/nmi/transformers.rs" role="context" start="454" end="459"> pub enum PaymentMethod { CardNonThreeDs(Box<CardData>), CardThreeDs(Box<CardThreeDsData>), GPay(Box<GooglePayData>), ApplePay(Box<ApplePayData>), } <file_sep path="hyperswitch/v2_compatible_migrations/2024-08-28-081721_add_v2_columns/up.sql" role="context" start="54" end="70"> ADD COLUMN redirection_data JSONB, ADD COLUMN connector_payment_data TEXT, ADD COLUMN connector_token_details JSONB; -- Change the type of the column from JSON to JSONB ALTER TABLE merchant_connector_account ADD COLUMN IF NOT EXISTS feature_metadata JSONB; ALTER TABLE payment_methods ADD COLUMN IF NOT EXISTS locker_fingerprint_id VARCHAR(64), ADD COLUMN IF NOT EXISTS payment_method_type_v2 VARCHAR(64), ADD COLUMN IF NOT EXISTS payment_method_subtype VARCHAR(64); ALTER TABLE refund ADD COLUMN IF NOT EXISTS id VARCHAR(64), ADD COLUMN IF NOT EXISTS merchant_reference_id VARCHAR(64), ADD COLUMN IF NOT EXISTS connector_id VARCHAR(64);
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/payment_methods/cards.rs<|crate|> router anchor=foreign_try_from kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=1<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="641" end="710"> fn foreign_try_from( (card_details, card_info): ( &api_models::payment_methods::MigrateCardDetail, Option<diesel_models::CardInfo>, ), ) -> Result<Self, Self::Error> { let (card_isin, last4_digits) = get_card_bin_and_last4_digits_for_masked_card(card_details.card_number.peek()) .change_context(errors::ApiErrorResponse::InvalidRequestData { message: "Invalid card number".to_string(), })?; if let Some(card_bin_info) = card_info { Ok(Self { last4_digits: Some(last4_digits.clone()), issuer_country: card_details .card_issuing_country .as_ref() .map(|c| api_enums::CountryAlpha2::from_str(c)) .transpose() .ok() .flatten() .or(card_bin_info .card_issuing_country .as_ref() .map(|c| api_enums::CountryAlpha2::from_str(c)) .transpose() .ok() .flatten()), card_number: None, expiry_month: Some(card_details.card_exp_month.clone()), expiry_year: Some(card_details.card_exp_year.clone()), card_fingerprint: None, card_holder_name: card_details.card_holder_name.clone(), nick_name: card_details.nick_name.clone(), card_isin: Some(card_isin.clone()), card_issuer: card_details .card_issuer .clone() .or(card_bin_info.card_issuer), card_network: card_details .card_network .clone() .or(card_bin_info.card_network), card_type: card_details.card_type.clone().or(card_bin_info.card_type), saved_to_locker: false, }) } else { Ok(Self { last4_digits: Some(last4_digits.clone()), issuer_country: card_details .card_issuing_country .as_ref() .map(|c| api_enums::CountryAlpha2::from_str(c)) .transpose() .ok() .flatten(), card_number: None, expiry_month: Some(card_details.card_exp_month.clone()), expiry_year: Some(card_details.card_exp_year.clone()), card_fingerprint: None, card_holder_name: card_details.card_holder_name.clone(), nick_name: card_details.nick_name.clone(), card_isin: Some(card_isin.clone()), card_issuer: card_details.card_issuer.clone(), card_network: card_details.card_network.clone(), card_type: card_details.card_type.clone(), saved_to_locker: false, }) } } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="640" end="640"> } } } #[cfg(all(feature = "v2", feature = "payment_methods_v2"))] impl ForeignTryFrom<( &api_models::payment_methods::MigrateCardDetail, Option<diesel_models::CardInfo>, )> for api_models::payment_methods::CardDetailFromLocker { type Error = error_stack::Report<errors::ApiErrorResponse>; fn foreign_try_from( (card_details, card_info): ( &api_models::payment_methods::MigrateCardDetail, Option<diesel_models::CardInfo>, ), ) -> Result<Self, Self::Error> { let (card_isin, last4_digits) = get_card_bin_and_last4_digits_for_masked_card(card_details.card_number.peek()) .change_context(errors::ApiErrorResponse::InvalidRequestData { message: "Invalid card number".to_string(), })?; if let Some(card_bin_info) = card_info { Ok(Self { <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="883" end="986"> pub async fn save_network_token_and_update_payment_method( state: &routes::SessionState, req: &api::PaymentMethodMigrate, key_store: &domain::MerchantKeyStore, merchant_account: &domain::MerchantAccount, network_token_data: &api_models::payment_methods::MigrateNetworkTokenData, network_token_requestor_ref_id: String, pm_id: String, ) -> errors::RouterResult<bool> { let payment_method_create_request = api::PaymentMethodCreate::get_payment_method_create_from_payment_method_migrate( network_token_data.network_token_number.clone(), req, ); let customer_id = req.customer_id.clone().get_required_value("customer_id")?; let network_token_details = api::CardDetail { card_number: network_token_data.network_token_number.clone(), card_exp_month: network_token_data.network_token_exp_month.clone(), card_exp_year: network_token_data.network_token_exp_year.clone(), card_holder_name: network_token_data.card_holder_name.clone(), nick_name: network_token_data.nick_name.clone(), card_issuing_country: network_token_data.card_issuing_country.clone(), card_network: network_token_data.card_network.clone(), card_issuer: network_token_data.card_issuer.clone(), card_type: network_token_data.card_type.clone(), }; logger::debug!( "Adding network token to locker for customer_id: {:?}", customer_id ); let token_resp = Box::pin(add_card_to_locker( state, payment_method_create_request.clone(), &network_token_details, &customer_id, merchant_account, None, )) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Add Network Token failed"); let key_manager_state = &state.into(); match token_resp { Ok(resp) => { logger::debug!("Network token added to locker"); let (token_pm_resp, _duplication_check) = resp; let pm_token_details = token_pm_resp .card .as_ref() .map(|card| PaymentMethodsData::Card(CardDetailsPaymentMethod::from(card.clone()))); let pm_network_token_data_encrypted = pm_token_details .async_map(|pm_card| create_encrypted_data(key_manager_state, key_store, pm_card)) .await .transpose() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to encrypt payment method data")?; let pm_update = storage::PaymentMethodUpdate::NetworkTokenDataUpdate { network_token_requestor_reference_id: Some(network_token_requestor_ref_id), network_token_locker_id: Some(token_pm_resp.payment_method_id), network_token_payment_method_data: pm_network_token_data_encrypted.map(Into::into), }; let db = &*state.store; let existing_pm = db .find_payment_method( &state.into(), key_store, &pm_id, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable(format!( "Failed to fetch payment method for existing pm_id: {:?} in db", pm_id ))?; db.update_payment_method( &state.into(), key_store, existing_pm, pm_update, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable(format!( "Failed to update payment method for existing pm_id: {:?} in db", pm_id ))?; logger::debug!("Network token added to locker and payment method updated"); Ok(true) } Err(err) => { logger::debug!("Network token added to locker failed {:?}", err); Ok(false) } } } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="719" end="875"> pub async fn skip_locker_call_and_migrate_payment_method( state: &routes::SessionState, req: &api::PaymentMethodMigrate, merchant_id: id_type::MerchantId, key_store: &domain::MerchantKeyStore, merchant_account: &domain::MerchantAccount, card: api_models::payment_methods::CardDetailFromLocker, should_require_connector_mandate_details: bool, migration_status: &mut migration::RecordMigrationStatusBuilder, ) -> errors::RouterResponse<api::PaymentMethodResponse> { let db = &*state.store; let customer_id = req.customer_id.clone().get_required_value("customer_id")?; // In this case, since we do not have valid card details, recurring payments can only be done through connector mandate details. //if network token data is present, then connector mandate details are not mandatory let connector_mandate_details = if should_require_connector_mandate_details { let connector_mandate_details_req = req .connector_mandate_details .clone() .get_required_value("connector mandate details")?; Some( serde_json::to_value(&connector_mandate_details_req) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to parse connector mandate details")?, ) } else { req.connector_mandate_details .clone() .map(|connector_mandate_details_req| { serde_json::to_value(&connector_mandate_details_req) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to parse connector mandate details") }) .transpose()? }; let key_manager_state = &state.into(); let payment_method_billing_address: Option<Encryptable<Secret<serde_json::Value>>> = req .billing .clone() .async_map(|billing| create_encrypted_data(key_manager_state, key_store, billing)) .await .transpose() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to encrypt Payment method billing address")?; let customer = db .find_customer_by_customer_id_merchant_id( &state.into(), &customer_id, &merchant_id, key_store, merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::CustomerNotFound)?; let payment_method_card_details = PaymentMethodsData::Card(CardDetailsPaymentMethod::from(card.clone())); let payment_method_data_encrypted: Option<Encryptable<Secret<serde_json::Value>>> = Some( create_encrypted_data(key_manager_state, key_store, payment_method_card_details) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to encrypt Payment method card details")?, ); let payment_method_metadata: Option<serde_json::Value> = req.metadata.as_ref().map(|data| data.peek()).cloned(); let network_transaction_id = req.network_transaction_id.clone(); let payment_method_id = generate_id(consts::ID_LENGTH, "pm"); let current_time = common_utils::date_time::now(); let response = db .insert_payment_method( &state.into(), key_store, domain::PaymentMethod { customer_id: customer_id.to_owned(), merchant_id: merchant_id.to_owned(), payment_method_id: payment_method_id.to_string(), locker_id: None, payment_method: req.payment_method, payment_method_type: req.payment_method_type, payment_method_issuer: req.payment_method_issuer.clone(), scheme: req.card_network.clone().or(card.scheme.clone()), metadata: payment_method_metadata.map(Secret::new), payment_method_data: payment_method_data_encrypted, connector_mandate_details: connector_mandate_details.clone(), customer_acceptance: None, client_secret: None, status: enums::PaymentMethodStatus::Active, network_transaction_id: network_transaction_id.clone(), payment_method_issuer_code: None, accepted_currency: None, token: None, cardholder_name: None, issuer_name: None, issuer_country: None, payer_country: None, is_stored: None, swift_code: None, direct_debit_token: None, created_at: current_time, last_modified: current_time, last_used_at: current_time, payment_method_billing_address, updated_by: None, version: common_types::consts::API_VERSION, network_token_requestor_reference_id: None, network_token_locker_id: None, network_token_payment_method_data: None, }, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to add payment method in db")?; logger::debug!("Payment method inserted in db"); migration_status.network_transaction_id_migrated( network_transaction_id.and_then(|val| (!val.is_empty_after_trim()).then_some(true)), ); migration_status.connector_mandate_details_migrated( connector_mandate_details .clone() .and_then(|val| if val == json!({}) { None } else { Some(true) }) .or_else(|| { req.connector_mandate_details.clone().and_then(|val| { val.payments .and_then(|payin_val| (!payin_val.0.is_empty()).then_some(false)) }) }), ); if customer.default_payment_method_id.is_none() && req.payment_method.is_some() { let _ = set_default_payment_method( state, &merchant_id, key_store.clone(), &customer_id, payment_method_id.to_owned(), merchant_account.storage_scheme, ) .await .map_err(|error| logger::error!(?error, "Failed to set the payment method as default")); } Ok(services::api::ApplicationResponse::Json( api::PaymentMethodResponse::foreign_from((Some(card), response)), )) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="566" end="630"> fn foreign_try_from( (card_details, card_info): ( &api_models::payment_methods::MigrateCardDetail, Option<diesel_models::CardInfo>, ), ) -> Result<Self, Self::Error> { let (card_isin, last4_digits) = get_card_bin_and_last4_digits_for_masked_card(card_details.card_number.peek()) .change_context(errors::ApiErrorResponse::InvalidRequestData { message: "Invalid card number".to_string(), })?; if let Some(card_bin_info) = card_info { Ok(Self { scheme: card_details .card_network .clone() .or(card_bin_info.card_network.clone()) .map(|card_network| card_network.to_string()), last4_digits: Some(last4_digits.clone()), issuer_country: card_details .card_issuing_country .clone() .or(card_bin_info.card_issuing_country), card_number: None, expiry_month: Some(card_details.card_exp_month.clone()), expiry_year: Some(card_details.card_exp_year.clone()), card_token: None, card_fingerprint: None, card_holder_name: card_details.card_holder_name.clone(), nick_name: card_details.nick_name.clone(), card_isin: Some(card_isin.clone()), card_issuer: card_details .card_issuer .clone() .or(card_bin_info.card_issuer), card_network: card_details .card_network .clone() .or(card_bin_info.card_network), card_type: card_details.card_type.clone().or(card_bin_info.card_type), saved_to_locker: false, }) } else { Ok(Self { scheme: card_details .card_network .clone() .map(|card_network| card_network.to_string()), last4_digits: Some(last4_digits.clone()), issuer_country: card_details.card_issuing_country.clone(), card_number: None, expiry_month: Some(card_details.card_exp_month.clone()), expiry_year: Some(card_details.card_exp_year.clone()), card_token: None, card_fingerprint: None, card_holder_name: card_details.card_holder_name.clone(), nick_name: card_details.nick_name.clone(), card_isin: Some(card_isin.clone()), card_issuer: card_details.card_issuer.clone(), card_network: card_details.card_network.clone(), card_type: card_details.card_type.clone(), saved_to_locker: false, }) } } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="519" end="553"> pub async fn populate_bin_details_for_masked_card( card_details: &api_models::payment_methods::MigrateCardDetail, db: &dyn db::StorageInterface, ) -> errors::CustomResult<api::CardDetailFromLocker, errors::ApiErrorResponse> { migration::validate_card_expiry(&card_details.card_exp_month, &card_details.card_exp_year)?; let card_number = card_details.card_number.clone(); let (card_isin, _last4_digits) = get_card_bin_and_last4_digits_for_masked_card( card_number.peek(), ) .change_context(errors::ApiErrorResponse::InvalidRequestData { message: "Invalid card number".to_string(), })?; let card_bin_details = if card_details.card_issuer.is_some() && card_details.card_network.is_some() && card_details.card_type.is_some() && card_details.card_issuing_country.is_some() { api_models::payment_methods::CardDetailFromLocker::foreign_try_from((card_details, None))? } else { let card_info = db .get_card_info(&card_isin) .await .map_err(|error| services::logger::error!(card_info_error=?error)) .ok() .flatten(); api_models::payment_methods::CardDetailFromLocker::foreign_try_from(( card_details, card_info, ))? }; Ok(card_bin_details) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="3215" end="4240"> pub async fn list_payment_methods( state: routes::SessionState, merchant_account: domain::MerchantAccount, key_store: domain::MerchantKeyStore, mut req: api::PaymentMethodListRequest, ) -> errors::RouterResponse<api::PaymentMethodListResponse> { let db = &*state.store; let pm_config_mapping = &state.conf.pm_filters; let key_manager_state = &(&state).into(); let payment_intent = if let Some(cs) = &req.client_secret { if cs.starts_with("pm_") { validate_payment_method_and_client_secret( &state, cs, db, &merchant_account, &key_store, ) .await?; None } else { helpers::verify_payment_intent_time_and_client_secret( &state, &merchant_account, &key_store, req.client_secret.clone(), ) .await? } } else { None }; let shipping_address = payment_intent .as_ref() .async_map(|pi| async { helpers::get_address_by_id( &state, pi.shipping_address_id.clone(), &key_store, &pi.payment_id, merchant_account.get_id(), merchant_account.storage_scheme, ) .await }) .await .transpose()? .flatten(); let billing_address = payment_intent .as_ref() .async_map(|pi| async { helpers::get_address_by_id( &state, pi.billing_address_id.clone(), &key_store, &pi.payment_id, merchant_account.get_id(), merchant_account.storage_scheme, ) .await }) .await .transpose()? .flatten(); let customer = payment_intent .as_ref() .async_and_then(|pi| async { pi.customer_id .as_ref() .async_and_then(|cust| async { db.find_customer_by_customer_id_merchant_id( key_manager_state, cust, &pi.merchant_id, &key_store, merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::CustomerNotFound) .ok() }) .await }) .await; let payment_attempt = payment_intent .as_ref() .async_map(|pi| async { db.find_payment_attempt_by_payment_id_merchant_id_attempt_id( &pi.payment_id, &pi.merchant_id, &pi.active_attempt.get_id(), merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::PaymentNotFound) }) .await .transpose()?; let setup_future_usage = payment_intent.as_ref().and_then(|pi| pi.setup_future_usage); let is_cit_transaction = payment_attempt .as_ref() .map(|pa| pa.mandate_details.is_some()) .unwrap_or(false) || setup_future_usage .map(|future_usage| future_usage == common_enums::FutureUsage::OffSession) .unwrap_or(false); let payment_type = payment_attempt.as_ref().map(|pa| { let amount = api::Amount::from(pa.net_amount.get_order_amount()); let mandate_type = if pa.mandate_id.is_some() { Some(api::MandateTransactionType::RecurringMandateTransaction) } else if is_cit_transaction { Some(api::MandateTransactionType::NewMandateTransaction) } else { None }; helpers::infer_payment_type(amount, mandate_type.as_ref()) }); let all_mcas = db .find_merchant_connector_account_by_merchant_id_and_disabled_list( key_manager_state, merchant_account.get_id(), false, &key_store, ) .await .to_not_found_response(errors::ApiErrorResponse::MerchantAccountNotFound)?; let profile_id = payment_intent .as_ref() .and_then(|payment_intent| payment_intent.profile_id.as_ref()) .get_required_value("profile_id") .change_context(errors::ApiErrorResponse::GenericNotFoundError { message: "Profile id not found".to_string(), })?; let business_profile = db .find_business_profile_by_profile_id(key_manager_state, &key_store, profile_id) .await .to_not_found_response(errors::ApiErrorResponse::ProfileNotFound { id: profile_id.get_string_repr().to_owned(), })?; // filter out payment connectors based on profile_id let filtered_mcas = all_mcas .clone() .filter_based_on_profile_and_connector_type(profile_id, ConnectorType::PaymentProcessor); logger::debug!(mca_before_filtering=?filtered_mcas); let mut response: Vec<ResponsePaymentMethodIntermediate> = vec![]; // Key creation for storing PM_FILTER_CGRAPH let key = { format!( "pm_filters_cgraph_{}_{}", merchant_account.get_id().get_string_repr(), profile_id.get_string_repr() ) }; if let Some(graph) = get_merchant_pm_filter_graph(&state, &key).await { // Derivation of PM_FILTER_CGRAPH from MokaCache successful for mca in &filtered_mcas { let payment_methods = match &mca.payment_methods_enabled { Some(pm) => pm, None => continue, }; filter_payment_methods( &graph, mca.get_id(), payment_methods, &mut req, &mut response, payment_intent.as_ref(), payment_attempt.as_ref(), billing_address.as_ref(), mca.connector_name.clone(), &state.conf.saved_payment_methods, ) .await?; } } else { // No PM_FILTER_CGRAPH Cache present in MokaCache let mut builder = cgraph::ConstraintGraphBuilder::new(); for mca in &filtered_mcas { let domain_id = builder.make_domain( mca.get_id().get_string_repr().to_string(), mca.connector_name.as_str(), ); let Ok(domain_id) = domain_id else { logger::error!("Failed to construct domain for list payment methods"); return Err(errors::ApiErrorResponse::InternalServerError.into()); }; let payment_methods = match &mca.payment_methods_enabled { Some(pm) => pm, None => continue, }; if let Err(e) = make_pm_graph( &mut builder, domain_id, payment_methods, mca.connector_name.clone(), pm_config_mapping, &state.conf.mandates.supported_payment_methods, &state.conf.mandates.update_mandate_supported, ) { logger::error!( "Failed to construct constraint graph for list payment methods {e:?}" ); } } // Refreshing our CGraph cache let graph = refresh_pm_filters_cache(&state, &key, builder.build()).await; for mca in &filtered_mcas { let payment_methods = match &mca.payment_methods_enabled { Some(pm) => pm, None => continue, }; filter_payment_methods( &graph, mca.get_id().clone(), payment_methods, &mut req, &mut response, payment_intent.as_ref(), payment_attempt.as_ref(), billing_address.as_ref(), mca.connector_name.clone(), &state.conf.saved_payment_methods, ) .await?; } } logger::info!( "The Payment Methods available after Constraint Graph filtering are {:?}", response ); // Filter out wallet payment method from mca if customer has already saved it customer .as_ref() .async_map(|customer| async { let wallet_pm_exists = response .iter() .any(|mca| mca.payment_method == enums::PaymentMethod::Wallet); if wallet_pm_exists { match db .find_payment_method_by_customer_id_merchant_id_status( &((&state).into()), &key_store, &customer.customer_id, merchant_account.get_id(), common_enums::PaymentMethodStatus::Active, None, merchant_account.storage_scheme, ) .await { Ok(customer_payment_methods) => { let customer_wallet_pm = customer_payment_methods .iter() .filter(|cust_pm| { cust_pm.get_payment_method_type() == Some(enums::PaymentMethod::Wallet) }) .collect::<Vec<_>>(); response.retain(|mca| { !(mca.payment_method == enums::PaymentMethod::Wallet && customer_wallet_pm.iter().any(|cust_pm| { cust_pm.get_payment_method_subtype() == Some(mca.payment_method_type) })) }); logger::debug!("Filtered out wallet payment method from mca since customer has already saved it"); Ok(()) } Err(error) => { if error.current_context().is_db_not_found() { Ok(()) } else { Err(error) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("failed to find payment methods for a customer") } } } } else { Ok(()) } }) .await .transpose()?; let mut pmt_to_auth_connector: HashMap< enums::PaymentMethod, HashMap<enums::PaymentMethodType, String>, > = HashMap::new(); if let Some((payment_attempt, payment_intent)) = payment_attempt.as_ref().zip(payment_intent.as_ref()) { let routing_enabled_pms = &router_consts::ROUTING_ENABLED_PAYMENT_METHODS; let routing_enabled_pm_types = &router_consts::ROUTING_ENABLED_PAYMENT_METHOD_TYPES; let mut chosen = api::SessionConnectorDatas::new(Vec::new()); for intermediate in &response { if routing_enabled_pm_types.contains(&intermediate.payment_method_type) || routing_enabled_pms.contains(&intermediate.payment_method) { let connector_data = api::ConnectorData::get_connector_by_name( &state.clone().conf.connectors, &intermediate.connector, api::GetToken::from(intermediate.payment_method_type), None, ) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("invalid connector name received")?; chosen.push(api::SessionConnectorData { payment_method_sub_type: intermediate.payment_method_type, payment_method_type: intermediate.payment_method, connector: connector_data, business_sub_label: None, }); } } let sfr = SessionFlowRoutingInput { state: &state, country: billing_address.clone().and_then(|ad| ad.country), key_store: &key_store, merchant_account: &merchant_account, payment_attempt, payment_intent, chosen, }; let result = routing::perform_session_flow_routing( sfr, &business_profile, &enums::TransactionType::Payment, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("error performing session flow routing")?; response.retain(|intermediate| { if !routing_enabled_pm_types.contains(&intermediate.payment_method_type) && !routing_enabled_pms.contains(&intermediate.payment_method) { return true; } if let Some(choice) = result.get(&intermediate.payment_method_type) { if let Some(first_routable_connector) = choice.first() { intermediate.connector == first_routable_connector .connector .connector_name .to_string() && first_routable_connector .connector .merchant_connector_id .as_ref() .map(|merchant_connector_id| { *merchant_connector_id.get_string_repr() == intermediate.merchant_connector_id }) .unwrap_or_default() } else { false } } else { false } }); let mut routing_info: storage::PaymentRoutingInfo = payment_attempt .straight_through_algorithm .clone() .map(|val| val.parse_value("PaymentRoutingInfo")) .transpose() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Invalid PaymentRoutingInfo format found in payment attempt")? .unwrap_or(storage::PaymentRoutingInfo { algorithm: None, pre_routing_results: None, }); let mut pre_routing_results: HashMap< api_enums::PaymentMethodType, storage::PreRoutingConnectorChoice, > = HashMap::new(); for (pm_type, routing_choice) in result { let mut routable_choice_list = vec![]; for choice in routing_choice { let routable_choice = routing_types::RoutableConnectorChoice { choice_kind: routing_types::RoutableChoiceKind::FullStruct, connector: choice .connector .connector_name .to_string() .parse::<api_enums::RoutableConnectors>() .change_context(errors::ApiErrorResponse::InternalServerError)?, merchant_connector_id: choice.connector.merchant_connector_id.clone(), }; routable_choice_list.push(routable_choice); } pre_routing_results.insert( pm_type, storage::PreRoutingConnectorChoice::Multiple(routable_choice_list), ); } let redis_conn = db .get_redis_conn() .map_err(|redis_error| logger::error!(?redis_error)) .ok(); let mut val = Vec::new(); for (payment_method_type, routable_connector_choice) in &pre_routing_results { let routable_connector_list = match routable_connector_choice { storage::PreRoutingConnectorChoice::Single(routable_connector) => { vec![routable_connector.clone()] } storage::PreRoutingConnectorChoice::Multiple(routable_connector_list) => { routable_connector_list.clone() } }; let first_routable_connector = routable_connector_list .first() .ok_or(errors::ApiErrorResponse::IncorrectPaymentMethodConfiguration)?; let matched_mca = filtered_mcas.iter().find(|m| { first_routable_connector.merchant_connector_id.as_ref() == Some(&m.get_id()) }); if let Some(m) = matched_mca { let pm_auth_config = m .pm_auth_config .as_ref() .map(|config| { serde_json::from_value::<PaymentMethodAuthConfig>(config.clone().expose()) .change_context(errors::StorageError::DeserializationFailed) .attach_printable("Failed to deserialize Payment Method Auth config") }) .transpose() .unwrap_or_else(|error| { logger::error!(?error); None }); if let Some(config) = pm_auth_config { for inner_config in config.enabled_payment_methods.iter() { let is_active_mca = all_mcas .iter() .any(|mca| mca.get_id() == inner_config.mca_id); if inner_config.payment_method_type == *payment_method_type && is_active_mca { let pm = pmt_to_auth_connector .get(&inner_config.payment_method) .cloned(); let inner_map = if let Some(mut inner_map) = pm { inner_map.insert( *payment_method_type, inner_config.connector_name.clone(), ); inner_map } else { HashMap::from([( *payment_method_type, inner_config.connector_name.clone(), )]) }; pmt_to_auth_connector.insert(inner_config.payment_method, inner_map); val.push(inner_config.clone()); } } }; } } let pm_auth_key = payment_intent.payment_id.get_pm_auth_key(); let redis_expiry = state.conf.payment_method_auth.get_inner().redis_expiry; if let Some(rc) = redis_conn { rc.serialize_and_set_key_with_expiry(&pm_auth_key.as_str().into(), val, redis_expiry) .await .attach_printable("Failed to store pm auth data in redis") .unwrap_or_else(|error| { logger::error!(?error); }) }; routing_info.pre_routing_results = Some(pre_routing_results); let encoded = routing_info .encode_to_value() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to serialize payment routing info to value")?; let attempt_update = storage::PaymentAttemptUpdate::UpdateTrackers { payment_token: None, connector: None, straight_through_algorithm: Some(encoded), amount_capturable: None, updated_by: merchant_account.storage_scheme.to_string(), merchant_connector_id: None, surcharge_amount: None, tax_amount: None, }; state .store .update_payment_attempt_with_attempt_id( payment_attempt.clone(), attempt_update, merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::PaymentNotFound)?; } // Check for `use_billing_as_payment_method_billing` config under business_profile // If this is disabled, then the billing details in required fields will be empty and have to be collected by the customer let billing_address_for_calculating_required_fields = business_profile .use_billing_as_payment_method_billing .unwrap_or(true) .then_some(billing_address.as_ref()) .flatten(); let req = api_models::payments::PaymentsRequest::foreign_try_from(( payment_attempt.as_ref(), payment_intent.as_ref(), shipping_address.as_ref(), billing_address_for_calculating_required_fields, customer.as_ref(), ))?; let req_val = serde_json::to_value(req).ok(); logger::debug!(filtered_payment_methods=?response); let mut payment_experiences_consolidated_hm: HashMap< api_enums::PaymentMethod, HashMap<api_enums::PaymentMethodType, HashMap<api_enums::PaymentExperience, Vec<String>>>, > = HashMap::new(); let mut card_networks_consolidated_hm: HashMap< api_enums::PaymentMethod, HashMap<api_enums::PaymentMethodType, HashMap<api_enums::CardNetwork, Vec<String>>>, > = HashMap::new(); let mut banks_consolidated_hm: HashMap<api_enums::PaymentMethodType, Vec<String>> = HashMap::new(); let mut bank_debits_consolidated_hm = HashMap::<api_enums::PaymentMethodType, Vec<String>>::new(); let mut bank_transfer_consolidated_hm = HashMap::<api_enums::PaymentMethodType, Vec<String>>::new(); // All the required fields will be stored here and later filtered out based on business profile config let mut required_fields_hm = HashMap::< api_enums::PaymentMethod, HashMap<api_enums::PaymentMethodType, HashMap<String, RequiredFieldInfo>>, >::new(); for element in response.clone() { let payment_method = element.payment_method; let payment_method_type = element.payment_method_type; let connector = element.connector.clone(); let connector_variant = api_enums::Connector::from_str(connector.as_str()) .change_context(errors::ConnectorError::InvalidConnectorName) .change_context(errors::ApiErrorResponse::InvalidDataValue { field_name: "connector", }) .attach_printable_lazy(|| format!("unable to parse connector name {connector:?}"))?; state.conf.required_fields.0.get(&payment_method).map( |required_fields_hm_for_each_payment_method_type| { required_fields_hm_for_each_payment_method_type .0 .get(&payment_method_type) .map(|required_fields_hm_for_each_connector| { required_fields_hm.entry(payment_method).or_default(); required_fields_hm_for_each_connector .fields .get(&connector_variant) .map(|required_fields_final| { let mut required_fields_hs = required_fields_final.common.clone(); if is_cit_transaction { required_fields_hs .extend(required_fields_final.mandate.clone()); } else { required_fields_hs .extend(required_fields_final.non_mandate.clone()); } required_fields_hs = should_collect_shipping_or_billing_details_from_wallet_connector( payment_method, element.payment_experience.as_ref(), &business_profile, required_fields_hs.clone(), ); // get the config, check the enums while adding { for (key, val) in &mut required_fields_hs { let temp = req_val .as_ref() .and_then(|r| get_val(key.to_owned(), r)); if let Some(s) = temp { val.value = Some(s.into()) }; } } let existing_req_fields_hs = required_fields_hm .get_mut(&payment_method) .and_then(|inner_hm| inner_hm.get_mut(&payment_method_type)); // If payment_method_type already exist in required_fields_hm, extend the required_fields hs to existing hs. if let Some(inner_hs) = existing_req_fields_hs { inner_hs.extend(required_fields_hs); } else { required_fields_hm.get_mut(&payment_method).map(|inner_hm| { inner_hm.insert(payment_method_type, required_fields_hs) }); } }) }) }, ); if let Some(payment_experience) = element.payment_experience { if let Some(payment_method_hm) = payment_experiences_consolidated_hm.get_mut(&payment_method) { if let Some(payment_method_type_hm) = payment_method_hm.get_mut(&payment_method_type) { if let Some(vector_of_connectors) = payment_method_type_hm.get_mut(&payment_experience) { vector_of_connectors.push(connector); } else { payment_method_type_hm.insert(payment_experience, vec![connector]); } } else { payment_method_hm.insert( payment_method_type, HashMap::from([(payment_experience, vec![connector])]), ); } } else { let inner_hm = HashMap::from([(payment_experience, vec![connector])]); let payment_method_type_hm = HashMap::from([(payment_method_type, inner_hm)]); payment_experiences_consolidated_hm.insert(payment_method, payment_method_type_hm); } } if let Some(card_networks) = element.card_networks { if let Some(payment_method_hm) = card_networks_consolidated_hm.get_mut(&payment_method) { if let Some(payment_method_type_hm) = payment_method_hm.get_mut(&payment_method_type) { for card_network in card_networks { if let Some(vector_of_connectors) = payment_method_type_hm.get_mut(&card_network) { let connector = element.connector.clone(); vector_of_connectors.push(connector); } else { let connector = element.connector.clone(); payment_method_type_hm.insert(card_network, vec![connector]); } } } else { let mut inner_hashmap: HashMap<api_enums::CardNetwork, Vec<String>> = HashMap::new(); for card_network in card_networks { if let Some(vector_of_connectors) = inner_hashmap.get_mut(&card_network) { let connector = element.connector.clone(); vector_of_connectors.push(connector); } else { let connector = element.connector.clone(); inner_hashmap.insert(card_network, vec![connector]); } } payment_method_hm.insert(payment_method_type, inner_hashmap); } } else { let mut inner_hashmap: HashMap<api_enums::CardNetwork, Vec<String>> = HashMap::new(); for card_network in card_networks { if let Some(vector_of_connectors) = inner_hashmap.get_mut(&card_network) { let connector = element.connector.clone(); vector_of_connectors.push(connector); } else { let connector = element.connector.clone(); inner_hashmap.insert(card_network, vec![connector]); } } let payment_method_type_hm = HashMap::from([(payment_method_type, inner_hashmap)]); card_networks_consolidated_hm.insert(payment_method, payment_method_type_hm); } } if element.payment_method == api_enums::PaymentMethod::BankRedirect { let connector = element.connector.clone(); if let Some(vector_of_connectors) = banks_consolidated_hm.get_mut(&element.payment_method_type) { vector_of_connectors.push(connector); } else { banks_consolidated_hm.insert(element.payment_method_type, vec![connector]); } } if element.payment_method == api_enums::PaymentMethod::BankDebit { let connector = element.connector.clone(); if let Some(vector_of_connectors) = bank_debits_consolidated_hm.get_mut(&element.payment_method_type) { vector_of_connectors.push(connector); } else { bank_debits_consolidated_hm.insert(element.payment_method_type, vec![connector]); } } if element.payment_method == api_enums::PaymentMethod::BankTransfer { let connector = element.connector.clone(); if let Some(vector_of_connectors) = bank_transfer_consolidated_hm.get_mut(&element.payment_method_type) { vector_of_connectors.push(connector); } else { bank_transfer_consolidated_hm.insert(element.payment_method_type, vec![connector]); } } } let mut payment_method_responses: Vec<ResponsePaymentMethodsEnabled> = vec![]; for key in payment_experiences_consolidated_hm.iter() { let mut payment_method_types = vec![]; for payment_method_types_hm in key.1 { let mut payment_experience_types = vec![]; for payment_experience_type in payment_method_types_hm.1 { payment_experience_types.push(PaymentExperienceTypes { payment_experience_type: *payment_experience_type.0, eligible_connectors: payment_experience_type.1.clone(), }) } payment_method_types.push(ResponsePaymentMethodTypes { payment_method_type: *payment_method_types_hm.0, payment_experience: Some(payment_experience_types), card_networks: None, bank_names: None, bank_debits: None, bank_transfers: None, // Required fields for PayLater payment method required_fields: required_fields_hm .get(key.0) .and_then(|inner_hm| inner_hm.get(payment_method_types_hm.0)) .cloned(), surcharge_details: None, pm_auth_connector: pmt_to_auth_connector .get(key.0) .and_then(|pm_map| pm_map.get(payment_method_types_hm.0)) .cloned(), }) } payment_method_responses.push(ResponsePaymentMethodsEnabled { payment_method: *key.0, payment_method_types, }) } for key in card_networks_consolidated_hm.iter() { let mut payment_method_types = vec![]; for payment_method_types_hm in key.1 { let mut card_network_types = vec![]; for card_network_type in payment_method_types_hm.1 { card_network_types.push(CardNetworkTypes { card_network: card_network_type.0.clone(), eligible_connectors: card_network_type.1.clone(), surcharge_details: None, }) } payment_method_types.push(ResponsePaymentMethodTypes { payment_method_type: *payment_method_types_hm.0, card_networks: Some(card_network_types), payment_experience: None, bank_names: None, bank_debits: None, bank_transfers: None, // Required fields for Card payment method required_fields: required_fields_hm .get(key.0) .and_then(|inner_hm| inner_hm.get(payment_method_types_hm.0)) .cloned(), surcharge_details: None, pm_auth_connector: pmt_to_auth_connector .get(key.0) .and_then(|pm_map| pm_map.get(payment_method_types_hm.0)) .cloned(), }) } payment_method_responses.push(ResponsePaymentMethodsEnabled { payment_method: *key.0, payment_method_types, }) } let mut bank_redirect_payment_method_types = vec![]; for key in banks_consolidated_hm.iter() { let payment_method_type = *key.0; let connectors = key.1.clone(); let bank_names = get_banks(&state, payment_method_type, connectors)?; bank_redirect_payment_method_types.push({ ResponsePaymentMethodTypes { payment_method_type, bank_names: Some(bank_names), payment_experience: None, card_networks: None, bank_debits: None, bank_transfers: None, // Required fields for BankRedirect payment method required_fields: required_fields_hm .get(&api_enums::PaymentMethod::BankRedirect) .and_then(|inner_hm| inner_hm.get(key.0)) .cloned(), surcharge_details: None, pm_auth_connector: pmt_to_auth_connector .get(&enums::PaymentMethod::BankRedirect) .and_then(|pm_map| pm_map.get(key.0)) .cloned(), } }) } if !bank_redirect_payment_method_types.is_empty() { payment_method_responses.push(ResponsePaymentMethodsEnabled { payment_method: api_enums::PaymentMethod::BankRedirect, payment_method_types: bank_redirect_payment_method_types, }); } let mut bank_debit_payment_method_types = vec![]; for key in bank_debits_consolidated_hm.iter() { let payment_method_type = *key.0; let connectors = key.1.clone(); bank_debit_payment_method_types.push({ ResponsePaymentMethodTypes { payment_method_type, bank_names: None, payment_experience: None, card_networks: None, bank_debits: Some(api_models::payment_methods::BankDebitTypes { eligible_connectors: connectors.clone(), }), bank_transfers: None, // Required fields for BankDebit payment method required_fields: required_fields_hm .get(&api_enums::PaymentMethod::BankDebit) .and_then(|inner_hm| inner_hm.get(key.0)) .cloned(), surcharge_details: None, pm_auth_connector: pmt_to_auth_connector .get(&enums::PaymentMethod::BankDebit) .and_then(|pm_map| pm_map.get(key.0)) .cloned(), } }) } if !bank_debit_payment_method_types.is_empty() { payment_method_responses.push(ResponsePaymentMethodsEnabled { payment_method: api_enums::PaymentMethod::BankDebit, payment_method_types: bank_debit_payment_method_types, }); } let mut bank_transfer_payment_method_types = vec![]; for key in bank_transfer_consolidated_hm.iter() { let payment_method_type = *key.0; let connectors = key.1.clone(); bank_transfer_payment_method_types.push({ ResponsePaymentMethodTypes { payment_method_type, bank_names: None, payment_experience: None, card_networks: None, bank_debits: None, bank_transfers: Some(api_models::payment_methods::BankTransferTypes { eligible_connectors: connectors, }), // Required fields for BankTransfer payment method required_fields: required_fields_hm .get(&api_enums::PaymentMethod::BankTransfer) .and_then(|inner_hm| inner_hm.get(key.0)) .cloned(), surcharge_details: None, pm_auth_connector: pmt_to_auth_connector .get(&enums::PaymentMethod::BankTransfer) .and_then(|pm_map| pm_map.get(key.0)) .cloned(), } }) } if !bank_transfer_payment_method_types.is_empty() { payment_method_responses.push(ResponsePaymentMethodsEnabled { payment_method: api_enums::PaymentMethod::BankTransfer, payment_method_types: bank_transfer_payment_method_types, }); } let currency = payment_intent.as_ref().and_then(|pi| pi.currency); let skip_external_tax_calculation = payment_intent .as_ref() .and_then(|intent| intent.skip_external_tax_calculation) .unwrap_or(false); let request_external_three_ds_authentication = payment_intent .as_ref() .and_then(|intent| intent.request_external_three_ds_authentication) .unwrap_or(false); let merchant_surcharge_configs = if let Some((payment_attempt, payment_intent)) = payment_attempt.as_ref().zip(payment_intent) { Box::pin(call_surcharge_decision_management( state, &merchant_account, &key_store, &business_profile, payment_attempt, payment_intent, billing_address, &mut payment_method_responses, )) .await? } else { api_surcharge_decision_configs::MerchantSurchargeConfigs::default() }; let collect_shipping_details_from_wallets = if business_profile .always_collect_shipping_details_from_wallet_connector .unwrap_or(false) { business_profile.always_collect_shipping_details_from_wallet_connector } else { business_profile.collect_shipping_details_from_wallet_connector }; let collect_billing_details_from_wallets = if business_profile .always_collect_billing_details_from_wallet_connector .unwrap_or(false) { business_profile.always_collect_billing_details_from_wallet_connector } else { business_profile.collect_billing_details_from_wallet_connector }; let is_tax_connector_enabled = business_profile.get_is_tax_connector_enabled(); Ok(services::ApplicationResponse::Json( api::PaymentMethodListResponse { redirect_url: business_profile.return_url.clone(), merchant_name: merchant_account.merchant_name, payment_type, payment_methods: payment_method_responses, mandate_payment: payment_attempt.and_then(|inner| inner.mandate_details).map( |d| match d { hyperswitch_domain_models::mandates::MandateDataType::SingleUse(i) => { api::MandateType::SingleUse(api::MandateAmountData { amount: i.amount, currency: i.currency, start_date: i.start_date, end_date: i.end_date, metadata: i.metadata, }) } hyperswitch_domain_models::mandates::MandateDataType::MultiUse(Some(i)) => { api::MandateType::MultiUse(Some(api::MandateAmountData { amount: i.amount, currency: i.currency, start_date: i.start_date, end_date: i.end_date, metadata: i.metadata, })) } hyperswitch_domain_models::mandates::MandateDataType::MultiUse(None) => { api::MandateType::MultiUse(None) } }, ), show_surcharge_breakup_screen: merchant_surcharge_configs .show_surcharge_breakup_screen .unwrap_or_default(), currency, request_external_three_ds_authentication, collect_shipping_details_from_wallets, collect_billing_details_from_wallets, is_tax_calculation_enabled: is_tax_connector_enabled && !skip_external_tax_calculation, }, )) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="565" end="565"> type Error = error_stack::Report<errors::ApiErrorResponse>;
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/payment_methods/cards.rs<|crate|> router anchor=add_bank_to_locker kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="2358" end="2431"> pub async fn add_bank_to_locker( state: &routes::SessionState, req: api::PaymentMethodCreate, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, bank: &api::BankPayout, customer_id: &id_type::CustomerId, ) -> errors::CustomResult< ( api::PaymentMethodResponse, Option<payment_methods::DataDuplicationCheck>, ), errors::VaultError, > { let key = key_store.key.get_inner().peek(); let payout_method_data = api::PayoutMethodData::Bank(bank.clone()); let key_manager_state: KeyManagerState = state.into(); let enc_data = async { serde_json::to_value(payout_method_data.to_owned()) .map_err(|err| { logger::error!("Error while encoding payout method data: {err:?}"); errors::VaultError::SavePaymentMethodFailed }) .change_context(errors::VaultError::SavePaymentMethodFailed) .attach_printable("Unable to encode payout method data") .ok() .map(|v| { let secret: Secret<String> = Secret::new(v.to_string()); secret }) .async_lift(|inner| async { domain::types::crypto_operation( &key_manager_state, type_name!(payment_method::PaymentMethod), domain::types::CryptoOperation::EncryptOptional(inner), Identifier::Merchant(key_store.merchant_id.clone()), key, ) .await .and_then(|val| val.try_into_optionaloperation()) }) .await } .await .change_context(errors::VaultError::SavePaymentMethodFailed) .attach_printable("Failed to encrypt payout method data")? .map(Encryption::from) .map(|e| e.into_inner()) .map_or(Err(errors::VaultError::SavePaymentMethodFailed), |e| { Ok(hex::encode(e.peek())) })?; let payload = payment_methods::StoreLockerReq::LockerGeneric(payment_methods::StoreGenericReq { merchant_id: merchant_account.get_id().to_owned(), merchant_customer_id: customer_id.to_owned(), enc_data, ttl: state.conf.locker.ttl_for_storage_in_secs, }); let store_resp = add_card_to_hs_locker( state, &payload, customer_id, api_enums::LockerChoice::HyperswitchCardVault, ) .await?; let payment_method_resp = payment_methods::mk_add_bank_response_hs( bank.clone(), store_resp.card_reference, req, merchant_account.get_id(), ); Ok((payment_method_resp, store_resp.duplication_check)) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="2357" end="2357"> #[cfg(all(feature = "v2", feature = "payment_methods_v2"))] pub fn validate_payment_method_update( _card_updation_obj: CardDetailUpdate, _existing_card_data: api::CardDetailFromLocker, ) -> bool { todo!() } // Wrapper function to switch lockers #[cfg(feature = "payouts")] pub async fn add_bank_to_locker( state: &routes::SessionState, req: api::PaymentMethodCreate, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, bank: &api::BankPayout, customer_id: &id_type::CustomerId, ) -> errors::CustomResult< ( api::PaymentMethodResponse, Option<payment_methods::DataDuplicationCheck>, ), errors::VaultError, <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="2477" end="2511"> pub async fn get_card_from_locker( state: &routes::SessionState, customer_id: &id_type::CustomerId, merchant_id: &id_type::MerchantId, card_reference: &str, ) -> errors::RouterResult<Card> { metrics::GET_FROM_LOCKER.add(1, &[]); let get_card_from_rs_locker_resp = common_utils::metrics::utils::record_operation_time( async { get_card_from_hs_locker( state, customer_id, merchant_id, card_reference, api_enums::LockerChoice::HyperswitchCardVault, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed while getting card from hyperswitch card vault") .inspect_err(|_| { metrics::CARD_LOCKER_FAILURES.add( 1, router_env::metric_attributes!(("locker", "rust"), ("operation", "get")), ); }) }, &metrics::CARD_GET_TIME, router_env::metric_attributes!(("locker", "rust")), ) .await?; logger::debug!("card retrieved from rust locker"); Ok(get_card_from_rs_locker_resp) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="2434" end="2475"> pub async fn add_card_to_locker( state: &routes::SessionState, req: api::PaymentMethodCreate, card: &api::CardDetail, customer_id: &id_type::CustomerId, merchant_account: &domain::MerchantAccount, card_reference: Option<&str>, ) -> errors::CustomResult< ( api::PaymentMethodResponse, Option<payment_methods::DataDuplicationCheck>, ), errors::VaultError, > { metrics::STORED_TO_LOCKER.add(1, &[]); let add_card_to_hs_resp = Box::pin(common_utils::metrics::utils::record_operation_time( async { add_card_hs( state, req.clone(), card, customer_id, merchant_account, api_enums::LockerChoice::HyperswitchCardVault, card_reference, ) .await .inspect_err(|_| { metrics::CARD_LOCKER_FAILURES.add( 1, router_env::metric_attributes!(("locker", "rust"), ("operation", "add")), ); }) }, &metrics::CARD_ADD_TIME, router_env::metric_attributes!(("locker", "rust")), )) .await?; logger::debug!("card added to hyperswitch-card-vault"); Ok(add_card_to_hs_resp) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="2348" end="2353"> pub fn validate_payment_method_update( _card_updation_obj: CardDetailUpdate, _existing_card_data: api::CardDetailFromLocker, ) -> bool { todo!() } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="2299" end="2345"> pub fn validate_payment_method_update( card_updation_obj: CardDetailUpdate, existing_card_data: api::CardDetailFromLocker, ) -> bool { // Return true If any one of the below condition returns true, // If a field is not passed in the update request, return false. // If the field is present, it depends on the existing field data: // - If existing field data is not present, or if it is present and doesn't match // the update request data, then return true. // - Or else return false card_updation_obj .card_exp_month .map(|exp_month| exp_month.expose()) .is_some_and(|new_exp_month| { existing_card_data .expiry_month .map(|exp_month| exp_month.expose()) != Some(new_exp_month) }) || card_updation_obj .card_exp_year .map(|exp_year| exp_year.expose()) .is_some_and(|new_exp_year| { existing_card_data .expiry_year .map(|exp_year| exp_year.expose()) != Some(new_exp_year) }) || card_updation_obj .card_holder_name .map(|name| name.expose()) .is_some_and(|new_card_holder_name| { existing_card_data .card_holder_name .map(|name| name.expose()) != Some(new_card_holder_name) }) || card_updation_obj .nick_name .map(|nick_name| nick_name.expose()) .is_some_and(|new_nick_name| { existing_card_data .nick_name .map(|nick_name| nick_name.expose()) != Some(new_nick_name) }) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="1712" end="1981"> pub async fn save_migration_payment_method( state: &routes::SessionState, req: api::PaymentMethodCreate, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, migration_status: &mut migration::RecordMigrationStatusBuilder, ) -> errors::RouterResponse<api::PaymentMethodResponse> { req.validate()?; let db = &*state.store; let merchant_id = merchant_account.get_id(); let customer_id = req.customer_id.clone().get_required_value("customer_id")?; let payment_method = req.payment_method.get_required_value("payment_method")?; let key_manager_state = state.into(); let payment_method_billing_address: Option<Encryptable<Secret<serde_json::Value>>> = req .billing .clone() .async_map(|billing| create_encrypted_data(&key_manager_state, key_store, billing)) .await .transpose() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to encrypt Payment method billing address")?; let connector_mandate_details = req .connector_mandate_details .clone() .map(serde_json::to_value) .transpose() .change_context(errors::ApiErrorResponse::InternalServerError)?; let network_transaction_id = req.network_transaction_id.clone(); let response = match payment_method { #[cfg(feature = "payouts")] api_enums::PaymentMethod::BankTransfer => match req.bank_transfer.clone() { Some(bank) => add_bank_to_locker( state, req.clone(), merchant_account, key_store, &bank, &customer_id, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Add PaymentMethod Failed"), _ => Ok(store_default_payment_method( &req, &customer_id, merchant_id, )), }, api_enums::PaymentMethod::Card => match req.card.clone() { Some(card) => { let mut card_details = card; card_details = helpers::populate_bin_details_for_payment_method_create( card_details.clone(), db, ) .await; migration::validate_card_expiry( &card_details.card_exp_month, &card_details.card_exp_year, )?; Box::pin(add_card_to_locker( state, req.clone(), &card_details, &customer_id, merchant_account, None, )) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Add Card Failed") } _ => Ok(store_default_payment_method( &req, &customer_id, merchant_id, )), }, _ => Ok(store_default_payment_method( &req, &customer_id, merchant_id, )), }; let (mut resp, duplication_check) = response?; migration_status.card_migrated(true); match duplication_check { Some(duplication_check) => match duplication_check { payment_methods::DataDuplicationCheck::Duplicated => { let existing_pm = get_or_insert_payment_method( state, req.clone(), &mut resp, merchant_account, &customer_id, key_store, ) .await?; resp.client_secret = existing_pm.client_secret; } payment_methods::DataDuplicationCheck::MetaDataChanged => { if let Some(card) = req.card.clone() { let existing_pm = get_or_insert_payment_method( state, req.clone(), &mut resp, merchant_account, &customer_id, key_store, ) .await?; let client_secret = existing_pm.client_secret.clone(); delete_card_from_locker( state, &customer_id, merchant_id, existing_pm .locker_id .as_ref() .unwrap_or(&existing_pm.payment_method_id), ) .await?; let add_card_resp = add_card_hs( state, req.clone(), &card, &customer_id, merchant_account, api::enums::LockerChoice::HyperswitchCardVault, Some( existing_pm .locker_id .as_ref() .unwrap_or(&existing_pm.payment_method_id), ), ) .await; if let Err(err) = add_card_resp { logger::error!(vault_err=?err); db.delete_payment_method_by_merchant_id_payment_method_id( &(state.into()), key_store, merchant_id, &resp.payment_method_id, ) .await .to_not_found_response(errors::ApiErrorResponse::PaymentMethodNotFound)?; Err(report!(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed while updating card metadata changes"))? }; let existing_pm_data = get_card_details_without_locker_fallback(&existing_pm, state).await?; let updated_card = Some(api::CardDetailFromLocker { scheme: existing_pm.scheme.clone(), last4_digits: Some(card.card_number.get_last4()), issuer_country: card .card_issuing_country .or(existing_pm_data.issuer_country), card_isin: Some(card.card_number.get_card_isin()), card_number: Some(card.card_number), expiry_month: Some(card.card_exp_month), expiry_year: Some(card.card_exp_year), card_token: None, card_fingerprint: None, card_holder_name: card .card_holder_name .or(existing_pm_data.card_holder_name), nick_name: card.nick_name.or(existing_pm_data.nick_name), card_network: card.card_network.or(existing_pm_data.card_network), card_issuer: card.card_issuer.or(existing_pm_data.card_issuer), card_type: card.card_type.or(existing_pm_data.card_type), saved_to_locker: true, }); let updated_pmd = updated_card.as_ref().map(|card| { PaymentMethodsData::Card(CardDetailsPaymentMethod::from(card.clone())) }); let pm_data_encrypted: Option<Encryptable<Secret<serde_json::Value>>> = updated_pmd .async_map(|updated_pmd| { create_encrypted_data(&key_manager_state, key_store, updated_pmd) }) .await .transpose() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to encrypt payment method data")?; let pm_update = storage::PaymentMethodUpdate::PaymentMethodDataUpdate { payment_method_data: pm_data_encrypted.map(Into::into), }; db.update_payment_method( &(state.into()), key_store, existing_pm, pm_update, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to add payment method in db")?; resp.client_secret = client_secret; } } }, None => { let pm_metadata = resp.metadata.as_ref().map(|data| data.peek()); let locker_id = if resp.payment_method == Some(api_enums::PaymentMethod::Card) || resp.payment_method == Some(api_enums::PaymentMethod::BankTransfer) { Some(resp.payment_method_id) } else { None }; resp.payment_method_id = generate_id(consts::ID_LENGTH, "pm"); let pm = insert_payment_method( state, &resp, &req, key_store, merchant_id, &customer_id, pm_metadata.cloned(), None, locker_id, connector_mandate_details.clone(), network_transaction_id.clone(), merchant_account.storage_scheme, payment_method_billing_address, None, None, None, ) .await?; resp.client_secret = pm.client_secret; } } migration_status.card_migrated(true); migration_status.network_transaction_id_migrated( network_transaction_id.and_then(|val| (!val.is_empty_after_trim()).then_some(true)), ); migration_status.connector_mandate_details_migrated( connector_mandate_details .and_then(|val| if val == json!({}) { None } else { Some(true) }) .or_else(|| { req.connector_mandate_details .and_then(|val| (!val.0.is_empty()).then_some(false)) }), ); Ok(services::ApplicationResponse::Json(resp)) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="1454" end="1705"> pub async fn add_payment_method( state: &routes::SessionState, req: api::PaymentMethodCreate, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, ) -> errors::RouterResponse<api::PaymentMethodResponse> { req.validate()?; let db = &*state.store; let merchant_id = merchant_account.get_id(); let customer_id = req.customer_id.clone().get_required_value("customer_id")?; let payment_method = req.payment_method.get_required_value("payment_method")?; let key_manager_state = state.into(); let payment_method_billing_address: Option<Encryptable<Secret<serde_json::Value>>> = req .billing .clone() .async_map(|billing| create_encrypted_data(&key_manager_state, key_store, billing)) .await .transpose() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to encrypt Payment method billing address")?; let connector_mandate_details = req .connector_mandate_details .clone() .map(serde_json::to_value) .transpose() .change_context(errors::ApiErrorResponse::InternalServerError)?; let response = match payment_method { #[cfg(feature = "payouts")] api_enums::PaymentMethod::BankTransfer => match req.bank_transfer.clone() { Some(bank) => add_bank_to_locker( state, req.clone(), merchant_account, key_store, &bank, &customer_id, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Add PaymentMethod Failed"), _ => Ok(store_default_payment_method( &req, &customer_id, merchant_id, )), }, api_enums::PaymentMethod::Card => match req.card.clone() { Some(card) => { let mut card_details = card; card_details = helpers::populate_bin_details_for_payment_method_create( card_details.clone(), db, ) .await; helpers::validate_card_expiry( &card_details.card_exp_month, &card_details.card_exp_year, )?; Box::pin(add_card_to_locker( state, req.clone(), &card_details, &customer_id, merchant_account, None, )) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Add Card Failed") } _ => Ok(store_default_payment_method( &req, &customer_id, merchant_id, )), }, _ => Ok(store_default_payment_method( &req, &customer_id, merchant_id, )), }; let (mut resp, duplication_check) = response?; match duplication_check { Some(duplication_check) => match duplication_check { payment_methods::DataDuplicationCheck::Duplicated => { let existing_pm = get_or_insert_payment_method( state, req.clone(), &mut resp, merchant_account, &customer_id, key_store, ) .await?; resp.client_secret = existing_pm.client_secret; } payment_methods::DataDuplicationCheck::MetaDataChanged => { if let Some(card) = req.card.clone() { let existing_pm = get_or_insert_payment_method( state, req.clone(), &mut resp, merchant_account, &customer_id, key_store, ) .await?; let client_secret = existing_pm.client_secret.clone(); delete_card_from_locker( state, &customer_id, merchant_id, existing_pm .locker_id .as_ref() .unwrap_or(&existing_pm.payment_method_id), ) .await?; let add_card_resp = add_card_hs( state, req.clone(), &card, &customer_id, merchant_account, api::enums::LockerChoice::HyperswitchCardVault, Some( existing_pm .locker_id .as_ref() .unwrap_or(&existing_pm.payment_method_id), ), ) .await; if let Err(err) = add_card_resp { logger::error!(vault_err=?err); db.delete_payment_method_by_merchant_id_payment_method_id( &(state.into()), key_store, merchant_id, &resp.payment_method_id, ) .await .to_not_found_response(errors::ApiErrorResponse::PaymentMethodNotFound)?; Err(report!(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed while updating card metadata changes"))? }; let existing_pm_data = get_card_details_without_locker_fallback(&existing_pm, state).await?; let updated_card = Some(api::CardDetailFromLocker { scheme: existing_pm.scheme.clone(), last4_digits: Some(card.card_number.get_last4()), issuer_country: card .card_issuing_country .or(existing_pm_data.issuer_country), card_isin: Some(card.card_number.get_card_isin()), card_number: Some(card.card_number), expiry_month: Some(card.card_exp_month), expiry_year: Some(card.card_exp_year), card_token: None, card_fingerprint: None, card_holder_name: card .card_holder_name .or(existing_pm_data.card_holder_name), nick_name: card.nick_name.or(existing_pm_data.nick_name), card_network: card.card_network.or(existing_pm_data.card_network), card_issuer: card.card_issuer.or(existing_pm_data.card_issuer), card_type: card.card_type.or(existing_pm_data.card_type), saved_to_locker: true, }); let updated_pmd = updated_card.as_ref().map(|card| { PaymentMethodsData::Card(CardDetailsPaymentMethod::from(card.clone())) }); let pm_data_encrypted: Option<Encryptable<Secret<serde_json::Value>>> = updated_pmd .async_map(|updated_pmd| { create_encrypted_data(&key_manager_state, key_store, updated_pmd) }) .await .transpose() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to encrypt payment method data")?; let pm_update = storage::PaymentMethodUpdate::PaymentMethodDataUpdate { payment_method_data: pm_data_encrypted.map(Into::into), }; db.update_payment_method( &(state.into()), key_store, existing_pm, pm_update, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to add payment method in db")?; resp.client_secret = client_secret; } } }, None => { let pm_metadata = resp.metadata.as_ref().map(|data| data.peek()); let locker_id = if resp.payment_method == Some(api_enums::PaymentMethod::Card) || resp.payment_method == Some(api_enums::PaymentMethod::BankTransfer) { Some(resp.payment_method_id) } else { None }; resp.payment_method_id = generate_id(consts::ID_LENGTH, "pm"); let pm = insert_payment_method( state, &resp, &req, key_store, merchant_id, &customer_id, pm_metadata.cloned(), None, locker_id, connector_mandate_details, req.network_transaction_id.clone(), merchant_account.storage_scheme, payment_method_billing_address, None, None, None, ) .await?; resp.client_secret = pm.client_secret; } } Ok(services::ApplicationResponse::Json(resp)) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="2683" end="2720"> pub async fn add_card_to_hs_locker( state: &routes::SessionState, payload: &payment_methods::StoreLockerReq, customer_id: &id_type::CustomerId, locker_choice: api_enums::LockerChoice, ) -> errors::CustomResult<payment_methods::StoreCardRespPayload, errors::VaultError> { let locker = &state.conf.locker; let jwekey = state.conf.jwekey.get_inner(); let db = &*state.store; let stored_card_response = if !locker.mock_locker { let request = payment_methods::mk_add_locker_request_hs( jwekey, locker, payload, locker_choice, state.tenant.tenant_id.clone(), state.request_id, ) .await?; call_locker_api::<payment_methods::StoreCardResp>( state, request, "add_card_to_hs_locker", Some(locker_choice), ) .await .change_context(errors::VaultError::SaveCardFailed)? } else { let card_id = generate_id(consts::ID_LENGTH, "card"); mock_call_to_locker_hs(db, &card_id, payload, None, None, Some(customer_id)).await? }; let stored_card = stored_card_response .payload .get_required_value("StoreCardRespPayload") .change_context(errors::VaultError::SaveCardFailed)?; Ok(stored_card) } <file_sep path="hyperswitch/crates/router/src/core/payment_methods/cards.rs" role="context" start="565" end="565"> type Error = error_stack::Report<errors::ApiErrorResponse>; <file_sep path="hyperswitch/crates/router/src/connector/nmi/transformers.rs" role="context" start="454" end="459"> pub enum PaymentMethod { CardNonThreeDs(Box<CardData>), CardThreeDs(Box<CardThreeDsData>), GPay(Box<GooglePayData>), ApplePay(Box<ApplePayData>), } <file_sep path="hyperswitch/v2_compatible_migrations/2024-08-28-081721_add_v2_columns/up.sql" role="context" start="54" end="70"> ADD COLUMN redirection_data JSONB, ADD COLUMN connector_payment_data TEXT, ADD COLUMN connector_token_details JSONB; -- Change the type of the column from JSON to JSONB ALTER TABLE merchant_connector_account ADD COLUMN IF NOT EXISTS feature_metadata JSONB; ALTER TABLE payment_methods ADD COLUMN IF NOT EXISTS locker_fingerprint_id VARCHAR(64), ADD COLUMN IF NOT EXISTS payment_method_type_v2 VARCHAR(64), ADD COLUMN IF NOT EXISTS payment_method_subtype VARCHAR(64); ALTER TABLE refund ADD COLUMN IF NOT EXISTS id VARCHAR(64), ADD COLUMN IF NOT EXISTS merchant_reference_id VARCHAR(64), ADD COLUMN IF NOT EXISTS connector_id VARCHAR(64); <file_sep path="hyperswitch/crates/api_models/src/payouts.rs" role="context" start="262" end="267"> pub enum Bank { Ach(AchBankTransfer), Bacs(BacsBankTransfer), Sepa(SepaBankTransfer), Pix(PixBankTransfer), }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/payments/helpers.rs<|crate|> router anchor=get_and_merge_apple_pay_metadata kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="5283" end="5349"> async fn get_and_merge_apple_pay_metadata( connector_metadata: Option<masking::Secret<tera::Value>>, connector_wallets_details_optional: Option<api_models::admin::ConnectorWalletDetails>, ) -> RouterResult<Option<api_models::admin::ConnectorWalletDetails>> { let apple_pay_metadata_optional = get_applepay_metadata(connector_metadata) .map_err(|error| { logger::error!( "Apple Pay metadata parsing failed in get_encrypted_connector_wallets_details_with_apple_pay_certificates {:?}", error ); }) .ok(); if let Some(apple_pay_metadata) = apple_pay_metadata_optional { let updated_wallet_details = match apple_pay_metadata { api_models::payments::ApplepaySessionTokenMetadata::ApplePayCombined( apple_pay_combined_metadata, ) => { let combined_metadata_json = serde_json::to_value(apple_pay_combined_metadata) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to serialize Apple Pay combined metadata as JSON")?; api_models::admin::ConnectorWalletDetails { apple_pay_combined: Some(masking::Secret::new(combined_metadata_json)), apple_pay: connector_wallets_details_optional .as_ref() .and_then(|d| d.apple_pay.clone()), samsung_pay: connector_wallets_details_optional .as_ref() .and_then(|d| d.samsung_pay.clone()), paze: connector_wallets_details_optional .as_ref() .and_then(|d| d.paze.clone()), google_pay: connector_wallets_details_optional .as_ref() .and_then(|d| d.google_pay.clone()), } } api_models::payments::ApplepaySessionTokenMetadata::ApplePay(apple_pay_metadata) => { let metadata_json = serde_json::to_value(apple_pay_metadata) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to serialize Apple Pay metadata as JSON")?; api_models::admin::ConnectorWalletDetails { apple_pay: Some(masking::Secret::new(metadata_json)), apple_pay_combined: connector_wallets_details_optional .as_ref() .and_then(|d| d.apple_pay_combined.clone()), samsung_pay: connector_wallets_details_optional .as_ref() .and_then(|d| d.samsung_pay.clone()), paze: connector_wallets_details_optional .as_ref() .and_then(|d| d.paze.clone()), google_pay: connector_wallets_details_optional .as_ref() .and_then(|d| d.google_pay.clone()), } } }; return Ok(Some(updated_wallet_details)); } // Return connector_wallets_details if no Apple Pay metadata was found Ok(connector_wallets_details_optional) } <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="5282" end="5282"> // Otherwise, merge Apple Pay metadata return get_and_merge_apple_pay_metadata( connector_metadata.clone(), Some(connector_wallets_details.clone()), ) .await; } // If connector_wallets_details_optional is None, attempt to get Apple Pay metadata get_and_merge_apple_pay_metadata(connector_metadata.clone(), None).await } async fn get_and_merge_apple_pay_metadata( connector_metadata: Option<masking::Secret<tera::Value>>, connector_wallets_details_optional: Option<api_models::admin::ConnectorWalletDetails>, ) -> RouterResult<Option<api_models::admin::ConnectorWalletDetails>> { let apple_pay_metadata_optional = get_applepay_metadata(connector_metadata) .map_err(|error| { logger::error!( "Apple Pay metadata parsing failed in get_encrypted_connector_wallets_details_with_apple_pay_certificates {:?}", error ); }) .ok(); <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="5382" end="5510"> pub async fn get_apple_pay_retryable_connectors<F, D>( state: &SessionState, merchant_account: &domain::MerchantAccount, payment_data: &D, key_store: &domain::MerchantKeyStore, pre_routing_connector_data_list: &[api::ConnectorData], merchant_connector_id: Option<&id_type::MerchantConnectorAccountId>, business_profile: domain::Profile, ) -> CustomResult<Option<Vec<api::ConnectorData>>, errors::ApiErrorResponse> where F: Send + Clone, D: payments::OperationSessionGetters<F> + Send, { let profile_id = business_profile.get_id(); let pre_decided_connector_data_first = pre_routing_connector_data_list .first() .ok_or(errors::ApiErrorResponse::IncorrectPaymentMethodConfiguration)?; let merchant_connector_account_type = get_merchant_connector_account( state, merchant_account.get_id(), payment_data.get_creds_identifier(), key_store, profile_id, &pre_decided_connector_data_first.connector_name.to_string(), merchant_connector_id, ) .await?; let connector_data_list = if is_apple_pay_simplified_flow( merchant_connector_account_type.get_metadata(), merchant_connector_account_type .get_connector_name() .as_ref(), )? { let merchant_connector_account_list = state .store .find_merchant_connector_account_by_merchant_id_and_disabled_list( &state.into(), merchant_account.get_id(), false, key_store, ) .await .to_not_found_response(errors::ApiErrorResponse::InternalServerError)?; let profile_specific_merchant_connector_account_list = merchant_connector_account_list .filter_based_on_profile_and_connector_type( profile_id, ConnectorType::PaymentProcessor, ); let mut connector_data_list = vec![pre_decided_connector_data_first.clone()]; for merchant_connector_account in profile_specific_merchant_connector_account_list { if is_apple_pay_simplified_flow( merchant_connector_account.metadata.clone(), Some(&merchant_connector_account.connector_name), )? { let connector_data = api::ConnectorData::get_connector_by_name( &state.conf.connectors, &merchant_connector_account.connector_name.to_string(), api::GetToken::Connector, Some(merchant_connector_account.get_id()), ) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Invalid connector name received")?; if !connector_data_list.iter().any(|connector_details| { connector_details.merchant_connector_id == connector_data.merchant_connector_id }) { connector_data_list.push(connector_data) } } } #[cfg(feature = "v1")] let fallback_connetors_list = crate::core::routing::helpers::get_merchant_default_config( &*state.clone().store, profile_id.get_string_repr(), &api_enums::TransactionType::Payment, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to get merchant default fallback connectors config")?; #[cfg(feature = "v2")] let fallback_connetors_list = core_admin::ProfileWrapper::new(business_profile) .get_default_fallback_list_of_connector_under_profile() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to get merchant default fallback connectors config")?; let mut routing_connector_data_list = Vec::new(); pre_routing_connector_data_list.iter().for_each(|pre_val| { routing_connector_data_list.push(pre_val.merchant_connector_id.clone()) }); fallback_connetors_list.iter().for_each(|fallback_val| { routing_connector_data_list .iter() .all(|val| *val != fallback_val.merchant_connector_id) .then(|| { routing_connector_data_list.push(fallback_val.merchant_connector_id.clone()) }); }); // connector_data_list is the list of connectors for which Apple Pay simplified flow is configured. // This list is arranged in the same order as the merchant's connectors routingconfiguration. let mut ordered_connector_data_list = Vec::new(); routing_connector_data_list .iter() .for_each(|merchant_connector_id| { let connector_data = connector_data_list.iter().find(|connector_data| { *merchant_connector_id == connector_data.merchant_connector_id }); if let Some(connector_data_details) = connector_data { ordered_connector_data_list.push(connector_data_details.clone()); } }); Some(ordered_connector_data_list) } else { None }; Ok(connector_data_list) } <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="5351" end="5379"> pub fn get_applepay_metadata( connector_metadata: Option<pii::SecretSerdeValue>, ) -> RouterResult<api_models::payments::ApplepaySessionTokenMetadata> { connector_metadata .clone() .parse_value::<api_models::payments::ApplepayCombinedSessionTokenData>( "ApplepayCombinedSessionTokenData", ) .map(|combined_metadata| { api_models::payments::ApplepaySessionTokenMetadata::ApplePayCombined( combined_metadata.apple_pay_combined, ) }) .or_else(|_| { connector_metadata .parse_value::<api_models::payments::ApplepaySessionTokenData>( "ApplepaySessionTokenData", ) .map(|old_metadata| { api_models::payments::ApplepaySessionTokenMetadata::ApplePay( old_metadata.apple_pay, ) }) }) .change_context(errors::ApiErrorResponse::InvalidDataFormat { field_name: "connector_metadata".to_string(), expected_format: "applepay_metadata_format".to_string(), }) } <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="5261" end="5281"> async fn get_apple_pay_metadata_if_needed( connector_metadata: &Option<masking::Secret<tera::Value>>, connector_wallets_details_optional: &Option<api_models::admin::ConnectorWalletDetails>, ) -> RouterResult<Option<api_models::admin::ConnectorWalletDetails>> { if let Some(connector_wallets_details) = connector_wallets_details_optional { if connector_wallets_details.apple_pay_combined.is_some() || connector_wallets_details.apple_pay.is_some() { return Ok(Some(connector_wallets_details.clone())); } // Otherwise, merge Apple Pay metadata return get_and_merge_apple_pay_metadata( connector_metadata.clone(), Some(connector_wallets_details.clone()), ) .await; } // If connector_wallets_details_optional is None, attempt to get Apple Pay metadata get_and_merge_apple_pay_metadata(connector_metadata.clone(), None).await } <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="5241" end="5259"> pub async fn get_connector_wallets_details_with_apple_pay_certificates( connector_metadata: &Option<masking::Secret<tera::Value>>, connector_wallets_details_optional: &Option<api_models::admin::ConnectorWalletDetails>, ) -> RouterResult<Option<masking::Secret<serde_json::Value>>> { let connector_wallet_details_with_apple_pay_metadata_optional = get_apple_pay_metadata_if_needed(connector_metadata, connector_wallets_details_optional) .await?; let connector_wallets_details = connector_wallet_details_with_apple_pay_metadata_optional .map(|details| { serde_json::to_value(details) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to serialize Apple Pay metadata as JSON") }) .transpose()? .map(masking::Secret::new); Ok(connector_wallets_details) } <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="5783" end="5814"> pub fn new( root_keys: masking::Secret<String>, recipient_id: masking::Secret<String>, private_key: masking::Secret<String>, ) -> CustomResult<Self, errors::GooglePayDecryptionError> { // base64 decode the private key let decoded_key = BASE64_ENGINE .decode(private_key.expose()) .change_context(errors::GooglePayDecryptionError::Base64DecodingFailed)?; // base64 decode the root signing keys let decoded_root_signing_keys = BASE64_ENGINE .decode(root_keys.expose()) .change_context(errors::GooglePayDecryptionError::Base64DecodingFailed)?; // create a private key from the decoded key let private_key = PKey::private_key_from_pkcs8(&decoded_key) .change_context(errors::GooglePayDecryptionError::KeyDeserializationFailed) .attach_printable("cannot convert private key from decode_key")?; // parse the root signing keys let root_keys_vector: Vec<GooglePayRootSigningKey> = decoded_root_signing_keys .parse_struct("GooglePayRootSigningKey") .change_context(errors::GooglePayDecryptionError::DeserializationFailed)?; // parse and filter the root signing keys by protocol version let filtered_root_signing_keys = filter_root_signing_keys(root_keys_vector)?; Ok(Self { root_signing_keys: filtered_root_signing_keys, recipient_id, private_key, }) } <file_sep path="hyperswitch/crates/router/src/connector/utils.rs" role="context" start="1750" end="1752"> pub trait ApplePay { fn get_applepay_decoded_payment_data(&self) -> Result<Secret<String>, Error>; }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/payments/helpers.rs<|crate|> router anchor=get_domain_address kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="325" end="394"> pub async fn get_domain_address( session_state: &SessionState, address: &api_models::payments::Address, merchant_id: &id_type::MerchantId, key: &[u8], storage_scheme: enums::MerchantStorageScheme, ) -> CustomResult<domain::Address, common_utils::errors::CryptoError> { async { let address_details = &address.address.as_ref(); let encrypted_data = types::crypto_operation( &session_state.into(), type_name!(domain::Address), types::CryptoOperation::BatchEncrypt( domain::FromRequestEncryptableAddress::to_encryptable( domain::FromRequestEncryptableAddress { line1: address.address.as_ref().and_then(|a| a.line1.clone()), line2: address.address.as_ref().and_then(|a| a.line2.clone()), line3: address.address.as_ref().and_then(|a| a.line3.clone()), state: address.address.as_ref().and_then(|a| a.state.clone()), first_name: address.address.as_ref().and_then(|a| a.first_name.clone()), last_name: address.address.as_ref().and_then(|a| a.last_name.clone()), zip: address.address.as_ref().and_then(|a| a.zip.clone()), phone_number: address .phone .as_ref() .and_then(|phone| phone.number.clone()), email: address .email .as_ref() .map(|a| a.clone().expose().switch_strategy()), }, ), ), Identifier::Merchant(merchant_id.to_owned()), key, ) .await .and_then(|val| val.try_into_batchoperation())?; let encryptable_address = domain::FromRequestEncryptableAddress::from_encryptable(encrypted_data) .change_context(common_utils::errors::CryptoError::EncodingFailed)?; Ok(domain::Address { phone_number: encryptable_address.phone_number, country_code: address.phone.as_ref().and_then(|a| a.country_code.clone()), merchant_id: merchant_id.to_owned(), address_id: generate_id(consts::ID_LENGTH, "add"), city: address_details.and_then(|address_details| address_details.city.clone()), country: address_details.and_then(|address_details| address_details.country), line1: encryptable_address.line1, line2: encryptable_address.line2, line3: encryptable_address.line3, state: encryptable_address.state, created_at: common_utils::date_time::now(), first_name: encryptable_address.first_name, last_name: encryptable_address.last_name, modified_at: common_utils::date_time::now(), zip: encryptable_address.zip, updated_by: storage_scheme.to_string(), email: encryptable_address.email.map(|email| { let encryptable: Encryptable<masking::Secret<String, pii::EmailStrategy>> = Encryptable::new( email.clone().into_inner().switch_strategy(), email.into_encrypted(), ); encryptable }), }) } .await } <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="324" end="324"> ) .await .map(|payment_address| payment_address.address) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed while inserting new address")?, ) } None => None, }, }) } pub async fn get_domain_address( session_state: &SessionState, address: &api_models::payments::Address, merchant_id: &id_type::MerchantId, key: &[u8], storage_scheme: enums::MerchantStorageScheme, ) -> CustomResult<domain::Address, common_utils::errors::CryptoError> { async { let address_details = &address.address.as_ref(); let encrypted_data = types::crypto_operation( &session_state.into(), type_name!(domain::Address), types::CryptoOperation::BatchEncrypt( <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="428" end="715"> pub async fn get_token_pm_type_mandate_details( state: &SessionState, request: &api::PaymentsRequest, mandate_type: Option<api::MandateTransactionType>, merchant_account: &domain::MerchantAccount, merchant_key_store: &domain::MerchantKeyStore, payment_method_id: Option<String>, payment_intent_customer_id: Option<&id_type::CustomerId>, ) -> RouterResult<MandateGenericData> { let mandate_data = request.mandate_data.clone().map(MandateData::foreign_from); let ( payment_token, payment_method, payment_method_type, mandate_data, recurring_payment_data, mandate_connector_details, payment_method_info, ) = match mandate_type { Some(api::MandateTransactionType::NewMandateTransaction) => ( request.payment_token.to_owned(), request.payment_method, request.payment_method_type, mandate_data.clone(), None, None, None, ), Some(api::MandateTransactionType::RecurringMandateTransaction) => { match &request.recurring_details { Some(recurring_details) => { match recurring_details { RecurringDetails::NetworkTransactionIdAndCardDetails(_) => { (None, request.payment_method, None, None, None, None, None) } RecurringDetails::ProcessorPaymentToken(processor_payment_token) => { if let Some(mca_id) = &processor_payment_token.merchant_connector_id { let db = &*state.store; let key_manager_state = &state.into(); #[cfg(feature = "v1")] let connector_name = db .find_by_merchant_connector_account_merchant_id_merchant_connector_id( key_manager_state, merchant_account.get_id(), mca_id, merchant_key_store, ) .await .to_not_found_response(errors::ApiErrorResponse::MerchantConnectorAccountNotFound { id: mca_id.clone().get_string_repr().to_string(), })?.connector_name; #[cfg(feature = "v2")] let connector_name = db .find_merchant_connector_account_by_id(key_manager_state, mca_id, merchant_key_store) .await .to_not_found_response(errors::ApiErrorResponse::MerchantConnectorAccountNotFound { id: mca_id.clone().get_string_repr().to_string(), })?.connector_name; ( None, request.payment_method, None, None, None, Some(payments::MandateConnectorDetails { connector: connector_name, merchant_connector_id: Some(mca_id.clone()), }), None, ) } else { (None, request.payment_method, None, None, None, None, None) } } RecurringDetails::MandateId(mandate_id) => { let mandate_generic_data = Box::pin(get_token_for_recurring_mandate( state, request, merchant_account, merchant_key_store, mandate_id.to_owned(), )) .await?; ( mandate_generic_data.token, mandate_generic_data.payment_method, mandate_generic_data .payment_method_type .or(request.payment_method_type), None, mandate_generic_data.recurring_mandate_payment_data, mandate_generic_data.mandate_connector, mandate_generic_data.payment_method_info, ) } RecurringDetails::PaymentMethodId(payment_method_id) => { let payment_method_info = state .store .find_payment_method( &(state.into()), merchant_key_store, payment_method_id, merchant_account.storage_scheme, ) .await .to_not_found_response( errors::ApiErrorResponse::PaymentMethodNotFound, )?; let customer_id = request .get_customer_id() .get_required_value("customer_id")?; verify_mandate_details_for_recurring_payments( &payment_method_info.merchant_id, merchant_account.get_id(), &payment_method_info.customer_id, customer_id, )?; ( None, payment_method_info.get_payment_method_type(), payment_method_info.get_payment_method_subtype(), None, None, None, Some(payment_method_info), ) } } } None => { if let Some(mandate_id) = request.mandate_id.clone() { let mandate_generic_data = Box::pin(get_token_for_recurring_mandate( state, request, merchant_account, merchant_key_store, mandate_id, )) .await?; ( mandate_generic_data.token, mandate_generic_data.payment_method, mandate_generic_data .payment_method_type .or(request.payment_method_type), None, mandate_generic_data.recurring_mandate_payment_data, mandate_generic_data.mandate_connector, mandate_generic_data.payment_method_info, ) } else if request .payment_method_type .map(|payment_method_type_value| { payment_method_type_value .should_check_for_customer_saved_payment_method_type() }) .unwrap_or(false) { let payment_request_customer_id = request.get_customer_id(); if let Some(customer_id) = payment_request_customer_id.or(payment_intent_customer_id) { let customer_saved_pm_option = match state .store .find_payment_method_by_customer_id_merchant_id_list( &(state.into()), merchant_key_store, customer_id, merchant_account.get_id(), None, ) .await { Ok(customer_payment_methods) => Ok(customer_payment_methods .iter() .find(|payment_method| { payment_method.get_payment_method_subtype() == request.payment_method_type }) .cloned()), Err(error) => { if error.current_context().is_db_not_found() { Ok(None) } else { Err(error) .change_context( errors::ApiErrorResponse::InternalServerError, ) .attach_printable( "failed to find payment methods for a customer", ) } } }?; ( None, request.payment_method, request.payment_method_type, None, None, None, customer_saved_pm_option, ) } else { ( None, request.payment_method, request.payment_method_type, None, None, None, None, ) } } else { let payment_method_info = payment_method_id .async_map(|payment_method_id| async move { state .store .find_payment_method( &(state.into()), merchant_key_store, &payment_method_id, merchant_account.storage_scheme, ) .await .to_not_found_response( errors::ApiErrorResponse::PaymentMethodNotFound, ) }) .await .transpose()?; ( request.payment_token.to_owned(), request.payment_method, request.payment_method_type, None, None, None, payment_method_info, ) } } } } None => { let payment_method_info = payment_method_id .async_map(|payment_method_id| async move { state .store .find_payment_method( &(state.into()), merchant_key_store, &payment_method_id, merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::PaymentMethodNotFound) }) .await .transpose()?; ( request.payment_token.to_owned(), request.payment_method, request.payment_method_type, mandate_data, None, None, payment_method_info, ) } }; Ok(MandateGenericData { token: payment_token, payment_method, payment_method_type, mandate_data, recurring_mandate_payment_data: recurring_payment_data, mandate_connector: mandate_connector_details, payment_method_info, }) } <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="396" end="422"> pub async fn get_address_by_id( state: &SessionState, address_id: Option<String>, merchant_key_store: &domain::MerchantKeyStore, payment_id: &id_type::PaymentId, merchant_id: &id_type::MerchantId, storage_scheme: storage_enums::MerchantStorageScheme, ) -> CustomResult<Option<domain::Address>, errors::ApiErrorResponse> { match address_id { None => Ok(None), Some(address_id) => { let db = &*state.store; Ok(db .find_address_by_merchant_id_payment_id_address_id( &state.into(), merchant_id, payment_id, &address_id, merchant_key_store, storage_scheme, ) .await .map(|payment_address| payment_address.address) .ok()) } } } <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="264" end="323"> pub async fn create_or_find_address_for_payment_by_request( state: &SessionState, req_address: Option<&api::Address>, address_id: Option<&str>, merchant_id: &id_type::MerchantId, customer_id: Option<&id_type::CustomerId>, merchant_key_store: &domain::MerchantKeyStore, payment_id: &id_type::PaymentId, storage_scheme: storage_enums::MerchantStorageScheme, ) -> CustomResult<Option<domain::Address>, errors::ApiErrorResponse> { let key = merchant_key_store.key.get_inner().peek(); let db = &state.store; let key_manager_state = &state.into(); Ok(match address_id { Some(id) => Some( db.find_address_by_merchant_id_payment_id_address_id( key_manager_state, merchant_id, payment_id, id, merchant_key_store, storage_scheme, ) .await .map(|payment_address| payment_address.address), ) .transpose() .to_not_found_response(errors::ApiErrorResponse::AddressNotFound)?, None => match req_address { Some(address) => { // generate a new address here let address = get_domain_address(state, address, merchant_id, key, storage_scheme) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed while encrypting address while insert")?; let payment_address = domain::PaymentAddress { address, payment_id: payment_id.clone(), customer_id: customer_id.cloned(), }; Some( db.insert_address_for_payments( key_manager_state, payment_id, payment_address, merchant_key_store, storage_scheme, ) .await .map(|payment_address| payment_address.address) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed while inserting new address")?, ) } None => None, }, }) } <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="102" end="260"> pub async fn create_or_update_address_for_payment_by_request( session_state: &SessionState, req_address: Option<&api::Address>, address_id: Option<&str>, merchant_id: &id_type::MerchantId, customer_id: Option<&id_type::CustomerId>, merchant_key_store: &domain::MerchantKeyStore, payment_id: &id_type::PaymentId, storage_scheme: storage_enums::MerchantStorageScheme, ) -> CustomResult<Option<domain::Address>, errors::ApiErrorResponse> { let key = merchant_key_store.key.get_inner().peek(); let db = &session_state.store; let key_manager_state = &session_state.into(); Ok(match address_id { Some(id) => match req_address { Some(address) => { let encrypted_data = types::crypto_operation( &session_state.into(), type_name!(domain::Address), types::CryptoOperation::BatchEncrypt( domain::FromRequestEncryptableAddress::to_encryptable( domain::FromRequestEncryptableAddress { line1: address.address.as_ref().and_then(|a| a.line1.clone()), line2: address.address.as_ref().and_then(|a| a.line2.clone()), line3: address.address.as_ref().and_then(|a| a.line3.clone()), state: address.address.as_ref().and_then(|a| a.state.clone()), first_name: address .address .as_ref() .and_then(|a| a.first_name.clone()), last_name: address .address .as_ref() .and_then(|a| a.last_name.clone()), zip: address.address.as_ref().and_then(|a| a.zip.clone()), phone_number: address .phone .as_ref() .and_then(|phone| phone.number.clone()), email: address .email .as_ref() .map(|a| a.clone().expose().switch_strategy()), }, ), ), Identifier::Merchant(merchant_key_store.merchant_id.clone()), key, ) .await .and_then(|val| val.try_into_batchoperation()) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed while encrypting address")?; let encryptable_address = domain::FromRequestEncryptableAddress::from_encryptable(encrypted_data) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed while encrypting address")?; let address_update = storage::AddressUpdate::Update { city: address .address .as_ref() .and_then(|value| value.city.clone()), country: address.address.as_ref().and_then(|value| value.country), line1: encryptable_address.line1, line2: encryptable_address.line2, line3: encryptable_address.line3, state: encryptable_address.state, zip: encryptable_address.zip, first_name: encryptable_address.first_name, last_name: encryptable_address.last_name, phone_number: encryptable_address.phone_number, country_code: address .phone .as_ref() .and_then(|value| value.country_code.clone()), updated_by: storage_scheme.to_string(), email: encryptable_address.email.map(|email| { let encryptable: Encryptable<masking::Secret<String, pii::EmailStrategy>> = Encryptable::new( email.clone().into_inner().switch_strategy(), email.into_encrypted(), ); encryptable }), }; let address = db .find_address_by_merchant_id_payment_id_address_id( key_manager_state, merchant_id, payment_id, id, merchant_key_store, storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error while fetching address")?; Some( db.update_address_for_payments( key_manager_state, address, address_update, payment_id.to_owned(), merchant_key_store, storage_scheme, ) .await .map(|payment_address| payment_address.address) .to_not_found_response(errors::ApiErrorResponse::AddressNotFound)?, ) } None => Some( db.find_address_by_merchant_id_payment_id_address_id( key_manager_state, merchant_id, payment_id, id, merchant_key_store, storage_scheme, ) .await .map(|payment_address| payment_address.address), ) .transpose() .to_not_found_response(errors::ApiErrorResponse::AddressNotFound)?, }, None => match req_address { Some(address) => { let address = get_domain_address(session_state, address, merchant_id, key, storage_scheme) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed while encrypting address while insert")?; let payment_address = domain::PaymentAddress { address, payment_id: payment_id.clone(), customer_id: customer_id.cloned(), }; Some( db.insert_address_for_payments( key_manager_state, payment_id, payment_address, merchant_key_store, storage_scheme, ) .await .map(|payment_address| payment_address.address) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed while inserting new address")?, ) } None => None, }, }) } <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="5783" end="5814"> pub fn new( root_keys: masking::Secret<String>, recipient_id: masking::Secret<String>, private_key: masking::Secret<String>, ) -> CustomResult<Self, errors::GooglePayDecryptionError> { // base64 decode the private key let decoded_key = BASE64_ENGINE .decode(private_key.expose()) .change_context(errors::GooglePayDecryptionError::Base64DecodingFailed)?; // base64 decode the root signing keys let decoded_root_signing_keys = BASE64_ENGINE .decode(root_keys.expose()) .change_context(errors::GooglePayDecryptionError::Base64DecodingFailed)?; // create a private key from the decoded key let private_key = PKey::private_key_from_pkcs8(&decoded_key) .change_context(errors::GooglePayDecryptionError::KeyDeserializationFailed) .attach_printable("cannot convert private key from decode_key")?; // parse the root signing keys let root_keys_vector: Vec<GooglePayRootSigningKey> = decoded_root_signing_keys .parse_struct("GooglePayRootSigningKey") .change_context(errors::GooglePayDecryptionError::DeserializationFailed)?; // parse and filter the root signing keys by protocol version let filtered_root_signing_keys = filter_root_signing_keys(root_keys_vector)?; Ok(Self { root_signing_keys: filtered_root_signing_keys, recipient_id, private_key, }) } <file_sep path="hyperswitch/crates/router/tests/macros.rs" role="context" start="17" end="21"> struct Address { line1: String, zip: String, city: String, } <file_sep path="hyperswitch/migrations/2025-02-06-111828_drop_int_id_column_accross_database/up.sql" role="context" start="20" end="36"> ------------------------ Payment Attempt ----------------------- ALTER TABLE payment_attempt DROP COLUMN id; ------------------------ Payment Methods ----------------------- ALTER TABLE payment_methods DROP COLUMN IF EXISTS id; ------------------------ Address ----------------------- ALTER TABLE address DROP COLUMN IF EXISTS id; ------------------------ Dispute ----------------------- ALTER TABLE dispute DROP COLUMN IF EXISTS id; ------------------------ Mandate ----------------------- ALTER TABLE mandate DROP COLUMN IF EXISTS id; ------------------------ Refund ----------------------- <file_sep path="hyperswitch/crates/api_models/src/payments.rs" role="context" start="4244" end="4252"> pub struct Address { /// Provide the address details pub address: Option<AddressDetails>, pub phone: Option<PhoneDetails>, #[schema(value_type = Option<String>)] pub email: Option<Email>, }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/payouts.rs<|crate|> router anchor=payouts_fulfill_core kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="678" end="768"> pub async fn payouts_fulfill_core( state: SessionState, merchant_account: domain::MerchantAccount, key_store: domain::MerchantKeyStore, req: payouts::PayoutActionRequest, ) -> RouterResponse<payouts::PayoutCreateResponse> { let mut payout_data = make_payout_data( &state, &merchant_account, None, &key_store, &payouts::PayoutRequest::PayoutActionRequest(req.to_owned()), &state.locale, ) .await?; let payout_attempt = payout_data.payout_attempt.to_owned(); let status = payout_attempt.status; // Verify if fulfillment can be triggered if helpers::is_payout_terminal_state(status) || status != api_enums::PayoutStatus::RequiresFulfillment { return Err(report!(errors::ApiErrorResponse::InvalidRequestData { message: format!( "Payout {} cannot be fulfilled for status {}", payout_attempt.payout_id, status ), })); } // Form connector data let connector_data = match &payout_attempt.connector { Some(connector) => api::ConnectorData::get_payout_connector_by_name( &state.conf.connectors, connector, api::GetToken::Connector, payout_attempt.merchant_connector_id.clone(), ) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to get the connector data")?, _ => Err(errors::ApplicationError::InvalidConfigurationValueError( "Connector not found in payout_attempt - should not reach here.".to_string(), )) .change_context(errors::ApiErrorResponse::MissingRequiredField { field_name: "connector", }) .attach_printable("Connector not found for payout fulfillment")?, }; // Trigger fulfillment let customer_id = payout_data .payouts .customer_id .clone() .get_required_value("customer_id")?; payout_data.payout_method_data = Some( helpers::make_payout_method_data( &state, None, payout_attempt.payout_token.as_deref(), &customer_id, &payout_attempt.merchant_id, payout_data.payouts.payout_type, &key_store, Some(&mut payout_data), merchant_account.storage_scheme, ) .await? .get_required_value("payout_method_data")?, ); Box::pin(fulfill_payout( &state, &merchant_account, &key_store, &connector_data, &mut payout_data, )) .await .attach_printable("Payout fulfillment failed for given Payout request")?; if helpers::is_payout_err_state(status) { return Err(report!(errors::ApiErrorResponse::PayoutFailed { data: Some( serde_json::json!({"payout_status": status.to_string(), "error_message": payout_attempt.error_message, "error_code": payout_attempt.error_code}) ), })); } response_handler(&state, &merchant_account, &payout_data).await } <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="677" end="677"> use api_models::{self, enums as api_enums, payouts::PayoutLinkResponse}; use error_stack::{report, ResultExt}; use serde_json; use crate::types::domain::behaviour::Conversion; use crate::{ core::{ errors::{ self, ConnectorErrorExt, CustomResult, RouterResponse, RouterResult, StorageErrorExt, }, payments::{self, customers, helpers as payment_helpers}, utils as core_utils, }, db::StorageInterface, routes::SessionState, services, types::{ self, api::{self, payments as payment_api_types, payouts}, domain, storage::{self, PaymentRoutingInfo}, transformers::ForeignFrom, }, utils::{self, OptionExt}, }; <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="786" end="903"> pub async fn payouts_list_core( state: SessionState, merchant_account: domain::MerchantAccount, profile_id_list: Option<Vec<common_utils::id_type::ProfileId>>, key_store: domain::MerchantKeyStore, constraints: payouts::PayoutListConstraints, ) -> RouterResponse<payouts::PayoutListResponse> { validator::validate_payout_list_request(&constraints)?; let merchant_id = merchant_account.get_id(); let db = state.store.as_ref(); let payouts = helpers::filter_by_constraints( db, &constraints, merchant_id, merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::PayoutNotFound)?; let payouts = core_utils::filter_objects_based_on_profile_id_list(profile_id_list, payouts); let mut pi_pa_tuple_vec = PayoutActionData::new(); for payout in payouts { match db .find_payout_attempt_by_merchant_id_payout_attempt_id( merchant_id, &utils::get_payout_attempt_id(payout.payout_id.clone(), payout.attempt_count), storage_enums::MerchantStorageScheme::PostgresOnly, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) { Ok(payout_attempt) => { let domain_customer = match payout.customer_id.clone() { #[cfg(all(any(feature = "v1", feature = "v2"), not(feature = "customer_v2")))] Some(customer_id) => db .find_customer_by_customer_id_merchant_id( &(&state).into(), &customer_id, merchant_id, &key_store, merchant_account.storage_scheme, ) .await .map_err(|err| { let err_msg = format!( "failed while fetching customer for customer_id - {:?}", customer_id ); logger::warn!(?err, err_msg); }) .ok(), _ => None, }; let payout_id_as_payment_id_type = common_utils::id_type::PaymentId::wrap(payout.payout_id.clone()) .change_context(errors::ApiErrorResponse::InvalidRequestData { message: "payout_id contains invalid data".to_string(), }) .attach_printable("Error converting payout_id to PaymentId type")?; let payment_addr = payment_helpers::create_or_find_address_for_payment_by_request( &state, None, payout.address_id.as_deref(), merchant_id, payout.customer_id.as_ref(), &key_store, &payout_id_as_payment_id_type, merchant_account.storage_scheme, ) .await .transpose() .and_then(|addr| { addr.map_err(|err| { let err_msg = format!( "billing_address missing for address_id : {:?}", payout.address_id ); logger::warn!(?err, err_msg); }) .ok() .as_ref() .map(hyperswitch_domain_models::address::Address::from) .map(payment_enums::Address::from) }); pi_pa_tuple_vec.push(( payout.to_owned(), payout_attempt.to_owned(), domain_customer, payment_addr, )); } Err(err) => { let err_msg = format!( "failed while fetching payout_attempt for payout_id - {:?}", payout.payout_id ); logger::warn!(?err, err_msg); } } } let data: Vec<api::PayoutCreateResponse> = pi_pa_tuple_vec .into_iter() .map(ForeignFrom::foreign_from) .collect(); Ok(services::ApplicationResponse::Json( api::PayoutListResponse { size: data.len(), data, total_count: None, }, )) } <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="771" end="779"> pub async fn payouts_list_core( _state: SessionState, _merchant_account: domain::MerchantAccount, _profile_id_list: Option<Vec<common_utils::id_type::ProfileId>>, _key_store: domain::MerchantKeyStore, _constraints: payouts::PayoutListConstraints, ) -> RouterResponse<payouts::PayoutListResponse> { todo!() } <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="585" end="675"> pub async fn payouts_cancel_core( state: SessionState, merchant_account: domain::MerchantAccount, key_store: domain::MerchantKeyStore, req: payouts::PayoutActionRequest, ) -> RouterResponse<payouts::PayoutCreateResponse> { let mut payout_data = make_payout_data( &state, &merchant_account, None, &key_store, &payouts::PayoutRequest::PayoutActionRequest(req.to_owned()), &state.locale, ) .await?; let payout_attempt = payout_data.payout_attempt.to_owned(); let status = payout_attempt.status; // Verify if cancellation can be triggered if helpers::is_payout_terminal_state(status) { return Err(report!(errors::ApiErrorResponse::InvalidRequestData { message: format!( "Payout {} cannot be cancelled for status {}", payout_attempt.payout_id, status ), })); // Make local cancellation } else if helpers::is_eligible_for_local_payout_cancellation(status) { let status = storage_enums::PayoutStatus::Cancelled; let updated_payout_attempt = storage::PayoutAttemptUpdate::StatusUpdate { connector_payout_id: payout_attempt.connector_payout_id.to_owned(), status, error_message: Some("Cancelled by user".to_string()), error_code: None, is_eligible: None, unified_code: None, unified_message: None, }; payout_data.payout_attempt = state .store .update_payout_attempt( &payout_attempt, updated_payout_attempt, &payout_data.payouts, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error updating payout_attempt in db")?; payout_data.payouts = state .store .update_payout( &payout_data.payouts, storage::PayoutsUpdate::StatusUpdate { status }, &payout_data.payout_attempt, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error updating payouts in db")?; // Trigger connector's cancellation } else { // Form connector data let connector_data = match &payout_attempt.connector { Some(connector) => api::ConnectorData::get_payout_connector_by_name( &state.conf.connectors, connector, api::GetToken::Connector, payout_attempt.merchant_connector_id.clone(), ) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to get the connector data")?, _ => Err(errors::ApplicationError::InvalidConfigurationValueError( "Connector not found in payout_attempt - should not reach here".to_string(), )) .change_context(errors::ApiErrorResponse::MissingRequiredField { field_name: "connector", }) .attach_printable("Connector not found for payout cancellation")?, }; cancel_payout(&state, &merchant_account, &connector_data, &mut payout_data) .await .attach_printable("Payout cancellation failed for given Payout request")?; } response_handler(&state, &merchant_account, &payout_data).await } <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="540" end="582"> pub async fn payouts_retrieve_core( state: SessionState, merchant_account: domain::MerchantAccount, profile_id: Option<common_utils::id_type::ProfileId>, key_store: domain::MerchantKeyStore, req: payouts::PayoutRetrieveRequest, ) -> RouterResponse<payouts::PayoutCreateResponse> { let mut payout_data = make_payout_data( &state, &merchant_account, profile_id, &key_store, &payouts::PayoutRequest::PayoutRetrieveRequest(req.to_owned()), &state.locale, ) .await?; let payout_attempt = payout_data.payout_attempt.to_owned(); let status = payout_attempt.status; if matches!(req.force_sync, Some(true)) && helpers::should_call_retrieve(status) { // Form connector data let connector_call_type = get_connector_choice( &state, &merchant_account, &key_store, payout_attempt.connector.clone(), None, &mut payout_data, None, ) .await?; complete_payout_retrieve( &state, &merchant_account, connector_call_type, &mut payout_data, ) .await?; } response_handler(&state, &merchant_account, &payout_data).await } <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="2531" end="2628"> pub async fn response_handler( state: &SessionState, merchant_account: &domain::MerchantAccount, payout_data: &PayoutData, ) -> RouterResponse<payouts::PayoutCreateResponse> { let payout_attempt = payout_data.payout_attempt.to_owned(); let payouts = payout_data.payouts.to_owned(); let payout_method_id: Option<String> = payout_data.payment_method.as_ref().map(|pm| { #[cfg(all( any(feature = "v1", feature = "v2"), not(feature = "payment_methods_v2") ))] { pm.payment_method_id.clone() } #[cfg(all(feature = "v2", feature = "payment_methods_v2"))] { pm.id.clone().get_string_repr().to_string() } }); let payout_link = payout_data.payout_link.to_owned(); let billing_address = payout_data.billing_address.to_owned(); let customer_details = payout_data.customer_details.to_owned(); let customer_id = payouts.customer_id; let billing = billing_address .as_ref() .map(hyperswitch_domain_models::address::Address::from) .map(From::from); let translated_unified_message = helpers::get_translated_unified_code_and_message( state, payout_attempt.unified_code.as_ref(), payout_attempt.unified_message.as_ref(), &payout_data.current_locale, ) .await?; let additional_payout_method_data = payout_attempt.additional_payout_method_data.clone(); let payout_method_data = additional_payout_method_data.map(payouts::PayoutMethodDataResponse::from); let response = api::PayoutCreateResponse { payout_id: payouts.payout_id.to_owned(), merchant_id: merchant_account.get_id().to_owned(), amount: payouts.amount, currency: payouts.destination_currency.to_owned(), connector: payout_attempt.connector, payout_type: payouts.payout_type.to_owned(), payout_method_data, billing, auto_fulfill: payouts.auto_fulfill, customer_id, email: customer_details.as_ref().and_then(|c| c.email.clone()), name: customer_details.as_ref().and_then(|c| c.name.clone()), phone: customer_details.as_ref().and_then(|c| c.phone.clone()), phone_country_code: customer_details .as_ref() .and_then(|c| c.phone_country_code.clone()), customer: customer_details .as_ref() .map(payment_api_types::CustomerDetailsResponse::foreign_from), client_secret: payouts.client_secret.to_owned(), return_url: payouts.return_url.to_owned(), business_country: payout_attempt.business_country, business_label: payout_attempt.business_label, description: payouts.description.to_owned(), entity_type: payouts.entity_type.to_owned(), recurring: payouts.recurring, metadata: payouts.metadata, merchant_connector_id: payout_attempt.merchant_connector_id.to_owned(), status: payout_attempt.status.to_owned(), error_message: payout_attempt.error_message.to_owned(), error_code: payout_attempt.error_code, profile_id: payout_attempt.profile_id, created: Some(payouts.created_at), connector_transaction_id: payout_attempt.connector_payout_id, priority: payouts.priority, attempts: None, unified_code: payout_attempt.unified_code, unified_message: translated_unified_message, payout_link: payout_link .map(|payout_link| { url::Url::parse(payout_link.url.peek()).map(|link| PayoutLinkResponse { payout_link_id: payout_link.link_id, link: link.into(), }) }) .transpose() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to parse payout link's URL")?, payout_method_id, }; Ok(services::ApplicationResponse::Json(response)) } <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="2359" end="2529"> pub async fn fulfill_payout( state: &SessionState, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, connector_data: &api::ConnectorData, payout_data: &mut PayoutData, ) -> RouterResult<()> { // 1. Form Router data let mut router_data = core_utils::construct_payout_router_data( state, connector_data, merchant_account, payout_data, ) .await?; // 2. Get/Create access token access_token::create_access_token( state, connector_data, merchant_account, &mut router_data, payout_data.payouts.payout_type.to_owned(), ) .await?; // 3. Fetch connector integration details let connector_integration: services::BoxedPayoutConnectorIntegrationInterface< api::PoFulfill, types::PayoutsData, types::PayoutsResponseData, > = connector_data.connector.get_connector_integration(); // 4. Call connector service let router_data_resp = services::execute_connector_processing_step( state, connector_integration, &router_data, payments::CallConnectorAction::Trigger, None, ) .await .to_payout_failed_response()?; // 5. Process data returned by the connector let db = &*state.store; match router_data_resp.response { Ok(payout_response_data) => { let status = payout_response_data .status .unwrap_or(payout_data.payout_attempt.status.to_owned()); payout_data.payouts.status = status; let updated_payout_attempt = storage::PayoutAttemptUpdate::StatusUpdate { connector_payout_id: payout_response_data.connector_payout_id, status, error_code: None, error_message: None, is_eligible: payout_response_data.payout_eligible, unified_code: None, unified_message: None, }; payout_data.payout_attempt = db .update_payout_attempt( &payout_data.payout_attempt, updated_payout_attempt, &payout_data.payouts, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error updating payout_attempt in db")?; payout_data.payouts = db .update_payout( &payout_data.payouts, storage::PayoutsUpdate::StatusUpdate { status }, &payout_data.payout_attempt, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error updating payouts in db")?; if helpers::is_payout_err_state(status) { return Err(report!(errors::ApiErrorResponse::PayoutFailed { data: Some( serde_json::json!({"payout_status": status.to_string(), "error_message": payout_data.payout_attempt.error_message.as_ref(), "error_code": payout_data.payout_attempt.error_code.as_ref()}) ), })); } else if payout_data.payouts.recurring && payout_data.payouts.payout_method_id.clone().is_none() { let payout_method_data = payout_data .payout_method_data .clone() .get_required_value("payout_method_data")?; payout_data .payouts .customer_id .clone() .async_map(|customer_id| async move { helpers::save_payout_data_to_locker( state, payout_data, &customer_id, &payout_method_data, None, merchant_account, key_store, ) .await }) .await .transpose() .attach_printable("Failed to save payout data to locker")?; } } Err(err) => { let status = storage_enums::PayoutStatus::Failed; let (error_code, error_message) = (Some(err.code), Some(err.message)); let (unified_code, unified_message) = helpers::get_gsm_record( state, error_code.clone(), error_message.clone(), payout_data.payout_attempt.connector.clone(), consts::PAYOUT_FLOW_STR, ) .await .map_or((None, None), |gsm| (gsm.unified_code, gsm.unified_message)); let updated_payout_attempt = storage::PayoutAttemptUpdate::StatusUpdate { connector_payout_id: payout_data.payout_attempt.connector_payout_id.to_owned(), status, error_code, error_message, is_eligible: None, unified_code: unified_code .map(UnifiedCode::try_from) .transpose() .change_context(errors::ApiErrorResponse::InvalidDataValue { field_name: "unified_code", })?, unified_message: unified_message .map(UnifiedMessage::try_from) .transpose() .change_context(errors::ApiErrorResponse::InvalidDataValue { field_name: "unified_message", })?, }; payout_data.payout_attempt = db .update_payout_attempt( &payout_data.payout_attempt, updated_payout_attempt, &payout_data.payouts, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error updating payout_attempt in db")?; payout_data.payouts = db .update_payout( &payout_data.payouts, storage::PayoutsUpdate::StatusUpdate { status }, &payout_data.payout_attempt, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error updating payouts in db")?; } }; Ok(()) } <file_sep path="hyperswitch/migrations/2024-07-31-063531_alter_customer_id_in_payouts/up.sql" role="context" start="1" end="9"> ALTER TABLE payouts ALTER COLUMN customer_id DROP NOT NULL, ALTER COLUMN address_id DROP NOT NULL; ALTER TABLE payout_attempt ALTER COLUMN customer_id DROP NOT NULL, <file_sep path="hyperswitch/crates/api_models/src/errors/types.rs" role="context" start="86" end="100"> pub enum ApiErrorResponse { Unauthorized(ApiError), ForbiddenCommonResource(ApiError), ForbiddenPrivateResource(ApiError), Conflict(ApiError), Gone(ApiError), Unprocessable(ApiError), InternalServerError(ApiError), NotImplemented(ApiError), ConnectorError(ApiError, #[serde(skip_serializing)] StatusCode), NotFound(ApiError), MethodNotAllowed(ApiError), BadRequest(ApiError), DomainError(ApiError), } <file_sep path="hyperswitch/postman/collection-dir/powertranz/Flow Testcases/Happy Cases/Scenario1-Create payment with confirm true/Payments - Create/event.test.js" role="context" start="61" end="78"> "INFO - Unable to assign variable {{client_secret}}, as jsonData.client_secret is undefined.", ); } // Response body should have value "succeeded" for "status" if (jsonData?.status) { pm.test( "[POST]::/payments - Content check if value for 'status' matches 'succeeded'", function () { pm.expect(jsonData.status).to.eql("succeeded"); }, ); }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/payouts.rs<|crate|> router anchor=payouts_cancel_core kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="585" end="675"> pub async fn payouts_cancel_core( state: SessionState, merchant_account: domain::MerchantAccount, key_store: domain::MerchantKeyStore, req: payouts::PayoutActionRequest, ) -> RouterResponse<payouts::PayoutCreateResponse> { let mut payout_data = make_payout_data( &state, &merchant_account, None, &key_store, &payouts::PayoutRequest::PayoutActionRequest(req.to_owned()), &state.locale, ) .await?; let payout_attempt = payout_data.payout_attempt.to_owned(); let status = payout_attempt.status; // Verify if cancellation can be triggered if helpers::is_payout_terminal_state(status) { return Err(report!(errors::ApiErrorResponse::InvalidRequestData { message: format!( "Payout {} cannot be cancelled for status {}", payout_attempt.payout_id, status ), })); // Make local cancellation } else if helpers::is_eligible_for_local_payout_cancellation(status) { let status = storage_enums::PayoutStatus::Cancelled; let updated_payout_attempt = storage::PayoutAttemptUpdate::StatusUpdate { connector_payout_id: payout_attempt.connector_payout_id.to_owned(), status, error_message: Some("Cancelled by user".to_string()), error_code: None, is_eligible: None, unified_code: None, unified_message: None, }; payout_data.payout_attempt = state .store .update_payout_attempt( &payout_attempt, updated_payout_attempt, &payout_data.payouts, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error updating payout_attempt in db")?; payout_data.payouts = state .store .update_payout( &payout_data.payouts, storage::PayoutsUpdate::StatusUpdate { status }, &payout_data.payout_attempt, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error updating payouts in db")?; // Trigger connector's cancellation } else { // Form connector data let connector_data = match &payout_attempt.connector { Some(connector) => api::ConnectorData::get_payout_connector_by_name( &state.conf.connectors, connector, api::GetToken::Connector, payout_attempt.merchant_connector_id.clone(), ) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to get the connector data")?, _ => Err(errors::ApplicationError::InvalidConfigurationValueError( "Connector not found in payout_attempt - should not reach here".to_string(), )) .change_context(errors::ApiErrorResponse::MissingRequiredField { field_name: "connector", }) .attach_printable("Connector not found for payout cancellation")?, }; cancel_payout(&state, &merchant_account, &connector_data, &mut payout_data) .await .attach_printable("Payout cancellation failed for given Payout request")?; } response_handler(&state, &merchant_account, &payout_data).await } <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="584" end="584"> use api_models::{self, enums as api_enums, payouts::PayoutLinkResponse}; use diesel_models::{ enums as storage_enums, generic_link::{GenericLinkNew, PayoutLink}, CommonMandateReference, PayoutsMandateReference, PayoutsMandateReferenceRecord, }; use error_stack::{report, ResultExt}; use crate::types::domain::behaviour::Conversion; use crate::{ core::{ errors::{ self, ConnectorErrorExt, CustomResult, RouterResponse, RouterResult, StorageErrorExt, }, payments::{self, customers, helpers as payment_helpers}, utils as core_utils, }, db::StorageInterface, routes::SessionState, services, types::{ self, api::{self, payments as payment_api_types, payouts}, domain, storage::{self, PaymentRoutingInfo}, transformers::ForeignFrom, }, utils::{self, OptionExt}, }; <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="771" end="779"> pub async fn payouts_list_core( _state: SessionState, _merchant_account: domain::MerchantAccount, _profile_id_list: Option<Vec<common_utils::id_type::ProfileId>>, _key_store: domain::MerchantKeyStore, _constraints: payouts::PayoutListConstraints, ) -> RouterResponse<payouts::PayoutListResponse> { todo!() } <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="678" end="768"> pub async fn payouts_fulfill_core( state: SessionState, merchant_account: domain::MerchantAccount, key_store: domain::MerchantKeyStore, req: payouts::PayoutActionRequest, ) -> RouterResponse<payouts::PayoutCreateResponse> { let mut payout_data = make_payout_data( &state, &merchant_account, None, &key_store, &payouts::PayoutRequest::PayoutActionRequest(req.to_owned()), &state.locale, ) .await?; let payout_attempt = payout_data.payout_attempt.to_owned(); let status = payout_attempt.status; // Verify if fulfillment can be triggered if helpers::is_payout_terminal_state(status) || status != api_enums::PayoutStatus::RequiresFulfillment { return Err(report!(errors::ApiErrorResponse::InvalidRequestData { message: format!( "Payout {} cannot be fulfilled for status {}", payout_attempt.payout_id, status ), })); } // Form connector data let connector_data = match &payout_attempt.connector { Some(connector) => api::ConnectorData::get_payout_connector_by_name( &state.conf.connectors, connector, api::GetToken::Connector, payout_attempt.merchant_connector_id.clone(), ) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to get the connector data")?, _ => Err(errors::ApplicationError::InvalidConfigurationValueError( "Connector not found in payout_attempt - should not reach here.".to_string(), )) .change_context(errors::ApiErrorResponse::MissingRequiredField { field_name: "connector", }) .attach_printable("Connector not found for payout fulfillment")?, }; // Trigger fulfillment let customer_id = payout_data .payouts .customer_id .clone() .get_required_value("customer_id")?; payout_data.payout_method_data = Some( helpers::make_payout_method_data( &state, None, payout_attempt.payout_token.as_deref(), &customer_id, &payout_attempt.merchant_id, payout_data.payouts.payout_type, &key_store, Some(&mut payout_data), merchant_account.storage_scheme, ) .await? .get_required_value("payout_method_data")?, ); Box::pin(fulfill_payout( &state, &merchant_account, &key_store, &connector_data, &mut payout_data, )) .await .attach_printable("Payout fulfillment failed for given Payout request")?; if helpers::is_payout_err_state(status) { return Err(report!(errors::ApiErrorResponse::PayoutFailed { data: Some( serde_json::json!({"payout_status": status.to_string(), "error_message": payout_attempt.error_message, "error_code": payout_attempt.error_code}) ), })); } response_handler(&state, &merchant_account, &payout_data).await } <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="540" end="582"> pub async fn payouts_retrieve_core( state: SessionState, merchant_account: domain::MerchantAccount, profile_id: Option<common_utils::id_type::ProfileId>, key_store: domain::MerchantKeyStore, req: payouts::PayoutRetrieveRequest, ) -> RouterResponse<payouts::PayoutCreateResponse> { let mut payout_data = make_payout_data( &state, &merchant_account, profile_id, &key_store, &payouts::PayoutRequest::PayoutRetrieveRequest(req.to_owned()), &state.locale, ) .await?; let payout_attempt = payout_data.payout_attempt.to_owned(); let status = payout_attempt.status; if matches!(req.force_sync, Some(true)) && helpers::should_call_retrieve(status) { // Form connector data let connector_call_type = get_connector_choice( &state, &merchant_account, &key_store, payout_attempt.connector.clone(), None, &mut payout_data, None, ) .await?; complete_payout_retrieve( &state, &merchant_account, connector_call_type, &mut payout_data, ) .await?; } response_handler(&state, &merchant_account, &payout_data).await } <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="457" end="536"> pub async fn payouts_update_core( state: SessionState, merchant_account: domain::MerchantAccount, key_store: domain::MerchantKeyStore, req: payouts::PayoutCreateRequest, ) -> RouterResponse<payouts::PayoutCreateResponse> { let payout_id = req.payout_id.clone().get_required_value("payout_id")?; let mut payout_data = make_payout_data( &state, &merchant_account, None, &key_store, &payouts::PayoutRequest::PayoutCreateRequest(Box::new(req.to_owned())), &state.locale, ) .await?; let payout_attempt = payout_data.payout_attempt.to_owned(); let status = payout_attempt.status; // Verify update feasibility if helpers::is_payout_terminal_state(status) || helpers::is_payout_initiated(status) { return Err(report!(errors::ApiErrorResponse::InvalidRequestData { message: format!( "Payout {} cannot be updated for status {}", payout_id, status ), })); } helpers::update_payouts_and_payout_attempt( &mut payout_data, &merchant_account, &req, &state, &key_store, ) .await?; let payout_attempt = payout_data.payout_attempt.to_owned(); if (req.connector.is_none(), payout_attempt.connector.is_some()) != (true, true) { // if the connector is not updated but was provided during payout create payout_data.payout_attempt.connector = None; payout_data.payout_attempt.routing_info = None; }; // Update payout method data in temp locker if req.payout_method_data.is_some() { let customer_id = payout_data .payouts .customer_id .clone() .get_required_value("customer_id when payout_method_data is provided")?; payout_data.payout_method_data = helpers::make_payout_method_data( &state, req.payout_method_data.as_ref(), payout_attempt.payout_token.as_deref(), &customer_id, &payout_attempt.merchant_id, payout_data.payouts.payout_type, &key_store, Some(&mut payout_data), merchant_account.storage_scheme, ) .await?; } if let Some(true) = payout_data.payouts.confirm { payouts_core( &state, &merchant_account, &key_store, &mut payout_data, req.routing.clone(), req.connector.clone(), ) .await?; } response_handler(&state, &merchant_account, &payout_data).await } <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="2531" end="2628"> pub async fn response_handler( state: &SessionState, merchant_account: &domain::MerchantAccount, payout_data: &PayoutData, ) -> RouterResponse<payouts::PayoutCreateResponse> { let payout_attempt = payout_data.payout_attempt.to_owned(); let payouts = payout_data.payouts.to_owned(); let payout_method_id: Option<String> = payout_data.payment_method.as_ref().map(|pm| { #[cfg(all( any(feature = "v1", feature = "v2"), not(feature = "payment_methods_v2") ))] { pm.payment_method_id.clone() } #[cfg(all(feature = "v2", feature = "payment_methods_v2"))] { pm.id.clone().get_string_repr().to_string() } }); let payout_link = payout_data.payout_link.to_owned(); let billing_address = payout_data.billing_address.to_owned(); let customer_details = payout_data.customer_details.to_owned(); let customer_id = payouts.customer_id; let billing = billing_address .as_ref() .map(hyperswitch_domain_models::address::Address::from) .map(From::from); let translated_unified_message = helpers::get_translated_unified_code_and_message( state, payout_attempt.unified_code.as_ref(), payout_attempt.unified_message.as_ref(), &payout_data.current_locale, ) .await?; let additional_payout_method_data = payout_attempt.additional_payout_method_data.clone(); let payout_method_data = additional_payout_method_data.map(payouts::PayoutMethodDataResponse::from); let response = api::PayoutCreateResponse { payout_id: payouts.payout_id.to_owned(), merchant_id: merchant_account.get_id().to_owned(), amount: payouts.amount, currency: payouts.destination_currency.to_owned(), connector: payout_attempt.connector, payout_type: payouts.payout_type.to_owned(), payout_method_data, billing, auto_fulfill: payouts.auto_fulfill, customer_id, email: customer_details.as_ref().and_then(|c| c.email.clone()), name: customer_details.as_ref().and_then(|c| c.name.clone()), phone: customer_details.as_ref().and_then(|c| c.phone.clone()), phone_country_code: customer_details .as_ref() .and_then(|c| c.phone_country_code.clone()), customer: customer_details .as_ref() .map(payment_api_types::CustomerDetailsResponse::foreign_from), client_secret: payouts.client_secret.to_owned(), return_url: payouts.return_url.to_owned(), business_country: payout_attempt.business_country, business_label: payout_attempt.business_label, description: payouts.description.to_owned(), entity_type: payouts.entity_type.to_owned(), recurring: payouts.recurring, metadata: payouts.metadata, merchant_connector_id: payout_attempt.merchant_connector_id.to_owned(), status: payout_attempt.status.to_owned(), error_message: payout_attempt.error_message.to_owned(), error_code: payout_attempt.error_code, profile_id: payout_attempt.profile_id, created: Some(payouts.created_at), connector_transaction_id: payout_attempt.connector_payout_id, priority: payouts.priority, attempts: None, unified_code: payout_attempt.unified_code, unified_message: translated_unified_message, payout_link: payout_link .map(|payout_link| { url::Url::parse(payout_link.url.peek()).map(|link| PayoutLinkResponse { payout_link_id: payout_link.link_id, link: link.into(), }) }) .transpose() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to parse payout link's URL")?, payout_method_id, }; Ok(services::ApplicationResponse::Json(response)) } <file_sep path="hyperswitch/crates/router/src/core/payouts.rs" role="context" start="2864" end="3068"> pub async fn make_payout_data( state: &SessionState, merchant_account: &domain::MerchantAccount, auth_profile_id: Option<common_utils::id_type::ProfileId>, key_store: &domain::MerchantKeyStore, req: &payouts::PayoutRequest, locale: &str, ) -> RouterResult<PayoutData> { let db = &*state.store; let merchant_id = merchant_account.get_id(); let payout_id = match req { payouts::PayoutRequest::PayoutActionRequest(r) => r.payout_id.clone(), payouts::PayoutRequest::PayoutCreateRequest(r) => r.payout_id.clone().unwrap_or_default(), payouts::PayoutRequest::PayoutRetrieveRequest(r) => r.payout_id.clone(), }; let payouts = db .find_payout_by_merchant_id_payout_id( merchant_id, &payout_id, merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::PayoutNotFound)?; core_utils::validate_profile_id_from_auth_layer(auth_profile_id, &payouts)?; let payout_attempt_id = utils::get_payout_attempt_id(payout_id, payouts.attempt_count); let mut payout_attempt = db .find_payout_attempt_by_merchant_id_payout_attempt_id( merchant_id, &payout_attempt_id, merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::PayoutNotFound)?; let customer_id = payouts.customer_id.as_ref(); // We have to do this because the function that is being used to create / get address is from payments // which expects a payment_id let payout_id_as_payment_id_type = common_utils::id_type::PaymentId::try_from( std::borrow::Cow::Owned(payouts.payout_id.clone()), ) .change_context(errors::ApiErrorResponse::InvalidRequestData { message: "payout_id contains invalid data".to_string(), }) .attach_printable("Error converting payout_id to PaymentId type")?; let billing_address = payment_helpers::create_or_find_address_for_payment_by_request( state, None, payouts.address_id.as_deref(), merchant_id, customer_id, key_store, &payout_id_as_payment_id_type, merchant_account.storage_scheme, ) .await?; let payout_id = &payouts.payout_id; let customer_details = customer_id .async_map(|customer_id| async move { db.find_customer_optional_by_customer_id_merchant_id( &state.into(), customer_id, merchant_id, key_store, merchant_account.storage_scheme, ) .await .map_err(|err| err.change_context(errors::ApiErrorResponse::InternalServerError)) .attach_printable_lazy(|| { format!( "Failed while fetching optional customer [id - {:?}] for payout [id - {}]", customer_id, payout_id ) }) }) .await .transpose()? .and_then(|c| c); let profile_id = payout_attempt.profile_id.clone(); // Validate whether profile_id passed in request is valid and is linked to the merchant let business_profile = validate_and_get_business_profile(state, key_store, &profile_id, merchant_id).await?; let payout_method_data_req = match req { payouts::PayoutRequest::PayoutCreateRequest(r) => r.payout_method_data.to_owned(), payouts::PayoutRequest::PayoutActionRequest(_) => { match payout_attempt.payout_token.to_owned() { Some(payout_token) => { let customer_id = customer_details .as_ref() .map(|cd| cd.customer_id.to_owned()) .get_required_value("customer_id when payout_token is sent")?; helpers::make_payout_method_data( state, None, Some(&payout_token), &customer_id, merchant_account.get_id(), payouts.payout_type, key_store, None, merchant_account.storage_scheme, ) .await? } None => None, } } payouts::PayoutRequest::PayoutRetrieveRequest(_) => None, }; if let Some(payout_method_data) = payout_method_data_req.clone() { let additional_payout_method_data = helpers::get_additional_payout_data(&payout_method_data, &*state.store, &profile_id) .await; let update_additional_payout_method_data = storage::PayoutAttemptUpdate::AdditionalPayoutMethodDataUpdate { additional_payout_method_data, }; payout_attempt = db .update_payout_attempt( &payout_attempt, update_additional_payout_method_data, &payouts, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error updating additional payout method data in payout_attempt")?; }; let merchant_connector_account = if payout_attempt.connector.is_some() && payout_attempt.merchant_connector_id.is_some() { let connector_name = payout_attempt .connector .clone() .get_required_value("connector_name")?; Some( payment_helpers::get_merchant_connector_account( state, merchant_account.get_id(), None, key_store, &profile_id, connector_name.as_str(), payout_attempt.merchant_connector_id.as_ref(), ) .await?, ) } else { None }; let payout_link = payouts .payout_link_id .clone() .async_map(|link_id| async move { db.find_payout_link_by_link_id(&link_id) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error fetching payout links from db") }) .await .transpose()?; let payout_method_id = payouts.payout_method_id.clone(); let mut payment_method: Option<PaymentMethod> = None; if let Some(pm_id) = payout_method_id { payment_method = Some( db.find_payment_method( &(state.into()), key_store, &pm_id, merchant_account.storage_scheme, ) .await .change_context(errors::ApiErrorResponse::PaymentMethodNotFound) .attach_printable("Unable to find payment method")?, ); } Ok(PayoutData { billing_address, business_profile, customer_details, payouts, payout_attempt, payout_method_data: payout_method_data_req.to_owned(), merchant_connector_account, should_terminate: false, profile_id, payout_link, current_locale: locale.to_string(), payment_method, }) } <file_sep path="hyperswitch/crates/router/tests/utils.rs" role="context" start="399" end="401"> pub struct Error { pub message: Message, } <file_sep path="hyperswitch/migrations/2024-07-31-063531_alter_customer_id_in_payouts/up.sql" role="context" start="1" end="9"> ALTER TABLE payouts ALTER COLUMN customer_id DROP NOT NULL, ALTER COLUMN address_id DROP NOT NULL; ALTER TABLE payout_attempt ALTER COLUMN customer_id DROP NOT NULL,
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/payments/flows/session_flow.rs<|crate|> router anchor=create_samsung_pay_session_token kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/payments/flows/session_flow.rs" role="context" start="612" end="704"> fn create_samsung_pay_session_token( state: &routes::SessionState, router_data: &types::PaymentsSessionRouterData, header_payload: hyperswitch_domain_models::payments::HeaderPayload, connector: &api::ConnectorData, business_profile: &domain::Profile, ) -> RouterResult<types::PaymentsSessionRouterData> { let samsung_pay_session_token_data = router_data .connector_wallets_details .clone() .parse_value::<payment_types::SamsungPaySessionTokenData>("SamsungPaySessionTokenData") .change_context(errors::ConnectorError::NoConnectorWalletDetails) .change_context(errors::ApiErrorResponse::InvalidDataFormat { field_name: "connector_wallets_details".to_string(), expected_format: "samsung_pay_metadata_format".to_string(), })?; let required_amount_type = StringMajorUnitForConnector; let samsung_pay_amount = required_amount_type .convert( router_data.request.minor_amount, router_data.request.currency, ) .change_context(errors::ApiErrorResponse::PreconditionFailed { message: "Failed to convert amount to string major unit for Samsung Pay".to_string(), })?; let merchant_domain = match header_payload.x_client_platform { Some(common_enums::ClientPlatform::Web) => Some( header_payload .x_merchant_domain .get_required_value("samsung pay domain") .attach_printable("Failed to get domain for samsung pay session call")?, ), _ => None, }; let samsung_pay_wallet_details = match samsung_pay_session_token_data.data { payment_types::SamsungPayCombinedMetadata::MerchantCredentials( samsung_pay_merchant_credentials, ) => samsung_pay_merchant_credentials, payment_types::SamsungPayCombinedMetadata::ApplicationCredentials( _samsung_pay_application_credentials, ) => Err(errors::ApiErrorResponse::NotSupported { message: "Samsung Pay decryption flow with application credentials is not implemented" .to_owned(), })?, }; let formatted_payment_id = router_data.payment_id.replace("_", "-"); let billing_address_required = is_billing_address_required_to_be_collected_from_wallet( state, connector, business_profile, enums::PaymentMethodType::SamsungPay, ); let shipping_address_required = is_shipping_address_required_to_be_collected_form_wallet( state, connector, business_profile, enums::PaymentMethodType::SamsungPay, ); Ok(types::PaymentsSessionRouterData { response: Ok(types::PaymentsResponseData::SessionResponse { session_token: payment_types::SessionToken::SamsungPay(Box::new( payment_types::SamsungPaySessionTokenResponse { version: "2".to_string(), service_id: samsung_pay_wallet_details.service_id, order_number: formatted_payment_id, merchant_payment_information: payment_types::SamsungPayMerchantPaymentInformation { name: samsung_pay_wallet_details.merchant_display_name, url: merchant_domain, country_code: samsung_pay_wallet_details.merchant_business_country, }, amount: payment_types::SamsungPayAmountDetails { amount_format: payment_types::SamsungPayAmountFormat::FormatTotalPriceOnly, currency_code: router_data.request.currency, total_amount: samsung_pay_amount, }, protocol: payment_types::SamsungPayProtocolType::Protocol3ds, allowed_brands: samsung_pay_wallet_details.allowed_brands, billing_address_required, shipping_address_required, }, )), }), ..router_data.clone() }) } <file_sep path="hyperswitch/crates/router/src/core/payments/flows/session_flow.rs" role="context" start="611" end="611"> use api_models::{admin as admin_types, payments as payment_types}; use common_utils::{ ext_traits::ByteSliceExt, request::RequestContent, types::{AmountConvertor, StringMajorUnitForConnector}, }; use hyperswitch_domain_models::payments::PaymentIntentData; use crate::{ consts::PROTOCOL, core::{ errors::{self, ConnectorErrorExt, RouterResult}, payments::{self, access_token, helpers, transformers, PaymentData}, }, headers, logger, routes::{self, app::settings, metrics}, services, types::{ self, api::{self, enums}, domain, }, utils::OptionExt, }; <file_sep path="hyperswitch/crates/router/src/core/payments/flows/session_flow.rs" role="context" start="756" end="784"> fn is_shipping_address_required_to_be_collected_form_wallet( state: &routes::SessionState, connector: &api::ConnectorData, business_profile: &domain::Profile, payment_method_type: enums::PaymentMethodType, ) -> bool { let always_collect_shipping_details_from_wallet_connector = business_profile .always_collect_shipping_details_from_wallet_connector .unwrap_or(false); if always_collect_shipping_details_from_wallet_connector { always_collect_shipping_details_from_wallet_connector } else if business_profile .collect_shipping_details_from_wallet_connector .unwrap_or(false) { let shipping_variants = enums::FieldType::get_shipping_variants(); is_dynamic_fields_required( &state.conf.required_fields, enums::PaymentMethod::Wallet, payment_method_type, connector.connector_name, shipping_variants, ) } else { false } } <file_sep path="hyperswitch/crates/router/src/core/payments/flows/session_flow.rs" role="context" start="716" end="744"> fn is_billing_address_required_to_be_collected_from_wallet( state: &routes::SessionState, connector: &api::ConnectorData, business_profile: &domain::Profile, payment_method_type: enums::PaymentMethodType, ) -> bool { let always_collect_billing_details_from_wallet_connector = business_profile .always_collect_billing_details_from_wallet_connector .unwrap_or(false); if always_collect_billing_details_from_wallet_connector { always_collect_billing_details_from_wallet_connector } else if business_profile .collect_billing_details_from_wallet_connector .unwrap_or(false) { let billing_variants = enums::FieldType::get_billing_variants(); is_dynamic_fields_required( &state.conf.required_fields, enums::PaymentMethod::Wallet, payment_method_type, connector.connector_name, billing_variants, ) } else { false } } <file_sep path="hyperswitch/crates/router/src/core/payments/flows/session_flow.rs" role="context" start="575" end="610"> fn create_paze_session_token( router_data: &types::PaymentsSessionRouterData, _header_payload: hyperswitch_domain_models::payments::HeaderPayload, ) -> RouterResult<types::PaymentsSessionRouterData> { let paze_wallet_details = router_data .connector_wallets_details .clone() .parse_value::<payment_types::PazeSessionTokenData>("PazeSessionTokenData") .change_context(errors::ConnectorError::NoConnectorWalletDetails) .change_context(errors::ApiErrorResponse::InvalidDataFormat { field_name: "connector_wallets_details".to_string(), expected_format: "paze_metadata_format".to_string(), })?; let required_amount_type = StringMajorUnitForConnector; let transaction_currency_code = router_data.request.currency; let transaction_amount = required_amount_type .convert(router_data.request.minor_amount, transaction_currency_code) .change_context(errors::ApiErrorResponse::PreconditionFailed { message: "Failed to convert amount to string major unit for paze".to_string(), })?; Ok(types::PaymentsSessionRouterData { response: Ok(types::PaymentsResponseData::SessionResponse { session_token: payment_types::SessionToken::Paze(Box::new( payment_types::PazeSessionTokenResponse { client_id: paze_wallet_details.data.client_id, client_name: paze_wallet_details.data.client_name, client_profile_id: paze_wallet_details.data.client_profile_id, transaction_currency_code, transaction_amount, email_address: router_data.request.email.clone(), }, )), }), ..router_data.clone() }) } <file_sep path="hyperswitch/crates/router/src/core/payments/flows/session_flow.rs" role="context" start="253" end="573"> async fn create_applepay_session_token( state: &routes::SessionState, router_data: &types::PaymentsSessionRouterData, connector: &api::ConnectorData, business_profile: &domain::Profile, header_payload: hyperswitch_domain_models::payments::HeaderPayload, ) -> RouterResult<types::PaymentsSessionRouterData> { let delayed_response = is_session_response_delayed(state, connector); if delayed_response { let delayed_response_apple_pay_session = Some(payment_types::ApplePaySessionResponse::NoSessionResponse); create_apple_pay_session_response( router_data, delayed_response_apple_pay_session, None, // Apple pay payment request will be none for delayed session response connector.connector_name.to_string(), delayed_response, payment_types::NextActionCall::Confirm, header_payload, ) } else { // Get the apple pay metadata let apple_pay_metadata = helpers::get_applepay_metadata(router_data.connector_meta_data.clone()) .attach_printable( "Failed to to fetch apple pay certificates during session call", )?; // Get payment request data , apple pay session request and merchant keys let ( payment_request_data, apple_pay_session_request_optional, apple_pay_merchant_cert, apple_pay_merchant_cert_key, apple_pay_merchant_identifier, merchant_business_country, merchant_configured_domain_optional, ) = match apple_pay_metadata { payment_types::ApplepaySessionTokenMetadata::ApplePayCombined( apple_pay_combined_metadata, ) => match apple_pay_combined_metadata { payment_types::ApplePayCombinedMetadata::Simplified { payment_request_data, session_token_data, } => { logger::info!("Apple pay simplified flow"); let merchant_identifier = state .conf .applepay_merchant_configs .get_inner() .common_merchant_identifier .clone() .expose(); let merchant_business_country = session_token_data.merchant_business_country; let apple_pay_session_request = get_session_request_for_simplified_apple_pay( merchant_identifier.clone(), session_token_data.clone(), ); let apple_pay_merchant_cert = state .conf .applepay_decrypt_keys .get_inner() .apple_pay_merchant_cert .clone(); let apple_pay_merchant_cert_key = state .conf .applepay_decrypt_keys .get_inner() .apple_pay_merchant_cert_key .clone(); ( payment_request_data, Ok(apple_pay_session_request), apple_pay_merchant_cert, apple_pay_merchant_cert_key, merchant_identifier, merchant_business_country, Some(session_token_data.initiative_context), ) } payment_types::ApplePayCombinedMetadata::Manual { payment_request_data, session_token_data, } => { logger::info!("Apple pay manual flow"); let apple_pay_session_request = get_session_request_for_manual_apple_pay( session_token_data.clone(), header_payload.x_merchant_domain.clone(), ); let merchant_business_country = session_token_data.merchant_business_country; ( payment_request_data, apple_pay_session_request, session_token_data.certificate.clone(), session_token_data.certificate_keys, session_token_data.merchant_identifier, merchant_business_country, session_token_data.initiative_context, ) } }, payment_types::ApplepaySessionTokenMetadata::ApplePay(apple_pay_metadata) => { logger::info!("Apple pay manual flow"); let apple_pay_session_request = get_session_request_for_manual_apple_pay( apple_pay_metadata.session_token_data.clone(), header_payload.x_merchant_domain.clone(), ); let merchant_business_country = apple_pay_metadata .session_token_data .merchant_business_country; ( apple_pay_metadata.payment_request_data, apple_pay_session_request, apple_pay_metadata.session_token_data.certificate.clone(), apple_pay_metadata .session_token_data .certificate_keys .clone(), apple_pay_metadata.session_token_data.merchant_identifier, merchant_business_country, apple_pay_metadata.session_token_data.initiative_context, ) } }; // Get amount info for apple pay let amount_info = get_apple_pay_amount_info( payment_request_data.label.as_str(), router_data.request.to_owned(), )?; let required_billing_contact_fields = if business_profile .always_collect_billing_details_from_wallet_connector .unwrap_or(false) { Some(payment_types::ApplePayBillingContactFields(vec![ payment_types::ApplePayAddressParameters::PostalAddress, ])) } else if business_profile .collect_billing_details_from_wallet_connector .unwrap_or(false) { let billing_variants = enums::FieldType::get_billing_variants(); is_dynamic_fields_required( &state.conf.required_fields, enums::PaymentMethod::Wallet, enums::PaymentMethodType::ApplePay, connector.connector_name, billing_variants, ) .then_some(payment_types::ApplePayBillingContactFields(vec![ payment_types::ApplePayAddressParameters::PostalAddress, ])) } else { None }; let required_shipping_contact_fields = if business_profile .always_collect_shipping_details_from_wallet_connector .unwrap_or(false) { Some(payment_types::ApplePayShippingContactFields(vec![ payment_types::ApplePayAddressParameters::PostalAddress, payment_types::ApplePayAddressParameters::Phone, payment_types::ApplePayAddressParameters::Email, ])) } else if business_profile .collect_shipping_details_from_wallet_connector .unwrap_or(false) { let shipping_variants = enums::FieldType::get_shipping_variants(); is_dynamic_fields_required( &state.conf.required_fields, enums::PaymentMethod::Wallet, enums::PaymentMethodType::ApplePay, connector.connector_name, shipping_variants, ) .then_some(payment_types::ApplePayShippingContactFields(vec![ payment_types::ApplePayAddressParameters::PostalAddress, payment_types::ApplePayAddressParameters::Phone, payment_types::ApplePayAddressParameters::Email, ])) } else { None }; // If collect_shipping_details_from_wallet_connector is false, we check if // collect_billing_details_from_wallet_connector is true. If it is, then we pass the Email and Phone in // ApplePayShippingContactFields as it is a required parameter and ApplePayBillingContactFields // does not contain Email and Phone. let required_shipping_contact_fields_updated = if required_billing_contact_fields.is_some() && required_shipping_contact_fields.is_none() { Some(payment_types::ApplePayShippingContactFields(vec![ payment_types::ApplePayAddressParameters::Phone, payment_types::ApplePayAddressParameters::Email, ])) } else { required_shipping_contact_fields }; // Get apple pay payment request let applepay_payment_request = get_apple_pay_payment_request( amount_info, payment_request_data, router_data.request.to_owned(), apple_pay_merchant_identifier.as_str(), merchant_business_country, required_billing_contact_fields, required_shipping_contact_fields_updated, )?; let apple_pay_session_response = match ( header_payload.browser_name.clone(), header_payload.x_client_platform.clone(), ) { (Some(common_enums::BrowserName::Safari), Some(common_enums::ClientPlatform::Web)) | (None, None) => { let apple_pay_session_request = apple_pay_session_request_optional .attach_printable("Failed to obtain apple pay session request")?; let applepay_session_request = build_apple_pay_session_request( state, apple_pay_session_request.clone(), apple_pay_merchant_cert.clone(), apple_pay_merchant_cert_key.clone(), )?; let response = services::call_connector_api( state, applepay_session_request, "create_apple_pay_session_token", ) .await; let updated_response = match ( response.as_ref().ok(), header_payload.x_merchant_domain.clone(), ) { (Some(Err(error)), Some(_)) => { logger::error!( "Retry apple pay session call with the merchant configured domain {error:?}" ); let merchant_configured_domain = merchant_configured_domain_optional .get_required_value("apple pay domain") .attach_printable("Failed to get domain for apple pay session call")?; let apple_pay_retry_session_request = payment_types::ApplepaySessionRequest { initiative_context: merchant_configured_domain, ..apple_pay_session_request }; let applepay_retry_session_request = build_apple_pay_session_request( state, apple_pay_retry_session_request, apple_pay_merchant_cert, apple_pay_merchant_cert_key, )?; services::call_connector_api( state, applepay_retry_session_request, "create_apple_pay_session_token", ) .await } _ => response, }; // logging the error if present in session call response log_session_response_if_error(&updated_response); updated_response .ok() .and_then(|apple_pay_res| { apple_pay_res .map(|res| { let response: Result< payment_types::NoThirdPartySdkSessionResponse, Report<common_utils::errors::ParsingError>, > = res.response.parse_struct("NoThirdPartySdkSessionResponse"); // logging the parsing failed error if let Err(error) = response.as_ref() { logger::error!(?error); }; response.ok() }) .ok() }) .flatten() } _ => { logger::debug!("Skipping apple pay session call based on the browser name"); None } }; let session_response = apple_pay_session_response.map(payment_types::ApplePaySessionResponse::NoThirdPartySdk); create_apple_pay_session_response( router_data, session_response, Some(applepay_payment_request), connector.connector_name.to_string(), delayed_response, payment_types::NextActionCall::Confirm, header_payload, ) } } <file_sep path="hyperswitch/crates/router/src/core/payments/flows/session_flow.rs" role="context" start="1261" end="1314"> async fn decide_flow<'a, 'b>( &'b self, state: &'a routes::SessionState, connector: &api::ConnectorData, _confirm: Option<bool>, call_connector_action: payments::CallConnectorAction, business_profile: &domain::Profile, header_payload: hyperswitch_domain_models::payments::HeaderPayload, ) -> RouterResult<Self> { match connector.get_token { api::GetToken::GpayMetadata => { create_gpay_session_token(state, self, connector, business_profile) } api::GetToken::SamsungPayMetadata => create_samsung_pay_session_token( state, self, header_payload, connector, business_profile, ), api::GetToken::ApplePayMetadata => { create_applepay_session_token( state, self, connector, business_profile, header_payload, ) .await } api::GetToken::PaypalSdkMetadata => { create_paypal_sdk_session_token(state, self, connector, business_profile) } api::GetToken::PazeMetadata => create_paze_session_token(self, header_payload), api::GetToken::Connector => { let connector_integration: services::BoxedPaymentConnectorIntegrationInterface< api::Session, types::PaymentsSessionData, types::PaymentsResponseData, > = connector.connector.get_connector_integration(); let resp = services::execute_connector_processing_step( state, connector_integration, self, call_connector_action, None, ) .await .to_payment_failed_response()?; Ok(resp) } } } <file_sep path="hyperswitch/crates/router/src/routes/app.rs" role="context" start="1906" end="1906"> pub struct Profile;
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/payments/helpers.rs<|crate|> router anchor=get_payment_external_authentication_flow_during_confirm kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="6858" end="6955"> pub async fn get_payment_external_authentication_flow_during_confirm<F: Clone>( state: &SessionState, key_store: &domain::MerchantKeyStore, business_profile: &domain::Profile, payment_data: &mut PaymentData<F>, connector_call_type: &api::ConnectorCallType, mandate_type: Option<api_models::payments::MandateTransactionType>, ) -> RouterResult<Option<PaymentExternalAuthenticationFlow>> { let authentication_id = payment_data.payment_attempt.authentication_id.clone(); let is_authentication_type_3ds = payment_data.payment_attempt.authentication_type == Some(common_enums::AuthenticationType::ThreeDs); let separate_authentication_requested = payment_data .payment_intent .request_external_three_ds_authentication .unwrap_or(false); let separate_three_ds_authentication_attempted = payment_data .payment_attempt .external_three_ds_authentication_attempted .unwrap_or(false); let connector_supports_separate_authn = authentication::utils::get_connector_data_if_separate_authn_supported(connector_call_type); logger::info!("is_pre_authn_call {:?}", authentication_id.is_none()); logger::info!( "separate_authentication_requested {:?}", separate_authentication_requested ); logger::info!( "payment connector supports external authentication: {:?}", connector_supports_separate_authn.is_some() ); let card = payment_data.payment_method_data.as_ref().and_then(|pmd| { if let domain::PaymentMethodData::Card(card) = pmd { Some(card.clone()) } else { None } }); Ok(if separate_three_ds_authentication_attempted { authentication_id.map(|authentication_id| { PaymentExternalAuthenticationFlow::PostAuthenticationFlow { authentication_id } }) } else if separate_authentication_requested && is_authentication_type_3ds && mandate_type != Some(api_models::payments::MandateTransactionType::RecurringMandateTransaction) { if let Some((connector_data, card)) = connector_supports_separate_authn.zip(card) { let token = payment_data .token .clone() .get_required_value("token") .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable( "payment_data.token should not be None while making pre authentication call", )?; let payment_connector_mca = get_merchant_connector_account( state, &business_profile.merchant_id, None, key_store, business_profile.get_id(), connector_data.connector_name.to_string().as_str(), connector_data.merchant_connector_id.as_ref(), ) .await?; let acquirer_details = payment_connector_mca .get_metadata() .clone() .and_then(|metadata| { metadata .peek() .clone() .parse_value::<authentication::types::AcquirerDetails>("AcquirerDetails") .change_context(errors::ApiErrorResponse::PreconditionFailed { message: "acquirer_bin and acquirer_merchant_id not found in Payment Connector's Metadata" .to_string(), }) .inspect_err(|err| { logger::error!( "Failed to parse acquirer details from Payment Connector's Metadata: {:?}", err ); }) .ok() }); Some(PaymentExternalAuthenticationFlow::PreAuthenticationFlow { card: Box::new(card), token, acquirer_details, }) } else { None } } else { None }) } <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="6857" end="6857"> pub enum PaymentExternalAuthenticationFlow { PreAuthenticationFlow { acquirer_details: Option<authentication::types::AcquirerDetails>, card: Box<hyperswitch_domain_models::payment_method_data::Card>, token: String, }, PostAuthenticationFlow { authentication_id: String, }, } #[cfg(feature = "v1")] pub async fn get_payment_external_authentication_flow_during_confirm<F: Clone>( state: &SessionState, key_store: &domain::MerchantKeyStore, business_profile: &domain::Profile, payment_data: &mut PaymentData<F>, connector_call_type: &api::ConnectorCallType, mandate_type: Option<api_models::payments::MandateTransactionType>, ) -> RouterResult<Option<PaymentExternalAuthenticationFlow>> { let authentication_id = payment_data.payment_attempt.authentication_id.clone(); let is_authentication_type_3ds = payment_data.payment_attempt.authentication_type == Some(common_enums::AuthenticationType::ThreeDs); let separate_authentication_requested = payment_data .payment_intent <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="6968" end="6995"> pub fn check_integrity_based_on_flow<T, Request>( request: &Request, payment_response_data: &Result<PaymentsResponseData, ErrorResponse>, ) -> Result<(), common_utils::errors::IntegrityCheckError> where T: FlowIntegrity, Request: GetIntegrityObject<T> + CheckIntegrity<Request, T>, { let connector_transaction_id = match payment_response_data { Ok(resp_data) => match resp_data { PaymentsResponseData::TransactionResponse { connector_response_reference_id, .. } => connector_response_reference_id, PaymentsResponseData::TransactionUnresolvedResponse { connector_response_reference_id, .. } => connector_response_reference_id, PaymentsResponseData::PreProcessingResponse { connector_response_reference_id, .. } => connector_response_reference_id, _ => &None, }, Err(_) => &None, }; request.check_integrity(request, connector_transaction_id.to_owned()) } <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="6957" end="6966"> pub fn get_redis_key_for_extended_card_info( merchant_id: &id_type::MerchantId, payment_id: &id_type::PaymentId, ) -> String { format!( "{}_{}_extended_card_info", merchant_id.get_string_repr(), payment_id.get_string_repr() ) } <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="6777" end="6844"> pub async fn decide_action_for_unified_authentication_service<F: Clone>( state: &SessionState, key_store: &domain::MerchantKeyStore, business_profile: &domain::Profile, payment_data: &mut PaymentData<F>, connector_call_type: &api::ConnectorCallType, mandate_type: Option<api_models::payments::MandateTransactionType>, do_authorisation_confirmation: &bool, ) -> RouterResult<Option<UnifiedAuthenticationServiceFlow>> { let external_authentication_flow = get_payment_external_authentication_flow_during_confirm( state, key_store, business_profile, payment_data, connector_call_type, mandate_type, ) .await?; Ok(match external_authentication_flow { Some(PaymentExternalAuthenticationFlow::PreAuthenticationFlow { acquirer_details, card, token, }) => Some( UnifiedAuthenticationServiceFlow::ExternalAuthenticationInitiate { acquirer_details, card, token, }, ), Some(PaymentExternalAuthenticationFlow::PostAuthenticationFlow { authentication_id }) => { Some( UnifiedAuthenticationServiceFlow::ExternalAuthenticationPostAuthenticate { authentication_id, }, ) } None => { if let Some(payment_method) = payment_data.payment_attempt.payment_method { if payment_method == storage_enums::PaymentMethod::Card && business_profile.is_click_to_pay_enabled && payment_data.service_details.is_some() { let should_do_uas_confirmation_call = payment_data .service_details .as_ref() .map(|details| details.is_network_confirmation_call_required()) .unwrap_or(true); if *do_authorisation_confirmation && should_do_uas_confirmation_call { Some(UnifiedAuthenticationServiceFlow::ClickToPayConfirmation) } else { Some(UnifiedAuthenticationServiceFlow::ClickToPayInitiate) } } else { None } } else { logger::info!( payment_method=?payment_data.payment_attempt.payment_method, click_to_pay_enabled=?business_profile.is_click_to_pay_enabled, "skipping unified authentication service call since payment conditions are not satisfied" ); None } } }) } <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="6746" end="6760"> pub fn validate_mandate_data_and_future_usage( setup_future_usages: Option<api_enums::FutureUsage>, mandate_details_present: bool, ) -> Result<(), errors::ApiErrorResponse> { if mandate_details_present && (Some(api_enums::FutureUsage::OnSession) == setup_future_usages || setup_future_usages.is_none()) { Err(errors::ApiErrorResponse::PreconditionFailed { message: "`setup_future_usage` must be `off_session` for mandates".into(), }) } else { Ok(()) } } <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="5783" end="5814"> pub fn new( root_keys: masking::Secret<String>, recipient_id: masking::Secret<String>, private_key: masking::Secret<String>, ) -> CustomResult<Self, errors::GooglePayDecryptionError> { // base64 decode the private key let decoded_key = BASE64_ENGINE .decode(private_key.expose()) .change_context(errors::GooglePayDecryptionError::Base64DecodingFailed)?; // base64 decode the root signing keys let decoded_root_signing_keys = BASE64_ENGINE .decode(root_keys.expose()) .change_context(errors::GooglePayDecryptionError::Base64DecodingFailed)?; // create a private key from the decoded key let private_key = PKey::private_key_from_pkcs8(&decoded_key) .change_context(errors::GooglePayDecryptionError::KeyDeserializationFailed) .attach_printable("cannot convert private key from decode_key")?; // parse the root signing keys let root_keys_vector: Vec<GooglePayRootSigningKey> = decoded_root_signing_keys .parse_struct("GooglePayRootSigningKey") .change_context(errors::GooglePayDecryptionError::DeserializationFailed)?; // parse and filter the root signing keys by protocol version let filtered_root_signing_keys = filter_root_signing_keys(root_keys_vector)?; Ok(Self { root_signing_keys: filtered_root_signing_keys, recipient_id, private_key, }) } <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="4111" end="4253"> pub async fn get_merchant_connector_account( state: &SessionState, merchant_id: &id_type::MerchantId, creds_identifier: Option<&str>, key_store: &domain::MerchantKeyStore, profile_id: &id_type::ProfileId, connector_name: &str, merchant_connector_id: Option<&id_type::MerchantConnectorAccountId>, ) -> RouterResult<MerchantConnectorAccountType> { let db = &*state.store; let key_manager_state: &KeyManagerState = &state.into(); match creds_identifier { Some(creds_identifier) => { let key = merchant_id.get_creds_identifier_key(creds_identifier); let cloned_key = key.clone(); let redis_fetch = || async { db.get_redis_conn() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to get redis connection") .async_and_then(|redis| async move { redis .get_and_deserialize_key(&key.as_str().into(), "String") .await .change_context( errors::ApiErrorResponse::MerchantConnectorAccountNotFound { id: key.clone(), }, ) .attach_printable(key.clone() + ": Not found in Redis") }) .await }; let db_fetch = || async { db.find_config_by_key(cloned_key.as_str()) .await .to_not_found_response( errors::ApiErrorResponse::MerchantConnectorAccountNotFound { id: cloned_key.to_owned(), }, ) }; let mca_config: String = redis_fetch() .await .map_or_else( |_| { Either::Left(async { match db_fetch().await { Ok(config_entry) => Ok(config_entry.config), Err(e) => Err(e), } }) }, |result| Either::Right(async { Ok(result) }), ) .await?; let private_key = state .conf .jwekey .get_inner() .tunnel_private_key .peek() .as_bytes(); let decrypted_mca = services::decrypt_jwe(mca_config.as_str(), services::KeyIdCheck::SkipKeyIdCheck, private_key, jwe::RSA_OAEP_256) .await .change_context(errors::ApiErrorResponse::UnprocessableEntity{ message: "decoding merchant_connector_details failed due to invalid data format!".into()}) .attach_printable( "Failed to decrypt merchant_connector_details sent in request and then put in cache", )?; let res = String::into_bytes(decrypted_mca) .parse_struct("MerchantConnectorDetails") .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable( "Failed to parse merchant_connector_details sent in request and then put in cache", )?; Ok(MerchantConnectorAccountType::CacheVal(res)) } None => { let mca: RouterResult<domain::MerchantConnectorAccount> = if let Some(merchant_connector_id) = merchant_connector_id { #[cfg(feature = "v1")] { db.find_by_merchant_connector_account_merchant_id_merchant_connector_id( key_manager_state, merchant_id, merchant_connector_id, key_store, ) .await .to_not_found_response( errors::ApiErrorResponse::MerchantConnectorAccountNotFound { id: merchant_connector_id.get_string_repr().to_string(), }, ) } #[cfg(feature = "v2")] { db.find_merchant_connector_account_by_id( &state.into(), merchant_connector_id, key_store, ) .await .to_not_found_response( errors::ApiErrorResponse::MerchantConnectorAccountNotFound { id: merchant_connector_id.get_string_repr().to_string(), }, ) } } else { #[cfg(feature = "v1")] { db.find_merchant_connector_account_by_profile_id_connector_name( key_manager_state, profile_id, connector_name, key_store, ) .await .to_not_found_response( errors::ApiErrorResponse::MerchantConnectorAccountNotFound { id: format!( "profile id {} and connector name {connector_name}", profile_id.get_string_repr() ), }, ) } #[cfg(feature = "v2")] { todo!() } }; mca.map(Box::new).map(MerchantConnectorAccountType::DbVal) } } } <file_sep path="hyperswitch/crates/router/src/core/payments/helpers.rs" role="context" start="6846" end="6855"> pub enum PaymentExternalAuthenticationFlow { PreAuthenticationFlow { acquirer_details: Option<authentication::types::AcquirerDetails>, card: Box<hyperswitch_domain_models::payment_method_data::Card>, token: String, }, PostAuthenticationFlow { authentication_id: String, }, } <file_sep path="hyperswitch/crates/router/src/compatibility/stripe/customers/types.rs" role="context" start="202" end="207"> pub struct PaymentMethodData { pub id: Option<String>, pub object: &'static str, pub card: Option<CardDetails>, pub created: Option<time::PrimitiveDateTime>, } <file_sep path="hyperswitch/migrations/2023-04-06-092008_create_merchant_ek/up.sql" role="context" start="1" end="6"> CREATE TABLE merchant_key_store( merchant_id VARCHAR(255) NOT NULL PRIMARY KEY, key bytea NOT NULL, created_at TIMESTAMP NOT NULL );
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/core/refunds.rs<|crate|> router anchor=trigger_refund_execute_workflow kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/core/refunds.rs" role="context" start="1472" end="1590"> pub async fn trigger_refund_execute_workflow( state: &SessionState, refund_tracker: &storage::ProcessTracker, ) -> Result<(), errors::ProcessTrackerError> { let db = &*state.store; let refund_core = serde_json::from_value::<storage::RefundCoreWorkflow>(refund_tracker.tracking_data.clone()) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable_lazy(|| { format!( "unable to convert into refund_core {:?}", refund_tracker.tracking_data ) })?; let key_manager_state = &state.into(); let key_store = state .store .get_merchant_key_store_by_merchant_id( key_manager_state, &refund_core.merchant_id, &state.store.get_master_key().to_vec().into(), ) .await?; let merchant_account = db .find_merchant_account_by_merchant_id( key_manager_state, &refund_core.merchant_id, &key_store, ) .await .to_not_found_response(errors::ApiErrorResponse::MerchantAccountNotFound)?; let refund = db .find_refund_by_internal_reference_id_merchant_id( &refund_core.refund_internal_reference_id, &refund_core.merchant_id, merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::RefundNotFound)?; match (&refund.sent_to_gateway, &refund.refund_status) { (false, enums::RefundStatus::Pending) => { let merchant_account = db .find_merchant_account_by_merchant_id( key_manager_state, &refund.merchant_id, &key_store, ) .await .to_not_found_response(errors::ApiErrorResponse::MerchantAccountNotFound)?; let payment_attempt = db .find_payment_attempt_by_connector_transaction_id_payment_id_merchant_id( &refund.connector_transaction_id, &refund_core.payment_id, &refund.merchant_id, merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::PaymentNotFound)?; let payment_intent = db .find_payment_intent_by_payment_id_merchant_id( &(state.into()), &payment_attempt.payment_id, &refund.merchant_id, &key_store, merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::PaymentNotFound)?; let split_refunds = core_utils::get_split_refunds(SplitRefundInput { split_payment_request: payment_intent.split_payments.clone(), payment_charges: payment_attempt.charges.clone(), charge_id: payment_attempt.charge_id.clone(), refund_request: refund.split_refunds.clone(), })?; //trigger refund request to gateway let updated_refund = Box::pin(trigger_refund_to_gateway( state, &refund, &merchant_account, &key_store, &payment_attempt, &payment_intent, None, split_refunds, )) .await?; add_refund_sync_task( db, &updated_refund, storage::ProcessTrackerRunner::RefundWorkflowRouter, ) .await?; } (true, enums::RefundStatus::Pending) => { // create sync task add_refund_sync_task( db, &refund, storage::ProcessTrackerRunner::RefundWorkflowRouter, ) .await?; } (_, _) => { //mark task as finished db.as_scheduler() .finish_process_with_business_status( refund_tracker.clone(), business_status::COMPLETED_BY_PT, ) .await?; } }; Ok(()) } <file_sep path="hyperswitch/crates/router/src/core/refunds.rs" role="context" start="1471" end="1471"> use diesel_models::process_tracker::business_status; use scheduler::{consumer::types::process_data, utils as process_tracker_utils}; use crate::{ consts, core::{ errors::{self, ConnectorErrorExt, RouterResponse, RouterResult, StorageErrorExt}, payments::{self, access_token, helpers}, refunds::transformers::SplitRefundInput, utils as core_utils, }, db, logger, routes::{metrics, SessionState}, services, types::{ self, api::{self, refunds}, domain, storage::{self, enums}, transformers::{ForeignFrom, ForeignInto}, }, utils::{self, OptionExt}, workflows::payment_sync, }; <file_sep path="hyperswitch/crates/router/src/core/refunds.rs" role="context" start="1606" end="1642"> pub async fn add_refund_sync_task( db: &dyn db::StorageInterface, refund: &storage::Refund, runner: storage::ProcessTrackerRunner, ) -> RouterResult<storage::ProcessTracker> { let task = "SYNC_REFUND"; let process_tracker_id = format!("{runner}_{task}_{}", refund.internal_reference_id); let schedule_time = common_utils::date_time::now(); let refund_workflow_tracking_data = refund_to_refund_core_workflow_model(refund); let tag = ["REFUND"]; let process_tracker_entry = storage::ProcessTrackerNew::new( process_tracker_id, task, runner, tag, refund_workflow_tracking_data, None, schedule_time, common_types::consts::API_VERSION, ) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to construct refund sync process tracker task")?; let response = db .insert_process(process_tracker_entry) .await .to_duplicate_response(errors::ApiErrorResponse::DuplicateRefundRequest) .attach_printable_lazy(|| { format!( "Failed while inserting task in process_tracker: refund_id: {}", refund.refund_id ) })?; metrics::TASKS_ADDED_COUNT.add(1, router_env::metric_attributes!(("flow", "Refund"))); Ok(response) } <file_sep path="hyperswitch/crates/router/src/core/refunds.rs" role="context" start="1593" end="1603"> pub fn refund_to_refund_core_workflow_model( refund: &storage::Refund, ) -> storage::RefundCoreWorkflow { storage::RefundCoreWorkflow { refund_internal_reference_id: refund.internal_reference_id.clone(), connector_transaction_id: refund.connector_transaction_id.clone(), merchant_id: refund.merchant_id.clone(), payment_id: refund.payment_id.clone(), processor_transaction_data: refund.processor_transaction_data.clone(), } } <file_sep path="hyperswitch/crates/router/src/core/refunds.rs" role="context" start="1456" end="1469"> pub async fn start_refund_workflow( state: &SessionState, refund_tracker: &storage::ProcessTracker, ) -> Result<(), errors::ProcessTrackerError> { match refund_tracker.name.as_deref() { Some("EXECUTE_REFUND") => { Box::pin(trigger_refund_execute_workflow(state, refund_tracker)).await } Some("SYNC_REFUND") => { Box::pin(sync_refund_with_gateway_workflow(state, refund_tracker)).await } _ => Err(errors::ProcessTrackerError::JobNotFound), } } <file_sep path="hyperswitch/crates/router/src/core/refunds.rs" role="context" start="1383" end="1453"> pub async fn sync_refund_with_gateway_workflow( state: &SessionState, refund_tracker: &storage::ProcessTracker, ) -> Result<(), errors::ProcessTrackerError> { let key_manager_state = &state.into(); let refund_core = serde_json::from_value::<storage::RefundCoreWorkflow>(refund_tracker.tracking_data.clone()) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable_lazy(|| { format!( "unable to convert into refund_core {:?}", refund_tracker.tracking_data ) })?; let key_store = state .store .get_merchant_key_store_by_merchant_id( key_manager_state, &refund_core.merchant_id, &state.store.get_master_key().to_vec().into(), ) .await?; let merchant_account = state .store .find_merchant_account_by_merchant_id( key_manager_state, &refund_core.merchant_id, &key_store, ) .await?; let response = Box::pin(refund_retrieve_core_with_internal_reference_id( state.clone(), merchant_account, None, key_store, refund_core.refund_internal_reference_id, Some(true), )) .await?; let terminal_status = [ enums::RefundStatus::Success, enums::RefundStatus::Failure, enums::RefundStatus::TransactionFailure, ]; match response.refund_status { status if terminal_status.contains(&status) => { state .store .as_scheduler() .finish_process_with_business_status( refund_tracker.clone(), business_status::COMPLETED_BY_PT, ) .await? } _ => { _ = payment_sync::retry_sync_task( &*state.store, response.connector, response.merchant_id, refund_tracker.to_owned(), ) .await?; } } Ok(()) } <file_sep path="hyperswitch/crates/router/src/core/refunds.rs" role="context" start="139" end="431"> pub async fn trigger_refund_to_gateway( state: &SessionState, refund: &storage::Refund, merchant_account: &domain::MerchantAccount, key_store: &domain::MerchantKeyStore, payment_attempt: &storage::PaymentAttempt, payment_intent: &storage::PaymentIntent, creds_identifier: Option<String>, split_refunds: Option<SplitRefundsRequest>, ) -> RouterResult<storage::Refund> { let routed_through = payment_attempt .connector .clone() .ok_or(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to retrieve connector from payment attempt")?; let storage_scheme = merchant_account.storage_scheme; metrics::REFUND_COUNT.add( 1, router_env::metric_attributes!(("connector", routed_through.clone())), ); let connector: api::ConnectorData = api::ConnectorData::get_connector_by_name( &state.conf.connectors, &routed_through, api::GetToken::Connector, payment_attempt.merchant_connector_id.clone(), )?; let currency = payment_attempt.currency.ok_or_else(|| { report!(errors::ApiErrorResponse::InternalServerError).attach_printable( "Transaction in invalid. Missing field \"currency\" in payment_attempt.", ) })?; validator::validate_for_valid_refunds(payment_attempt, connector.connector_name)?; let mut router_data = core_utils::construct_refund_router_data( state, &routed_through, merchant_account, key_store, (payment_attempt.get_total_amount(), currency), payment_intent, payment_attempt, refund, creds_identifier.clone(), split_refunds, ) .await?; let add_access_token_result = access_token::add_access_token( state, &connector, merchant_account, &router_data, creds_identifier.as_deref(), ) .await?; logger::debug!(refund_router_data=?router_data); access_token::update_router_data_with_access_token_result( &add_access_token_result, &mut router_data, &payments::CallConnectorAction::Trigger, ); let router_data_res = if !(add_access_token_result.connector_supports_access_token && router_data.access_token.is_none()) { let connector_integration: services::BoxedRefundConnectorIntegrationInterface< api::Execute, types::RefundsData, types::RefundsResponseData, > = connector.connector.get_connector_integration(); let router_data_res = services::execute_connector_processing_step( state, connector_integration, &router_data, payments::CallConnectorAction::Trigger, None, ) .await; let option_refund_error_update = router_data_res .as_ref() .err() .and_then(|error| match error.current_context() { errors::ConnectorError::NotImplemented(message) => { Some(storage::RefundUpdate::ErrorUpdate { refund_status: Some(enums::RefundStatus::Failure), refund_error_message: Some( errors::ConnectorError::NotImplemented(message.to_owned()) .to_string(), ), refund_error_code: Some("NOT_IMPLEMENTED".to_string()), updated_by: storage_scheme.to_string(), connector_refund_id: None, processor_refund_data: None, unified_code: None, unified_message: None, issuer_error_code: None, issuer_error_message: None, }) } errors::ConnectorError::NotSupported { message, connector } => { Some(storage::RefundUpdate::ErrorUpdate { refund_status: Some(enums::RefundStatus::Failure), refund_error_message: Some(format!( "{message} is not supported by {connector}" )), refund_error_code: Some("NOT_SUPPORTED".to_string()), updated_by: storage_scheme.to_string(), connector_refund_id: None, processor_refund_data: None, unified_code: None, unified_message: None, issuer_error_code: None, issuer_error_message: None, }) } _ => None, }); // Update the refund status as failure if connector_error is NotImplemented if let Some(refund_error_update) = option_refund_error_update { state .store .update_refund( refund.to_owned(), refund_error_update, merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::InternalServerError) .attach_printable_lazy(|| { format!( "Failed while updating refund: refund_id: {}", refund.refund_id ) })?; } let mut refund_router_data_res = router_data_res.to_refund_failed_response()?; // Initiating Integrity check let integrity_result = check_refund_integrity( &refund_router_data_res.request, &refund_router_data_res.response, ); refund_router_data_res.integrity_check = integrity_result; refund_router_data_res } else { router_data }; let refund_update = match router_data_res.response { Err(err) => { let option_gsm = helpers::get_gsm_record( state, Some(err.code.clone()), Some(err.message.clone()), connector.connector_name.to_string(), consts::REFUND_FLOW_STR.to_string(), ) .await; // Note: Some connectors do not have a separate list of refund errors // In such cases, the error codes and messages are stored under "Authorize" flow in GSM table // So we will have to fetch the GSM using Authorize flow in case GSM is not found using "refund_flow" let option_gsm = if option_gsm.is_none() { helpers::get_gsm_record( state, Some(err.code.clone()), Some(err.message.clone()), connector.connector_name.to_string(), consts::AUTHORIZE_FLOW_STR.to_string(), ) .await } else { option_gsm }; let gsm_unified_code = option_gsm.as_ref().and_then(|gsm| gsm.unified_code.clone()); let gsm_unified_message = option_gsm.and_then(|gsm| gsm.unified_message); let (unified_code, unified_message) = if let Some((code, message)) = gsm_unified_code.as_ref().zip(gsm_unified_message.as_ref()) { (code.to_owned(), message.to_owned()) } else { ( consts::DEFAULT_UNIFIED_ERROR_CODE.to_owned(), consts::DEFAULT_UNIFIED_ERROR_MESSAGE.to_owned(), ) }; storage::RefundUpdate::ErrorUpdate { refund_status: Some(enums::RefundStatus::Failure), refund_error_message: err.reason.or(Some(err.message)), refund_error_code: Some(err.code), updated_by: storage_scheme.to_string(), connector_refund_id: None, processor_refund_data: None, unified_code: Some(unified_code), unified_message: Some(unified_message), issuer_error_code: err.network_decline_code, issuer_error_message: err.network_error_message, } } Ok(response) => { // match on connector integrity checks match router_data_res.integrity_check.clone() { Err(err) => { let (refund_connector_transaction_id, processor_refund_data) = err.connector_transaction_id.map_or((None, None), |txn_id| { let (refund_id, refund_data) = ConnectorTransactionId::form_id_and_data(txn_id); (Some(refund_id), refund_data) }); metrics::INTEGRITY_CHECK_FAILED.add( 1, router_env::metric_attributes!( ("connector", connector.connector_name.to_string()), ("merchant_id", merchant_account.get_id().clone()), ), ); storage::RefundUpdate::ErrorUpdate { refund_status: Some(enums::RefundStatus::ManualReview), refund_error_message: Some(format!( "Integrity Check Failed! as data mismatched for fields {}", err.field_names )), refund_error_code: Some("IE".to_string()), updated_by: storage_scheme.to_string(), connector_refund_id: refund_connector_transaction_id, processor_refund_data, unified_code: None, unified_message: None, issuer_error_code: None, issuer_error_message: None, } } Ok(()) => { if response.refund_status == diesel_models::enums::RefundStatus::Success { metrics::SUCCESSFUL_REFUND.add( 1, router_env::metric_attributes!(( "connector", connector.connector_name.to_string(), )), ) } let (connector_refund_id, processor_refund_data) = ConnectorTransactionId::form_id_and_data(response.connector_refund_id); storage::RefundUpdate::Update { connector_refund_id, refund_status: response.refund_status, sent_to_gateway: true, refund_error_message: None, refund_arn: "".to_string(), updated_by: storage_scheme.to_string(), processor_refund_data, } } } } }; let response = state .store .update_refund( refund.to_owned(), refund_update, merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::InternalServerError) .attach_printable_lazy(|| { format!( "Failed while updating refund: refund_id: {}", refund.refund_id ) })?; utils::trigger_refund_outgoing_webhook( state, merchant_account, &response, payment_attempt.profile_id.clone(), key_store, ) .await .map_err(|error| logger::warn!(refunds_outgoing_webhook_error=?error)) .ok(); Ok(response) } <file_sep path="hyperswitch/crates/router/src/connector/dummyconnector/transformers.rs" role="context" start="304" end="309"> pub enum RefundStatus { Succeeded, Failed, #[default] Processing, } <file_sep path="hyperswitch/migrations/2022-09-29-084920_create_initial_tables/up.sql" role="context" start="430" end="446"> created_at TIMESTAMP NOT NULL, last_modified TIMESTAMP NOT NULL, payment_method "PaymentMethodType" NOT NULL, payment_method_type "PaymentMethodSubType", payment_method_issuer VARCHAR(255), payment_method_issuer_code "PaymentMethodIssuerCode" ); CREATE TABLE process_tracker ( id VARCHAR(127) PRIMARY KEY, NAME VARCHAR(255), tag TEXT [ ] NOT NULL DEFAULT '{}'::TEXT [ ], runner VARCHAR(255), retry_count INTEGER NOT NULL, schedule_time TIMESTAMP, rule VARCHAR(255) NOT NULL, tracking_data JSON NOT NULL,
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/connector/gpayments/transformers.rs<|crate|> router anchor=try_from kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/connector/gpayments/transformers.rs" role="context" start="313" end="361"> fn try_from( item: types::ResponseRouterData< api::PreAuthentication, gpayments_types::GpaymentsPreAuthenticationResponse, types::authentication::PreAuthNRequestData, types::authentication::AuthenticationResponseData, >, ) -> Result<Self, Self::Error> { let threeds_method_response = item.response; let three_ds_method_data = threeds_method_response .three_ds_method_url .as_ref() .map(|_| { let three_ds_method_data_json = serde_json::json!({ "threeDSServerTransID": threeds_method_response.three_ds_server_trans_id, "threeDSMethodNotificationURL": "https://webhook.site/bd06863d-82c2-42ea-b35b-5ffd5ecece71" }); to_string(&three_ds_method_data_json) .change_context(errors::ConnectorError::ResponseDeserializationFailed) .attach_printable("error while constructing three_ds_method_data_str") .map(|three_ds_method_data_string| { Engine::encode(&BASE64_ENGINE, three_ds_method_data_string) }) }) .transpose()?; let connector_metadata = Some(serde_json::json!( gpayments_types::GpaymentsConnectorMetaData { authentication_url: threeds_method_response.auth_url, three_ds_requestor_trans_id: None, } )); let response: Result< types::authentication::AuthenticationResponseData, types::ErrorResponse, > = Ok( types::authentication::AuthenticationResponseData::PreAuthThreeDsMethodCallResponse { threeds_server_transaction_id: threeds_method_response .three_ds_server_trans_id .clone(), three_ds_method_data, three_ds_method_url: threeds_method_response.three_ds_method_url, connector_metadata, }, ); Ok(Self { response, ..item.data.clone() }) } <file_sep path="hyperswitch/crates/router/src/connector/gpayments/transformers.rs" role="context" start="312" end="312"> use base64::Engine; use common_utils::{date_time, types::MinorUnit}; use serde_json::to_string; use super::gpayments_types; use crate::{ connector::{ gpayments::gpayments_types::{ AuthStatus, BrowserInfoCollected, GpaymentsAuthenticationSuccessResponse, }, utils, utils::{get_card_details, CardData}, }, consts::BASE64_ENGINE, core::errors, types::{self, api, api::MessageCategory, authentication::ChallengeParams}, }; <file_sep path="hyperswitch/crates/router/src/connector/gpayments/transformers.rs" role="context" start="250" end="299"> fn try_from( item: types::ResponseRouterData< api::Authentication, GpaymentsAuthenticationSuccessResponse, types::authentication::ConnectorAuthenticationRequestData, types::authentication::AuthenticationResponseData, >, ) -> Result<Self, Self::Error> { let response_auth = item.response; let creq = serde_json::json!({ "threeDSServerTransID": response_auth.three_ds_server_trans_id, "acsTransID": response_auth.acs_trans_id, "messageVersion": response_auth.message_version, "messageType": "CReq", "challengeWindowSize": "01", }); let creq_str = to_string(&creq) .change_context(errors::ConnectorError::ResponseDeserializationFailed) .attach_printable("error while constructing creq_str")?; let creq_base64 = Engine::encode(&BASE64_ENGINE, creq_str) .trim_end_matches('=') .to_owned(); let response: Result< types::authentication::AuthenticationResponseData, types::ErrorResponse, > = Ok( types::authentication::AuthenticationResponseData::AuthNResponse { trans_status: response_auth.trans_status.clone().into(), authn_flow_type: if response_auth.trans_status == AuthStatus::C { types::authentication::AuthNFlowType::Challenge(Box::new(ChallengeParams { acs_url: response_auth.acs_url, challenge_request: Some(creq_base64), acs_reference_number: Some(response_auth.acs_reference_number.clone()), acs_trans_id: Some(response_auth.acs_trans_id.clone()), three_dsserver_trans_id: Some(response_auth.three_ds_server_trans_id), acs_signed_content: None, })) } else { types::authentication::AuthNFlowType::Frictionless }, authentication_value: response_auth.authentication_value, ds_trans_id: Some(response_auth.ds_trans_id), connector_metadata: None, }, ); Ok(Self { response, ..item.data.clone() }) } <file_sep path="hyperswitch/crates/router/src/connector/gpayments/transformers.rs" role="context" start="162" end="237"> fn try_from( item: &GpaymentsRouterData<&types::authentication::ConnectorAuthenticationRouterData>, ) -> Result<Self, Self::Error> { let request = &item.router_data.request; let browser_details = match request.browser_details.clone() { Some(details) => Ok::<Option<types::BrowserInformation>, Self::Error>(Some(details)), None => { if request.device_channel == DeviceChannel::Browser { Err(errors::ConnectorError::MissingRequiredField { field_name: "browser_info", })? } else { Ok(None) } } }?; let card_details = get_card_details(request.payment_method_data.clone(), "gpayments")?; let metadata = GpaymentsMetaData::try_from(&item.router_data.connector_meta_data)?; Ok(Self { acct_number: card_details.card_number.clone(), authentication_ind: "01".into(), card_expiry_date: card_details.get_expiry_date_as_yymm()?.expose(), merchant_id: metadata.merchant_id, message_category: match item.router_data.request.message_category.clone() { MessageCategory::Payment => "01".into(), MessageCategory::NonPayment => "02".into(), }, notification_url: request .return_url .clone() .ok_or(errors::ConnectorError::RequestEncodingFailed) .attach_printable("missing return_url")?, three_ds_comp_ind: request.threeds_method_comp_ind.clone(), purchase_amount: item.amount.to_string(), purchase_date: date_time::DateTime::<date_time::YYYYMMDDHHmmss>::from(date_time::now()) .to_string(), three_ds_server_trans_id: request .pre_authentication_data .threeds_server_transaction_id .clone(), browser_info_collected: BrowserInfoCollected { browser_javascript_enabled: browser_details .as_ref() .and_then(|details| details.java_script_enabled), browser_accept_header: browser_details .as_ref() .and_then(|details| details.accept_header.clone()), browser_ip: browser_details .clone() .and_then(|details| details.ip_address.map(|ip| Secret::new(ip.to_string()))), browser_java_enabled: browser_details .as_ref() .and_then(|details| details.java_enabled), browser_language: browser_details .as_ref() .and_then(|details| details.language.clone()), browser_color_depth: browser_details .as_ref() .and_then(|details| details.color_depth.map(|a| a.to_string())), browser_screen_height: browser_details .as_ref() .and_then(|details| details.screen_height.map(|a| a.to_string())), browser_screen_width: browser_details .as_ref() .and_then(|details| details.screen_width.map(|a| a.to_string())), browser_tz: browser_details .as_ref() .and_then(|details| details.time_zone.map(|a| a.to_string())), browser_user_agent: browser_details .as_ref() .and_then(|details| details.user_agent.clone().map(|a| a.to_string())), }, }) } <file_sep path="hyperswitch/crates/router/src/connector/gpayments/transformers.rs" role="context" start="138" end="154"> fn try_from( value: &GpaymentsRouterData<&types::authentication::PreAuthNRouterData>, ) -> Result<Self, Self::Error> { let router_data = value.router_data; let metadata = GpaymentsMetaData::try_from(&router_data.connector_meta_data)?; Ok(Self { acct_number: router_data.request.card.card_number.clone(), card_scheme: None, challenge_window_size: Some(gpayments_types::ChallengeWindowSize::FullScreen), event_callback_url: "https://webhook.site/55e3db24-7c4e-4432-9941-d806f68d210b" .to_string(), merchant_id: metadata.merchant_id, skip_auto_browser_info_collect: Some(true), // should auto generate this id. three_ds_requestor_trans_id: uuid::Uuid::new_v4().hyphenated().to_string(), }) } <file_sep path="hyperswitch/crates/router/src/connector/gpayments/transformers.rs" role="context" start="66" end="75"> fn try_from( value: &GpaymentsRouterData<&types::authentication::PreAuthNVersionCallRouterData>, ) -> Result<Self, Self::Error> { let router_data = value.router_data; let metadata = GpaymentsMetaData::try_from(&router_data.connector_meta_data)?; Ok(Self { acct_number: router_data.request.card.card_number.clone(), merchant_id: metadata.merchant_id, }) } <file_sep path="hyperswitch/crates/router/src/connector/gpayments/transformers.rs" role="context" start="46" end="46"> type Error = error_stack::Report<errors::ConnectorError>; <file_sep path="hyperswitch/crates/router/src/connector/riskified/transformers/api.rs" role="context" start="614" end="616"> pub struct ErrorResponse { pub error: ErrorData, } <file_sep path="hyperswitch/crates/api_models/src/payment_methods.rs" role="context" start="2478" end="2478"> type Error = error_stack::Report<errors::ValidationError>;
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/configs/settings.rs<|crate|> router anchor=with_config_path kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/configs/settings.rs" role="context" start="911" end="958"> pub fn with_config_path(config_path: Option<PathBuf>) -> ApplicationResult<Self> { // Configuration values are picked up in the following priority order (1 being least // priority): // 1. Defaults from the implementation of the `Default` trait. // 2. Values from config file. The config file accessed depends on the environment // specified by the `RUN_ENV` environment variable. `RUN_ENV` can be one of // `development`, `sandbox` or `production`. If nothing is specified for `RUN_ENV`, // `/config/development.toml` file is read. // 3. Environment variables prefixed with `ROUTER` and each level separated by double // underscores. // // Values in config file override the defaults in `Default` trait, and the values set using // environment variables override both the defaults and the config file values. let environment = env::which(); let config_path = router_env::Config::config_path(&environment.to_string(), config_path); let config = router_env::Config::builder(&environment.to_string()) .change_context(ApplicationError::ConfigurationError)? .add_source(File::from(config_path).required(false)); #[cfg(feature = "v2")] let config = { let required_fields_config_file = router_env::Config::get_config_directory().join(REQUIRED_FIELDS_CONFIG_FILE); config.add_source(File::from(required_fields_config_file).required(false)) }; let config = config .add_source( Environment::with_prefix("ROUTER") .try_parsing(true) .separator("__") .list_separator(",") .with_list_parse_key("log.telemetry.route_to_trace") .with_list_parse_key("redis.cluster_urls") .with_list_parse_key("events.kafka.brokers") .with_list_parse_key("connectors.supported.wallets") .with_list_parse_key("connector_request_reference_id_config.merchant_ids_send_payment_id_as_connector_request_id"), ) .build() .change_context(ApplicationError::ConfigurationError)?; serde_path_to_error::deserialize(config) .attach_printable("Unable to deserialize application configuration") .change_context(ApplicationError::ConfigurationError) } <file_sep path="hyperswitch/crates/router/src/configs/settings.rs" role="context" start="910" end="910"> use std::{ collections::{HashMap, HashSet}, path::PathBuf, sync::Arc, }; use config::{Environment, File}; pub use hyperswitch_interfaces::configs::Connectors; pub use router_env::config::{Log, LogConsole, LogFile, LogTelemetry}; use storage_impl::config::QueueStrategy; use crate::{ configs, core::errors::{ApplicationError, ApplicationResult}, env::{self, Env}, events::EventsConfig, routes::app, AppState, }; <file_sep path="hyperswitch/crates/router/src/configs/settings.rs" role="context" start="1058" end="1060"> pub fn is_kv_soft_kill_mode(&self) -> bool { self.kv_config.soft_kill.unwrap_or(false) } <file_sep path="hyperswitch/crates/router/src/configs/settings.rs" role="context" start="960" end="1053"> pub fn validate(&self) -> ApplicationResult<()> { self.server.validate()?; self.master_database.get_inner().validate()?; #[cfg(feature = "olap")] self.replica_database.get_inner().validate()?; // The logger may not yet be initialized when validating the application configuration #[allow(clippy::print_stderr)] self.redis.validate().map_err(|error| { eprintln!("{error}"); ApplicationError::InvalidConfigurationValueError("Redis configuration".into()) })?; if self.log.file.enabled { if self.log.file.file_name.is_default_or_empty() { return Err(error_stack::Report::from( ApplicationError::InvalidConfigurationValueError( "log file name must not be empty".into(), ), )); } if self.log.file.path.is_default_or_empty() { return Err(error_stack::Report::from( ApplicationError::InvalidConfigurationValueError( "log directory path must not be empty".into(), ), )); } } self.secrets.get_inner().validate()?; self.locker.validate()?; self.connectors.validate("connectors")?; self.cors.validate()?; self.scheduler .as_ref() .map(|scheduler_settings| scheduler_settings.validate()) .transpose()?; #[cfg(feature = "kv_store")] self.drainer.validate()?; self.api_keys.get_inner().validate()?; self.file_storage .validate() .map_err(|err| ApplicationError::InvalidConfigurationValueError(err.to_string()))?; self.lock_settings.validate()?; self.events.validate()?; #[cfg(feature = "olap")] self.opensearch.validate()?; self.encryption_management .validate() .map_err(|err| ApplicationError::InvalidConfigurationValueError(err.into()))?; self.secrets_management .validate() .map_err(|err| ApplicationError::InvalidConfigurationValueError(err.into()))?; self.generic_link.payment_method_collect.validate()?; self.generic_link.payout_link.validate()?; #[cfg(feature = "v2")] self.cell_information.validate()?; self.network_tokenization_service .as_ref() .map(|x| x.get_inner().validate()) .transpose()?; self.paze_decrypt_keys .as_ref() .map(|x| x.get_inner().validate()) .transpose()?; self.google_pay_decrypt_keys .as_ref() .map(|x| x.validate()) .transpose()?; self.key_manager.get_inner().validate()?; #[cfg(feature = "email")] self.email .validate() .map_err(|err| ApplicationError::InvalidConfigurationValueError(err.into()))?; self.theme .storage .validate() .map_err(|err| ApplicationError::InvalidConfigurationValueError(err.to_string()))?; Ok(()) } <file_sep path="hyperswitch/crates/router/src/configs/settings.rs" role="context" start="907" end="909"> pub fn new() -> ApplicationResult<Self> { Self::with_config_path(None) } <file_sep path="hyperswitch/crates/router/src/configs/settings.rs" role="context" start="778" end="791"> fn from(val: Database) -> Self { Self { username: val.username, password: val.password, host: val.host, port: val.port, dbname: val.dbname, pool_size: val.pool_size, connection_timeout: val.connection_timeout, queue_strategy: val.queue_strategy, min_idle: val.min_idle, max_lifetime: val.max_lifetime, } } <file_sep path="hyperswitch/crates/router/src/configs/settings.rs" role="context" start="1330" end="1362"> fn deserialize<D: serde::Deserializer<'de>>(deserializer: D) -> Result<Self, D::Error> { #[derive(Deserialize)] struct Inner { base_url: String, schema: String, accounts_schema: String, redis_key_prefix: String, clickhouse_database: String, user: TenantUserConfig, } let hashmap = <HashMap<id_type::TenantId, Inner>>::deserialize(deserializer)?; Ok(Self( hashmap .into_iter() .map(|(key, value)| { ( key.clone(), Tenant { tenant_id: key, base_url: value.base_url, schema: value.schema, accounts_schema: value.accounts_schema, redis_key_prefix: value.redis_key_prefix, clickhouse_database: value.clickhouse_database, user: value.user, }, ) }) .collect(), )) } <file_sep path="hyperswitch/crates/router/src/types/api/configs.rs" role="context" start="2" end="5"> pub struct Config { pub key: String, pub value: String, } <file_sep path="hyperswitch-encryption-service/migrations/2024-05-28-075150_create_dek_table/up.sql" role="context" start="1" end="9"> CREATE TABLE IF NOT EXISTS data_key_store ( id SERIAL PRIMARY KEY, key_identifier VARCHAR(255) NOT NULL, data_identifier VARCHAR(20) NOT NULL, encryption_key bytea NOT NULL, version VARCHAR(30) NOT NULL, created_at TIMESTAMP NOT NULL );
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/utils/user/two_factor_auth.rs<|crate|> router anchor=get_totp_secret_key kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=1<|meta_end|> <file_sep path="hyperswitch/crates/router/src/utils/user/two_factor_auth.rs" role="context" start="103" end="105"> fn get_totp_secret_key(user_id: &str) -> String { format!("{}{}", consts::user::REDIS_TOTP_SECRET_PREFIX, user_id) } <file_sep path="hyperswitch/crates/router/src/utils/user/two_factor_auth.rs" role="context" start="102" end="102"> use crate::{ consts, core::errors::{UserErrors, UserResult}, routes::SessionState, }; <file_sep path="hyperswitch/crates/router/src/utils/user/two_factor_auth.rs" role="context" start="120" end="128"> pub async fn delete_totp_from_redis(state: &SessionState, user_id: &str) -> UserResult<()> { let redis_conn = super::get_redis_connection(state)?; let key = format!("{}{}", consts::user::REDIS_TOTP_PREFIX, user_id); redis_conn .delete_key(&key.into()) .await .change_context(UserErrors::InternalServerError) .map(|_| ()) } <file_sep path="hyperswitch/crates/router/src/utils/user/two_factor_auth.rs" role="context" start="107" end="118"> pub async fn insert_recovery_code_in_redis(state: &SessionState, user_id: &str) -> UserResult<()> { let redis_conn = super::get_redis_connection(state)?; let key = format!("{}{}", consts::user::REDIS_RECOVERY_CODE_PREFIX, user_id); redis_conn .set_key_with_expiry( &key.as_str().into(), common_utils::date_time::now_unix_timestamp(), state.conf.user.two_factor_auth_expiry_in_secs, ) .await .change_context(UserErrors::InternalServerError) } <file_sep path="hyperswitch/crates/router/src/utils/user/two_factor_auth.rs" role="context" start="94" end="101"> pub async fn delete_totp_secret_from_redis(state: &SessionState, user_id: &str) -> UserResult<()> { let redis_conn = super::get_redis_connection(state)?; redis_conn .delete_key(&get_totp_secret_key(user_id).into()) .await .change_context(UserErrors::InternalServerError) .map(|_| ()) } <file_sep path="hyperswitch/crates/router/src/utils/user/two_factor_auth.rs" role="context" start="82" end="92"> pub async fn get_totp_secret_from_redis( state: &SessionState, user_id: &str, ) -> UserResult<Option<masking::Secret<String>>> { let redis_conn = super::get_redis_connection(state)?; redis_conn .get_key::<Option<String>>(&get_totp_secret_key(user_id).into()) .await .change_context(UserErrors::InternalServerError) .map(|secret| secret.map(Into::into)) }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/utils/user/two_factor_auth.rs<|crate|> router anchor=get_totp_attempts_key kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=1<|meta_end|> <file_sep path="hyperswitch/crates/router/src/utils/user/two_factor_auth.rs" role="context" start="143" end="145"> fn get_totp_attempts_key(user_id: &str) -> String { format!("{}{}", consts::user::REDIS_TOTP_ATTEMPTS_PREFIX, user_id) } <file_sep path="hyperswitch/crates/router/src/utils/user/two_factor_auth.rs" role="context" start="142" end="142"> use crate::{ consts, core::errors::{UserErrors, UserResult}, routes::SessionState, }; <file_sep path="hyperswitch/crates/router/src/utils/user/two_factor_auth.rs" role="context" start="154" end="168"> pub async fn insert_totp_attempts_in_redis( state: &SessionState, user_id: &str, user_totp_attempts: u8, ) -> UserResult<()> { let redis_conn = super::get_redis_connection(state)?; redis_conn .set_key_with_expiry( &get_totp_attempts_key(user_id).into(), user_totp_attempts, consts::user::REDIS_TOTP_ATTEMPTS_TTL_IN_SECS, ) .await .change_context(UserErrors::InternalServerError) } <file_sep path="hyperswitch/crates/router/src/utils/user/two_factor_auth.rs" role="context" start="146" end="152"> fn get_recovery_code_attempts_key(user_id: &str) -> String { format!( "{}{}", consts::user::REDIS_RECOVERY_CODE_ATTEMPTS_PREFIX, user_id ) } <file_sep path="hyperswitch/crates/router/src/utils/user/two_factor_auth.rs" role="context" start="130" end="141"> pub async fn delete_recovery_code_from_redis( state: &SessionState, user_id: &str, ) -> UserResult<()> { let redis_conn = super::get_redis_connection(state)?; let key = format!("{}{}", consts::user::REDIS_RECOVERY_CODE_PREFIX, user_id); redis_conn .delete_key(&key.into()) .await .change_context(UserErrors::InternalServerError) .map(|_| ()) } <file_sep path="hyperswitch/crates/router/src/utils/user/two_factor_auth.rs" role="context" start="120" end="128"> pub async fn delete_totp_from_redis(state: &SessionState, user_id: &str) -> UserResult<()> { let redis_conn = super::get_redis_connection(state)?; let key = format!("{}{}", consts::user::REDIS_TOTP_PREFIX, user_id); redis_conn .delete_key(&key.into()) .await .change_context(UserErrors::InternalServerError) .map(|_| ()) } <file_sep path="hyperswitch/crates/router/src/utils/user/two_factor_auth.rs" role="context" start="206" end="216"> pub async fn delete_totp_attempts_from_redis( state: &SessionState, user_id: &str, ) -> UserResult<()> { let redis_conn = super::get_redis_connection(state)?; redis_conn .delete_key(&get_totp_attempts_key(user_id).into()) .await .change_context(UserErrors::InternalServerError) .map(|_| ()) } <file_sep path="hyperswitch/crates/router/src/utils/user/two_factor_auth.rs" role="context" start="169" end="176"> pub async fn get_totp_attempts_from_redis(state: &SessionState, user_id: &str) -> UserResult<u8> { let redis_conn = super::get_redis_connection(state)?; redis_conn .get_key::<Option<u8>>(&get_totp_attempts_key(user_id).into()) .await .change_context(UserErrors::InternalServerError) .map(|v| v.unwrap_or(0)) }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/connector/riskified/transformers/api.rs<|crate|> router anchor=from kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=1<|meta_end|> <file_sep path="hyperswitch/crates/router/src/connector/riskified/transformers/api.rs" role="context" start="674" end="679"> fn from(value: RiskifiedWebhookStatus) -> Self { match value { RiskifiedWebhookStatus::Declined => Self::FrmRejected, RiskifiedWebhookStatus::Approved => Self::FrmApproved, } } <file_sep path="hyperswitch/crates/router/src/connector/riskified/transformers/api.rs" role="context" start="651" end="659"> fn get_fulfillment_status( status: core_types::FulfillmentStatus, ) -> Option<FulfillmentRequestStatus> { match status { core_types::FulfillmentStatus::COMPLETE => Some(FulfillmentRequestStatus::Success), core_types::FulfillmentStatus::CANCELED => Some(FulfillmentRequestStatus::Cancelled), core_types::FulfillmentStatus::PARTIAL | core_types::FulfillmentStatus::REPLACEMENT => None, } } <file_sep path="hyperswitch/crates/router/src/connector/riskified/transformers/api.rs" role="context" start="625" end="648"> fn try_from( address_info: &hyperswitch_domain_models::address::Address, ) -> Result<Self, Self::Error> { let address = address_info .clone() .address .ok_or(errors::ConnectorError::MissingRequiredField { field_name: "address", })?; Ok(Self { first_name: address.first_name.clone(), last_name: address.last_name.clone(), address1: address.line1.clone(), country_code: address.country, city: address.city.clone(), province: address.state.clone(), zip: address.zip.clone(), phone: address_info .phone .clone() .and_then(|phone_data| phone_data.number), }) } <file_sep path="hyperswitch/crates/router/src/connector/riskified/transformers/api.rs" role="context" start="164" end="273"> fn try_from( payment: &RiskifiedRouterData<&frm_types::FrmCheckoutRouterData>, ) -> Result<Self, Self::Error> { let payment_data = payment.router_data.clone(); let metadata: RiskifiedMetadata = payment_data .frm_metadata .clone() .ok_or(errors::ConnectorError::MissingRequiredField { field_name: "frm_metadata", })? .parse_value("Riskified Metadata") .change_context(errors::ConnectorError::InvalidDataFormat { field_name: "frm_metadata", })?; let billing_address = payment_data.get_billing()?; let shipping_address = payment_data.get_shipping_address_with_phone_number()?; let address = payment_data.get_billing_address()?; let line_items = payment_data .request .get_order_details()? .iter() .map(|order_detail| { let price = convert_amount( payment.amount_converter, order_detail.amount, payment_data.request.currency.ok_or_else(|| { errors::ConnectorError::MissingRequiredField { field_name: "currency", } })?, )?; Ok(LineItem { price, quantity: i32::from(order_detail.quantity), title: order_detail.product_name.clone(), product_type: order_detail.product_type.clone(), requires_shipping: order_detail.requires_shipping, product_id: order_detail.product_id.clone(), category: order_detail.category.clone(), brand: order_detail.brand.clone(), }) }) .collect::<Result<Vec<_>, Self::Error>>()?; Ok(Self { order: CheckoutRequest { id: payment_data.attempt_id.clone(), email: payment_data.request.email.clone(), created_at: common_utils::date_time::now(), updated_at: common_utils::date_time::now(), gateway: payment_data.request.gateway.clone(), total_price: payment.amount.clone(), cart_token: payment_data.attempt_id.clone(), line_items, source: Source::DesktopWeb, billing_address: OrderAddress::try_from(billing_address).ok(), shipping_address: OrderAddress::try_from(shipping_address).ok(), total_discounts: 0, currency: payment_data.request.currency, referring_site: "hyperswitch.io".to_owned(), discount_codes: Vec::new(), shipping_lines: metadata.shipping_lines, customer: RiskifiedCustomer { email: payment_data.request.email.clone(), first_name: address.get_first_name().ok().cloned(), last_name: address.get_last_name().ok().cloned(), created_at: common_utils::date_time::now(), verified_email: false, id: payment_data.get_customer_id()?, account_type: CustomerAccountType::Guest, orders_count: 0, phone: billing_address .clone() .phone .and_then(|phone_data| phone_data.number), }, browser_ip: payment_data .request .browser_info .as_ref() .and_then(|browser_info| browser_info.ip_address), client_details: ClientDetails { user_agent: payment_data .request .browser_info .as_ref() .and_then(|browser_info| browser_info.user_agent.clone()), accept_language: payment_data.request.browser_info.as_ref().and_then( |browser_info: &types::BrowserInformation| browser_info.language.clone(), ), }, note: payment_data.description.clone(), vendor_name: metadata.vendor_name, payment_details: match payment_data.request.payment_method_data.as_ref() { Some(AdditionalPaymentData::Card(card_info)) => Some(PaymentDetails { credit_card_bin: card_info.card_isin.clone().map(Secret::new), credit_card_number: card_info .last4 .clone() .map(|last_four| format!("XXXX-XXXX-XXXX-{}", last_four)) .map(Secret::new), credit_card_company: card_info.card_network.clone(), }), Some(_) | None => None, }, }, }) } <file_sep path="hyperswitch/crates/router/src/connector/riskified/transformers/api.rs" role="context" start="320" end="338"> fn try_from( item: ResponseRouterData< F, RiskifiedPaymentsResponse, T, frm_types::FraudCheckResponseData, >, ) -> Result<Self, Self::Error> { Ok(Self { response: Ok(frm_types::FraudCheckResponseData::TransactionResponse { resource_id: ResponseId::ConnectorTransactionId(item.response.order.id), status: storage_enums::FraudCheckStatus::from(item.response.order.status), connector_metadata: None, score: None, reason: item.response.order.description.map(serde_json::Value::from), }), ..item.data }) } <file_sep path="hyperswitch/crates/router/src/connector/riskified/transformers/api.rs" role="context" start="668" end="671"> pub enum RiskifiedWebhookStatus { Approved, Declined, }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/connector/plaid.rs<|crate|> router anchor=get_url kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/connector/plaid.rs" role="context" start="358" end="364"> fn get_url( &self, _req: &types::PaymentsPostProcessingRouterData, connectors: &settings::Connectors, ) -> CustomResult<String, errors::ConnectorError> { Ok(format!("{}/link/token/create", self.base_url(connectors))) } <file_sep path="hyperswitch/crates/router/src/connector/plaid.rs" role="context" start="357" end="357"> use common_utils::types::{AmountConvertor, FloatMajorUnit, FloatMajorUnitForConnector}; use crate::{ configs::settings, connector::utils as connector_utils, core::errors::{self, CustomResult}, events::connector_api_logs::ConnectorEvent, headers, services::{ self, request::{self, Mask}, ConnectorIntegration, ConnectorSpecifications, ConnectorValidation, }, types::{ self, api::{self, ConnectorCommon, ConnectorCommonExt}, ErrorResponse, RequestContent, Response, }, utils::BytesExt, }; <file_sep path="hyperswitch/crates/router/src/connector/plaid.rs" role="context" start="375" end="395"> fn build_request( &self, req: &types::PaymentsPostProcessingRouterData, connectors: &settings::Connectors, ) -> CustomResult<Option<services::Request>, errors::ConnectorError> { Ok(Some( services::RequestBuilder::new() .method(services::Method::Post) .url(&types::PaymentsPostProcessingType::get_url( self, req, connectors, )?) .attach_default_headers() .headers(types::PaymentsPostProcessingType::get_headers( self, req, connectors, )?) .set_body(types::PaymentsPostProcessingType::get_request_body( self, req, connectors, )?) .build(), )) } <file_sep path="hyperswitch/crates/router/src/connector/plaid.rs" role="context" start="366" end="373"> fn get_request_body( &self, req: &types::PaymentsPostProcessingRouterData, _connectors: &settings::Connectors, ) -> CustomResult<RequestContent, errors::ConnectorError> { let connector_req = plaid::PlaidLinkTokenRequest::try_from(req)?; Ok(RequestContent::Json(Box::new(connector_req))) } <file_sep path="hyperswitch/crates/router/src/connector/plaid.rs" role="context" start="354" end="356"> fn get_content_type(&self) -> &'static str { self.common_get_content_type() } <file_sep path="hyperswitch/crates/router/src/connector/plaid.rs" role="context" start="346" end="352"> fn get_headers( &self, req: &types::PaymentsPostProcessingRouterData, connectors: &settings::Connectors, ) -> CustomResult<Vec<(String, request::Maskable<String>)>, errors::ConnectorError> { self.build_headers(req, connectors) } <file_sep path="hyperswitch/crates/router/src/connector/plaid.rs" role="context" start="293" end="309"> fn build_request( &self, req: &types::PaymentsSyncRouterData, connectors: &settings::Connectors, ) -> CustomResult<Option<services::Request>, errors::ConnectorError> { Ok(Some( services::RequestBuilder::new() .method(services::Method::Post) .url(&types::PaymentsSyncType::get_url(self, req, connectors)?) .attach_default_headers() .headers(types::PaymentsSyncType::get_headers(self, req, connectors)?) .set_body(types::PaymentsSyncType::get_request_body( self, req, connectors, )?) .build(), )) } <file_sep path="hyperswitch/crates/router/src/connector/plaid.rs" role="context" start="208" end="228"> fn build_request( &self, req: &types::PaymentsAuthorizeRouterData, connectors: &settings::Connectors, ) -> CustomResult<Option<services::Request>, errors::ConnectorError> { Ok(Some( services::RequestBuilder::new() .method(services::Method::Post) .url(&types::PaymentsAuthorizeType::get_url( self, req, connectors, )?) .attach_default_headers() .headers(types::PaymentsAuthorizeType::get_headers( self, req, connectors, )?) .set_body(types::PaymentsAuthorizeType::get_request_body( self, req, connectors, )?) .build(), )) } <file_sep path="hyperswitch/crates/router/src/types.rs" role="context" start="130" end="131"> pub type PaymentsPostProcessingRouterData = RouterData<PostProcessing, PaymentsPostProcessingData, PaymentsResponseData>;
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/services/card_testing_guard.rs<|crate|> router anchor=get_redis_connection kind=fn pack=symbol_neighborhood lang=rust role_window=k2 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/services/card_testing_guard.rs" role="context" start="11" end="17"> fn get_redis_connection<A: SessionStateInfo>(state: &A) -> RouterResult<Arc<RedisConnectionPool>> { state .store() .get_redis_conn() .change_context(ApiErrorResponse::InternalServerError) .attach_printable("Failed to get redis connection") } <file_sep path="hyperswitch/crates/router/src/services/card_testing_guard.rs" role="context" start="10" end="10"> use std::sync::Arc; use redis_interface::RedisConnectionPool; use crate::{ core::errors::{ApiErrorResponse, RouterResult}, routes::app::SessionStateInfo, }; <file_sep path="hyperswitch/crates/router/src/services/card_testing_guard.rs" role="context" start="36" end="51"> pub async fn get_blocked_count_from_cache<A>( state: &A, cache_key: &str, ) -> RouterResult<Option<i32>> where A: SessionStateInfo + Sync, { let redis_conn = get_redis_connection(state)?; let value: Option<i32> = redis_conn .get_key(&cache_key.into()) .await .change_context(ApiErrorResponse::InternalServerError)?; Ok(value) } <file_sep path="hyperswitch/crates/router/src/services/card_testing_guard.rs" role="context" start="19" end="34"> pub async fn set_blocked_count_in_cache<A>( state: &A, cache_key: &str, value: i32, expiry: i64, ) -> RouterResult<()> where A: SessionStateInfo + Sync, { let redis_conn = get_redis_connection(state)?; redis_conn .set_key_with_expiry(&cache_key.into(), value, expiry) .await .change_context(ApiErrorResponse::InternalServerError) } <file_sep path="hyperswitch/crates/router/src/core/errors.rs" role="context" start="31" end="31"> pub type RouterResult<T> = CustomResult<T, ApiErrorResponse>; <file_sep path="hyperswitch/crates/api_models/src/errors/types.rs" role="context" start="86" end="100"> pub enum ApiErrorResponse { Unauthorized(ApiError), ForbiddenCommonResource(ApiError), ForbiddenPrivateResource(ApiError), Conflict(ApiError), Gone(ApiError), Unprocessable(ApiError), InternalServerError(ApiError), NotImplemented(ApiError), ConnectorError(ApiError, #[serde(skip_serializing)] StatusCode), NotFound(ApiError), MethodNotAllowed(ApiError), BadRequest(ApiError), DomainError(ApiError), }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/connector/plaid.rs<|crate|> router anchor=get_headers kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/connector/plaid.rs" role="context" start="346" end="352"> fn get_headers( &self, req: &types::PaymentsPostProcessingRouterData, connectors: &settings::Connectors, ) -> CustomResult<Vec<(String, request::Maskable<String>)>, errors::ConnectorError> { self.build_headers(req, connectors) } <file_sep path="hyperswitch/crates/router/src/connector/plaid.rs" role="context" start="345" end="345"> use common_utils::types::{AmountConvertor, FloatMajorUnit, FloatMajorUnitForConnector}; use crate::{ configs::settings, connector::utils as connector_utils, core::errors::{self, CustomResult}, events::connector_api_logs::ConnectorEvent, headers, services::{ self, request::{self, Mask}, ConnectorIntegration, ConnectorSpecifications, ConnectorValidation, }, types::{ self, api::{self, ConnectorCommon, ConnectorCommonExt}, ErrorResponse, RequestContent, Response, }, utils::BytesExt, }; <file_sep path="hyperswitch/crates/router/src/connector/plaid.rs" role="context" start="358" end="364"> fn get_url( &self, _req: &types::PaymentsPostProcessingRouterData, connectors: &settings::Connectors, ) -> CustomResult<String, errors::ConnectorError> { Ok(format!("{}/link/token/create", self.base_url(connectors))) } <file_sep path="hyperswitch/crates/router/src/connector/plaid.rs" role="context" start="354" end="356"> fn get_content_type(&self) -> &'static str { self.common_get_content_type() } <file_sep path="hyperswitch/crates/router/src/connector/plaid.rs" role="context" start="330" end="336"> fn get_error_response( &self, res: Response, event_builder: Option<&mut ConnectorEvent>, ) -> CustomResult<ErrorResponse, errors::ConnectorError> { self.build_error_response(res, event_builder) } <file_sep path="hyperswitch/crates/router/src/connector/plaid.rs" role="context" start="311" end="328"> fn handle_response( &self, data: &types::PaymentsSyncRouterData, event_builder: Option<&mut ConnectorEvent>, res: Response, ) -> CustomResult<types::PaymentsSyncRouterData, errors::ConnectorError> { let response: plaid::PlaidSyncResponse = res .response .parse_struct("PlaidSyncResponse") .change_context(errors::ConnectorError::ResponseDeserializationFailed)?; event_builder.map(|i| i.set_response_body(&response)); router_env::logger::info!(connector_response=?response); types::RouterData::try_from(types::ResponseRouterData { response, data: data.clone(), http_code: res.status_code, }) } <file_sep path="hyperswitch/crates/router/src/connector/plaid.rs" role="context" start="293" end="309"> fn build_request( &self, req: &types::PaymentsSyncRouterData, connectors: &settings::Connectors, ) -> CustomResult<Option<services::Request>, errors::ConnectorError> { Ok(Some( services::RequestBuilder::new() .method(services::Method::Post) .url(&types::PaymentsSyncType::get_url(self, req, connectors)?) .attach_default_headers() .headers(types::PaymentsSyncType::get_headers(self, req, connectors)?) .set_body(types::PaymentsSyncType::get_request_body( self, req, connectors, )?) .build(), )) } <file_sep path="hyperswitch/crates/router/src/connector/plaid.rs" role="context" start="208" end="228"> fn build_request( &self, req: &types::PaymentsAuthorizeRouterData, connectors: &settings::Connectors, ) -> CustomResult<Option<services::Request>, errors::ConnectorError> { Ok(Some( services::RequestBuilder::new() .method(services::Method::Post) .url(&types::PaymentsAuthorizeType::get_url( self, req, connectors, )?) .attach_default_headers() .headers(types::PaymentsAuthorizeType::get_headers( self, req, connectors, )?) .set_body(types::PaymentsAuthorizeType::get_request_body( self, req, connectors, )?) .build(), )) } <file_sep path="hyperswitch/crates/router/src/types.rs" role="context" start="130" end="131"> pub type PaymentsPostProcessingRouterData = RouterData<PostProcessing, PaymentsPostProcessingData, PaymentsResponseData>;
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/connector/threedsecureio.rs<|crate|> router anchor=get_url kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/connector/threedsecureio.rs" role="context" start="443" end="449"> fn get_url( &self, _req: &types::authentication::ConnectorPostAuthenticationRouterData, connectors: &settings::Connectors, ) -> CustomResult<String, errors::ConnectorError> { Ok(format!("{}/postauth", self.base_url(connectors),)) } <file_sep path="hyperswitch/crates/router/src/connector/threedsecureio.rs" role="context" start="442" end="442"> use crate::{ configs::settings, core::errors::{self, CustomResult}, events::connector_api_logs::ConnectorEvent, headers, services::{ self, request::{self, Mask}, ConnectorIntegration, ConnectorSpecifications, ConnectorValidation, }, types::{ self, api::{self, ConnectorCommon, ConnectorCommonExt}, ErrorResponse, RequestContent, Response, }, utils::{self, BytesExt}, }; <file_sep path="hyperswitch/crates/router/src/connector/threedsecureio.rs" role="context" start="462" end="488"> fn build_request( &self, req: &types::authentication::ConnectorPostAuthenticationRouterData, connectors: &settings::Connectors, ) -> CustomResult<Option<services::Request>, errors::ConnectorError> { Ok(Some( services::RequestBuilder::new() .method(services::Method::Post) .url( &types::authentication::ConnectorPostAuthenticationType::get_url( self, req, connectors, )?, ) .attach_default_headers() .headers( types::authentication::ConnectorPostAuthenticationType::get_headers( self, req, connectors, )?, ) .set_body( types::authentication::ConnectorPostAuthenticationType::get_request_body( self, req, connectors, )?, ) .build(), )) } <file_sep path="hyperswitch/crates/router/src/connector/threedsecureio.rs" role="context" start="451" end="460"> fn get_request_body( &self, req: &types::authentication::ConnectorPostAuthenticationRouterData, _connectors: &settings::Connectors, ) -> CustomResult<RequestContent, errors::ConnectorError> { let req_obj = threedsecureio::ThreedsecureioPostAuthenticationRequest { three_ds_server_trans_id: req.request.threeds_server_transaction_id.clone(), }; Ok(RequestContent::Json(Box::new(req_obj))) } <file_sep path="hyperswitch/crates/router/src/connector/threedsecureio.rs" role="context" start="439" end="441"> fn get_content_type(&self) -> &'static str { self.common_get_content_type() } <file_sep path="hyperswitch/crates/router/src/connector/threedsecureio.rs" role="context" start="431" end="437"> fn get_headers( &self, req: &types::authentication::ConnectorPostAuthenticationRouterData, connectors: &settings::Connectors, ) -> CustomResult<Vec<(String, request::Maskable<String>)>, errors::ConnectorError> { self.build_headers(req, connectors) } <file_sep path="hyperswitch/crates/router/src/connector/threedsecureio.rs" role="context" start="270" end="296"> fn build_request( &self, req: &types::authentication::ConnectorAuthenticationRouterData, connectors: &settings::Connectors, ) -> CustomResult<Option<services::Request>, errors::ConnectorError> { Ok(Some( services::RequestBuilder::new() .method(services::Method::Post) .url( &types::authentication::ConnectorAuthenticationType::get_url( self, req, connectors, )?, ) .attach_default_headers() .headers( types::authentication::ConnectorAuthenticationType::get_headers( self, req, connectors, )?, ) .set_body( types::authentication::ConnectorAuthenticationType::get_request_body( self, req, connectors, )?, ) .build(), )) } <file_sep path="hyperswitch/crates/router/src/connector/threedsecureio.rs" role="context" start="368" end="394"> fn build_request( &self, req: &types::authentication::PreAuthNRouterData, connectors: &settings::Connectors, ) -> CustomResult<Option<services::Request>, errors::ConnectorError> { Ok(Some( services::RequestBuilder::new() .method(services::Method::Post) .url( &types::authentication::ConnectorPreAuthenticationType::get_url( self, req, connectors, )?, ) .attach_default_headers() .headers( types::authentication::ConnectorPreAuthenticationType::get_headers( self, req, connectors, )?, ) .set_body( types::authentication::ConnectorPreAuthenticationType::get_request_body( self, req, connectors, )?, ) .build(), )) } <file_sep path="hyperswitch/crates/router/src/types/authentication.rs" role="context" start="21" end="25"> pub type ConnectorPostAuthenticationRouterData = RouterData< api::PostAuthentication, ConnectorPostAuthenticationRequestData, AuthenticationResponseData, >;
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/connector/threedsecureio.rs<|crate|> router anchor=get_headers kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/connector/threedsecureio.rs" role="context" start="431" end="437"> fn get_headers( &self, req: &types::authentication::ConnectorPostAuthenticationRouterData, connectors: &settings::Connectors, ) -> CustomResult<Vec<(String, request::Maskable<String>)>, errors::ConnectorError> { self.build_headers(req, connectors) } <file_sep path="hyperswitch/crates/router/src/connector/threedsecureio.rs" role="context" start="430" end="430"> use crate::{ configs::settings, core::errors::{self, CustomResult}, events::connector_api_logs::ConnectorEvent, headers, services::{ self, request::{self, Mask}, ConnectorIntegration, ConnectorSpecifications, ConnectorValidation, }, types::{ self, api::{self, ConnectorCommon, ConnectorCommonExt}, ErrorResponse, RequestContent, Response, }, utils::{self, BytesExt}, }; <file_sep path="hyperswitch/crates/router/src/connector/threedsecureio.rs" role="context" start="443" end="449"> fn get_url( &self, _req: &types::authentication::ConnectorPostAuthenticationRouterData, connectors: &settings::Connectors, ) -> CustomResult<String, errors::ConnectorError> { Ok(format!("{}/postauth", self.base_url(connectors),)) } <file_sep path="hyperswitch/crates/router/src/connector/threedsecureio.rs" role="context" start="439" end="441"> fn get_content_type(&self) -> &'static str { self.common_get_content_type() } <file_sep path="hyperswitch/crates/router/src/connector/threedsecureio.rs" role="context" start="415" end="421"> fn get_error_response( &self, res: Response, event_builder: Option<&mut ConnectorEvent>, ) -> CustomResult<ErrorResponse, errors::ConnectorError> { self.build_error_response(res, event_builder) } <file_sep path="hyperswitch/crates/router/src/connector/threedsecureio.rs" role="context" start="396" end="413"> fn handle_response( &self, data: &types::authentication::PreAuthNRouterData, event_builder: Option<&mut ConnectorEvent>, res: Response, ) -> CustomResult<types::authentication::PreAuthNRouterData, errors::ConnectorError> { let response: threedsecureio::ThreedsecureioPreAuthenticationResponse = res .response .parse_struct("threedsecureio ThreedsecureioPreAuthenticationResponse") .change_context(errors::ConnectorError::ResponseDeserializationFailed)?; event_builder.map(|i| i.set_response_body(&response)); router_env::logger::info!(connector_response=?response); types::RouterData::try_from(types::ResponseRouterData { response, data: data.clone(), http_code: res.status_code, }) } <file_sep path="hyperswitch/crates/router/src/connector/threedsecureio.rs" role="context" start="368" end="394"> fn build_request( &self, req: &types::authentication::PreAuthNRouterData, connectors: &settings::Connectors, ) -> CustomResult<Option<services::Request>, errors::ConnectorError> { Ok(Some( services::RequestBuilder::new() .method(services::Method::Post) .url( &types::authentication::ConnectorPreAuthenticationType::get_url( self, req, connectors, )?, ) .attach_default_headers() .headers( types::authentication::ConnectorPreAuthenticationType::get_headers( self, req, connectors, )?, ) .set_body( types::authentication::ConnectorPreAuthenticationType::get_request_body( self, req, connectors, )?, ) .build(), )) } <file_sep path="hyperswitch/crates/router/src/connector/threedsecureio.rs" role="context" start="270" end="296"> fn build_request( &self, req: &types::authentication::ConnectorAuthenticationRouterData, connectors: &settings::Connectors, ) -> CustomResult<Option<services::Request>, errors::ConnectorError> { Ok(Some( services::RequestBuilder::new() .method(services::Method::Post) .url( &types::authentication::ConnectorAuthenticationType::get_url( self, req, connectors, )?, ) .attach_default_headers() .headers( types::authentication::ConnectorAuthenticationType::get_headers( self, req, connectors, )?, ) .set_body( types::authentication::ConnectorAuthenticationType::get_request_body( self, req, connectors, )?, ) .build(), )) } <file_sep path="hyperswitch/crates/router/src/types/authentication.rs" role="context" start="21" end="25"> pub type ConnectorPostAuthenticationRouterData = RouterData< api::PostAuthentication, ConnectorPostAuthenticationRequestData, AuthenticationResponseData, >;
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/tests/connectors/square.rs<|crate|> router<|connector|> square anchor=should_only_authorize_payment kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=1<|meta_end|> <file_sep path="hyperswitch/crates/router/tests/connectors/square.rs" role="context" start="87" end="96"> async fn should_only_authorize_payment() { let response = CONNECTOR .authorize_payment( payment_method_details(), get_default_payment_info(create_token().await), ) .await .expect("Authorize payment response"); assert_eq!(response.status, enums::AttemptStatus::Authorized); } <file_sep path="hyperswitch/crates/router/tests/connectors/square.rs" role="context" start="86" end="86"> use router::types::{self, storage::enums, PaymentsResponseData}; <file_sep path="hyperswitch/crates/router/tests/connectors/square.rs" role="context" start="115" end="128"> async fn should_partially_capture_authorized_payment() { let response = CONNECTOR .authorize_and_capture_payment( payment_method_details(), Some(types::PaymentsCaptureData { amount_to_capture: 50, ..utils::PaymentCaptureType::default().0 }), get_default_payment_info(create_token().await), ) .await .expect("Capture payment response"); assert_eq!(response.status, enums::AttemptStatus::Charged); } <file_sep path="hyperswitch/crates/router/tests/connectors/square.rs" role="context" start="100" end="110"> async fn should_capture_authorized_payment() { let response = CONNECTOR .authorize_and_capture_payment( payment_method_details(), None, get_default_payment_info(create_token().await), ) .await .expect("Capture payment response"); assert_eq!(response.status, enums::AttemptStatus::Charged); } <file_sep path="hyperswitch/crates/router/tests/connectors/square.rs" role="context" start="73" end="82"> async fn create_token() -> Option<String> { let token_response = CONNECTOR .create_connector_pm_token(token_details(), get_default_payment_info(None)) .await .expect("Authorize payment response"); match token_response.response.unwrap() { PaymentsResponseData::TokenizationResponse { token } => Some(token), _ => None, } } <file_sep path="hyperswitch/crates/router/tests/connectors/square.rs" role="context" start="58" end="71"> fn token_details() -> Option<types::PaymentMethodTokenizationData> { Some(types::PaymentMethodTokenizationData { payment_method_data: types::domain::PaymentMethodData::Card(types::domain::Card { card_number: cards::CardNumber::from_str("4111111111111111").unwrap(), card_exp_month: Secret::new("04".to_string()), card_exp_year: Secret::new("2027".to_string()), card_cvc: Secret::new("100".to_string()), ..utils::CCardType::default().0 }), browser_info: None, amount: None, currency: enums::Currency::USD, }) } <file_sep path="hyperswitch/crates/router/tests/connectors/square.rs" role="context" start="39" end="52"> fn get_default_payment_info(payment_method_token: Option<String>) -> Option<utils::PaymentInfo> { Some(utils::PaymentInfo { address: None, auth_type: None, access_token: None, connector_meta_data: None, connector_customer: None, payment_method_token, #[cfg(feature = "payouts")] payout_method_data: None, #[cfg(feature = "payouts")] currency: None, }) } <file_sep path="hyperswitch/crates/router/tests/connectors/square.rs" role="context" start="54" end="56"> fn payment_method_details() -> Option<types::PaymentsAuthorizeData> { None }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/compatibility/stripe/payment_intents/types.rs<|crate|> router anchor=from kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=1<|meta_end|> <file_sep path="hyperswitch/crates/router/src/compatibility/stripe/payment_intents/types.rs" role="context" start="677" end="684"> fn from(it: payments::PaymentListResponse) -> Self { Self { object: "list".to_string(), url: "/v1/payment_intents".to_string(), has_more: false, data: it.data.into_iter().map(Into::into).collect(), } } <file_sep path="hyperswitch/crates/router/src/compatibility/stripe/payment_intents/types.rs" role="context" start="676" end="676"> use api_models::payments; <file_sep path="hyperswitch/crates/router/src/compatibility/stripe/payment_intents/types.rs" role="context" start="793" end="798"> fn foreign_from(item: Option<Request3DS>) -> Self { match item.unwrap_or_default() { Request3DS::Automatic => Self::NoThreeDs, Request3DS::Any => Self::ThreeDs, } } <file_sep path="hyperswitch/crates/router/src/compatibility/stripe/payment_intents/types.rs" role="context" start="718" end="781"> fn foreign_try_from( (mandate_data, currency): (Option<MandateData>, Option<String>), ) -> errors::RouterResult<Self> { let currency = currency .ok_or( errors::ApiErrorResponse::MissingRequiredField { field_name: "currency", } .into(), ) .and_then(|c| { c.to_uppercase().parse_enum("currency").change_context( errors::ApiErrorResponse::InvalidDataValue { field_name: "currency", }, ) })?; let mandate_data = mandate_data.map(|mandate| payments::MandateData { mandate_type: match mandate.mandate_type { Some(item) => match item { StripeMandateType::SingleUse => Some(payments::MandateType::SingleUse( payments::MandateAmountData { amount: MinorUnit::new(mandate.amount.unwrap_or_default()), currency, start_date: mandate.start_date, end_date: mandate.end_date, metadata: None, }, )), StripeMandateType::MultiUse => Some(payments::MandateType::MultiUse(Some( payments::MandateAmountData { amount: MinorUnit::new(mandate.amount.unwrap_or_default()), currency, start_date: mandate.start_date, end_date: mandate.end_date, metadata: None, }, ))), }, None => Some(payments::MandateType::MultiUse(Some( payments::MandateAmountData { amount: MinorUnit::new(mandate.amount.unwrap_or_default()), currency, start_date: mandate.start_date, end_date: mandate.end_date, metadata: None, }, ))), }, customer_acceptance: Some(payments::CustomerAcceptance { acceptance_type: payments::AcceptanceType::Online, accepted_at: mandate.customer_acceptance.accepted_at, online: mandate .customer_acceptance .online .map(|online| payments::OnlineMandate { ip_address: Some(online.ip_address), user_agent: online.user_agent, }), }), update_mandate_id: None, }); Ok(mandate_data) } <file_sep path="hyperswitch/crates/router/src/compatibility/stripe/payment_intents/types.rs" role="context" start="652" end="666"> fn from_timestamp_to_datetime( time: Option<i64>, ) -> Result<Option<PrimitiveDateTime>, errors::ApiErrorResponse> { if let Some(time) = time { let time = time::OffsetDateTime::from_unix_timestamp(time).map_err(|_| { errors::ApiErrorResponse::InvalidRequestData { message: "Error while converting timestamp".to_string(), } })?; Ok(Some(PrimitiveDateTime::new(time.date(), time.time()))) } else { Ok(None) } } <file_sep path="hyperswitch/crates/router/src/compatibility/stripe/payment_intents/types.rs" role="context" start="636" end="648"> fn try_from(item: StripePaymentListConstraints) -> Result<Self, Self::Error> { Ok(Self { customer_id: item.customer, starting_after: item.starting_after, ending_before: item.ending_before, limit: item.limit, created: from_timestamp_to_datetime(item.created)?, created_lt: from_timestamp_to_datetime(item.created_lt)?, created_gt: from_timestamp_to_datetime(item.created_gt)?, created_lte: from_timestamp_to_datetime(item.created_lte)?, created_gte: from_timestamp_to_datetime(item.created_gte)?, }) } <file_sep path="hyperswitch/crates/router/src/compatibility/stripe/payment_intents/types.rs" role="context" start="284" end="401"> fn try_from(item: StripePaymentIntentRequest) -> errors::RouterResult<Self> { let routable_connector: Option<api_enums::RoutableConnectors> = item.connector.and_then(|v| v.into_iter().next()); let routing = routable_connector .map(|connector| { api_models::routing::RoutingAlgorithm::Single(Box::new( api_models::routing::RoutableConnectorChoice { choice_kind: api_models::routing::RoutableChoiceKind::FullStruct, connector, merchant_connector_id: None, }, )) }) .map(|r| { serde_json::to_value(r) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("converting to routing failed") }) .transpose()?; let ip_address = item .receipt_ipaddress .map(|ip| std::net::IpAddr::from_str(ip.as_str())) .transpose() .change_context(errors::ApiErrorResponse::InvalidDataFormat { field_name: "receipt_ipaddress".to_string(), expected_format: "127.0.0.1".to_string(), })?; let amount = item.amount.map(|amount| MinorUnit::new(amount).into()); let payment_method_data = item.payment_method_data.as_ref().map(|pmd| { let billing = pmd.billing_details.clone().map(payments::Address::from); let payment_method_data = match pmd.payment_method_details.as_ref() { Some(spmd) => Some(payments::PaymentMethodData::from(spmd.to_owned())), None => get_pmd_based_on_payment_method_type( item.payment_method_types, billing.clone().map(From::from), ), }; payments::PaymentMethodDataRequest { payment_method_data, billing, } }); let request = Ok(Self { payment_id: item.id.map(payments::PaymentIdType::PaymentIntentId), amount, currency: item .currency .as_ref() .map(|c| c.to_uppercase().parse_enum("currency")) .transpose() .change_context(errors::ApiErrorResponse::InvalidDataValue { field_name: "currency", })?, capture_method: item.capture_method, amount_to_capture: item.amount_capturable.map(MinorUnit::new), confirm: item.confirm, customer_id: item.customer, email: item.receipt_email, phone: item.shipping.as_ref().and_then(|s| s.phone.clone()), description: item.description, return_url: item.return_url, payment_method_data, payment_method: item .payment_method_data .as_ref() .map(|pmd| api_enums::PaymentMethod::from(pmd.stype.to_owned())), shipping: item .shipping .as_ref() .map(|s| payments::Address::from(s.to_owned())), billing: item .payment_method_data .and_then(|pmd| pmd.billing_details.map(payments::Address::from)), statement_descriptor_name: item.statement_descriptor, statement_descriptor_suffix: item.statement_descriptor_suffix, metadata: item.metadata, client_secret: item.client_secret.map(|s| s.peek().clone()), authentication_type: match item.payment_method_options { Some(pmo) => { let StripePaymentMethodOptions::Card { request_three_d_secure, }: StripePaymentMethodOptions = pmo; Some(api_enums::AuthenticationType::foreign_from( request_three_d_secure, )) } None => None, }, mandate_data: ForeignTryFrom::foreign_try_from(( item.mandate_data, item.currency.to_owned(), ))?, merchant_connector_details: item.merchant_connector_details, setup_future_usage: item.setup_future_usage, mandate_id: item.mandate, off_session: item.off_session, payment_method_type: item.payment_method_types, routing, browser_info: Some( serde_json::to_value(crate::types::BrowserInformation { ip_address, user_agent: item.user_agent, ..Default::default() }) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("convert to browser info failed")?, ), connector_metadata: item.connector_metadata, ..Self::default() }); request } <file_sep path="hyperswitch/crates/router/src/compatibility/stripe/payment_intents/types.rs" role="context" start="158" end="166"> fn from(item: StripePaymentMethodDetails) -> Self { match item { StripePaymentMethodDetails::Card(card) => Self::Card(payments::Card::from(card)), StripePaymentMethodDetails::Wallet(wallet) => { Self::Wallet(payments::WalletData::from(wallet)) } StripePaymentMethodDetails::Upi(upi) => Self::Upi(payments::UpiData::from(upi)), } }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/connector/riskified.rs<|crate|> router anchor=get_url kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/connector/riskified.rs" role="context" start="418" end="424"> fn get_url( &self, _req: &frm_types::FrmFulfillmentRouterData, connectors: &settings::Connectors, ) -> CustomResult<String, errors::ConnectorError> { Ok(format!("{}{}", self.base_url(connectors), "/fulfill")) } <file_sep path="hyperswitch/crates/router/src/connector/riskified.rs" role="context" start="417" end="417"> use super::utils::{self as connector_utils, FrmTransactionRouterDataRequest}; use crate::{ configs::settings, core::errors::{self, CustomResult}, services::{self, ConnectorIntegration, ConnectorSpecifications, ConnectorValidation}, types::{ self, api::{self, ConnectorCommon, ConnectorCommonExt}, }, }; use crate::{ consts, events::connector_api_logs::ConnectorEvent, headers, services::request, types::{api::fraud_check as frm_api, fraud_check as frm_types, ErrorResponse, Response}, utils::BytesExt, }; <file_sep path="hyperswitch/crates/router/src/connector/riskified.rs" role="context" start="435" end="455"> fn build_request( &self, req: &frm_types::FrmFulfillmentRouterData, connectors: &settings::Connectors, ) -> CustomResult<Option<services::Request>, errors::ConnectorError> { Ok(Some( services::RequestBuilder::new() .method(services::Method::Post) .url(&frm_types::FrmFulfillmentType::get_url( self, req, connectors, )?) .attach_default_headers() .headers(frm_types::FrmFulfillmentType::get_headers( self, req, connectors, )?) .set_body(frm_types::FrmFulfillmentType::get_request_body( self, req, connectors, )?) .build(), )) } <file_sep path="hyperswitch/crates/router/src/connector/riskified.rs" role="context" start="426" end="433"> fn get_request_body( &self, req: &frm_types::FrmFulfillmentRouterData, _connectors: &settings::Connectors, ) -> CustomResult<RequestContent, errors::ConnectorError> { let req_obj = riskified::RiskifiedFulfillmentRequest::try_from(req)?; Ok(RequestContent::Json(Box::new(req_obj))) } <file_sep path="hyperswitch/crates/router/src/connector/riskified.rs" role="context" start="414" end="416"> fn get_content_type(&self) -> &'static str { self.common_get_content_type() } <file_sep path="hyperswitch/crates/router/src/connector/riskified.rs" role="context" start="406" end="412"> fn get_headers( &self, req: &frm_types::FrmFulfillmentRouterData, connectors: &settings::Connectors, ) -> CustomResult<Vec<(String, request::Maskable<String>)>, errors::ConnectorError> { self.build_headers(req, connectors) } <file_sep path="hyperswitch/crates/router/src/connector/riskified.rs" role="context" start="336" end="356"> fn build_request( &self, req: &frm_types::FrmTransactionRouterData, connectors: &settings::Connectors, ) -> CustomResult<Option<services::Request>, errors::ConnectorError> { Ok(Some( services::RequestBuilder::new() .method(services::Method::Post) .url(&frm_types::FrmTransactionType::get_url( self, req, connectors, )?) .attach_default_headers() .headers(frm_types::FrmTransactionType::get_headers( self, req, connectors, )?) .set_body(frm_types::FrmTransactionType::get_request_body( self, req, connectors, )?) .build(), )) } <file_sep path="hyperswitch/crates/router/src/types/fraud_check.rs" role="context" start="64" end="65"> pub type FrmFulfillmentRouterData = RouterData<api::Fulfillment, FraudCheckFulfillmentData, FraudCheckResponseData>;
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/connector/riskified.rs<|crate|> router anchor=get_headers kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/connector/riskified.rs" role="context" start="406" end="412"> fn get_headers( &self, req: &frm_types::FrmFulfillmentRouterData, connectors: &settings::Connectors, ) -> CustomResult<Vec<(String, request::Maskable<String>)>, errors::ConnectorError> { self.build_headers(req, connectors) } <file_sep path="hyperswitch/crates/router/src/connector/riskified.rs" role="context" start="405" end="405"> use common_utils::{crypto, ext_traits::ByteSliceExt, request::RequestContent}; use super::utils::{self as connector_utils, FrmTransactionRouterDataRequest}; use crate::{ configs::settings, core::errors::{self, CustomResult}, services::{self, ConnectorIntegration, ConnectorSpecifications, ConnectorValidation}, types::{ self, api::{self, ConnectorCommon, ConnectorCommonExt}, }, }; use crate::{ consts, events::connector_api_logs::ConnectorEvent, headers, services::request, types::{api::fraud_check as frm_api, fraud_check as frm_types, ErrorResponse, Response}, utils::BytesExt, }; <file_sep path="hyperswitch/crates/router/src/connector/riskified.rs" role="context" start="418" end="424"> fn get_url( &self, _req: &frm_types::FrmFulfillmentRouterData, connectors: &settings::Connectors, ) -> CustomResult<String, errors::ConnectorError> { Ok(format!("{}{}", self.base_url(connectors), "/fulfill")) } <file_sep path="hyperswitch/crates/router/src/connector/riskified.rs" role="context" start="414" end="416"> fn get_content_type(&self) -> &'static str { self.common_get_content_type() } <file_sep path="hyperswitch/crates/router/src/connector/riskified.rs" role="context" start="389" end="395"> fn get_error_response( &self, res: Response, event_builder: Option<&mut ConnectorEvent>, ) -> CustomResult<ErrorResponse, errors::ConnectorError> { self.build_error_response(res, event_builder) } <file_sep path="hyperswitch/crates/router/src/connector/riskified.rs" role="context" start="358" end="388"> fn handle_response( &self, data: &frm_types::FrmTransactionRouterData, event_builder: Option<&mut ConnectorEvent>, res: Response, ) -> CustomResult<frm_types::FrmTransactionRouterData, errors::ConnectorError> { let response: riskified::RiskifiedTransactionResponse = res .response .parse_struct("RiskifiedPaymentsResponse Transaction") .change_context(errors::ConnectorError::ResponseDeserializationFailed)?; event_builder.map(|i| i.set_response_body(&response)); router_env::logger::info!(connector_response=?response); match response { riskified::RiskifiedTransactionResponse::FailedResponse(response_data) => { <frm_types::FrmTransactionRouterData>::try_from(types::ResponseRouterData { response: response_data, data: data.clone(), http_code: res.status_code, }) } riskified::RiskifiedTransactionResponse::SuccessResponse(response_data) => { <frm_types::FrmTransactionRouterData>::try_from(types::ResponseRouterData { response: response_data, data: data.clone(), http_code: res.status_code, }) } } } <file_sep path="hyperswitch/crates/router/src/connector/riskified.rs" role="context" start="435" end="455"> fn build_request( &self, req: &frm_types::FrmFulfillmentRouterData, connectors: &settings::Connectors, ) -> CustomResult<Option<services::Request>, errors::ConnectorError> { Ok(Some( services::RequestBuilder::new() .method(services::Method::Post) .url(&frm_types::FrmFulfillmentType::get_url( self, req, connectors, )?) .attach_default_headers() .headers(frm_types::FrmFulfillmentType::get_headers( self, req, connectors, )?) .set_body(frm_types::FrmFulfillmentType::get_request_body( self, req, connectors, )?) .build(), )) } <file_sep path="hyperswitch/crates/router/src/connector/riskified.rs" role="context" start="336" end="356"> fn build_request( &self, req: &frm_types::FrmTransactionRouterData, connectors: &settings::Connectors, ) -> CustomResult<Option<services::Request>, errors::ConnectorError> { Ok(Some( services::RequestBuilder::new() .method(services::Method::Post) .url(&frm_types::FrmTransactionType::get_url( self, req, connectors, )?) .attach_default_headers() .headers(frm_types::FrmTransactionType::get_headers( self, req, connectors, )?) .set_body(frm_types::FrmTransactionType::get_request_body( self, req, connectors, )?) .build(), )) } <file_sep path="hyperswitch/crates/router/src/types/fraud_check.rs" role="context" start="64" end="65"> pub type FrmFulfillmentRouterData = RouterData<api::Fulfillment, FraudCheckFulfillmentData, FraudCheckResponseData>;
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/tests/connectors/stax.rs<|crate|> router<|connector|> stax anchor=should_make_payment kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=1<|meta_end|> <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="318" end="327"> async fn should_make_payment() { let authorize_response = CONNECTOR .make_payment( payment_method_details(), get_default_payment_info(None, create_customer_and_get_token().await), ) .await .unwrap(); assert_eq!(authorize_response.status, enums::AttemptStatus::Charged); } <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="317" end="317"> use router::types::{self, domain, storage::enums, PaymentsResponseData}; <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="361" end="374"> async fn should_refund_auto_captured_payment() { let response = CONNECTOR .make_payment_and_refund( payment_method_details(), None, get_default_payment_info(None, create_customer_and_get_token().await), ) .await .unwrap(); assert_eq!( response.response.unwrap().refund_status, enums::RefundStatus::Success, ); } <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="331" end="357"> async fn should_sync_auto_captured_payment() { let authorize_response = CONNECTOR .make_payment( payment_method_details(), get_default_payment_info(None, create_customer_and_get_token().await), ) .await .unwrap(); assert_eq!(authorize_response.status, enums::AttemptStatus::Charged); let txn_id = utils::get_connector_transaction_id(authorize_response.response); assert_ne!(txn_id, None, "Empty connector transaction id"); let response = CONNECTOR .psync_retry_till_status_matches( enums::AttemptStatus::Charged, Some(types::PaymentsSyncData { connector_transaction_id: types::ResponseId::ConnectorTransactionId( txn_id.unwrap(), ), capture_method: Some(enums::CaptureMethod::Automatic), ..Default::default() }), get_default_payment_info(None, None), ) .await .unwrap(); assert_eq!(response.status, enums::AttemptStatus::Charged,); } <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="273" end="314"> async fn should_sync_manually_captured_refund() { let capture_response = CONNECTOR .authorize_and_capture_payment( payment_method_details(), Some(types::PaymentsCaptureData { ..utils::PaymentCaptureType::default().0 }), get_default_payment_info(None, create_customer_and_get_token().await), ) .await .expect("Capture payment response"); let refund_txn_id = utils::get_connector_transaction_id(capture_response.response.clone()).unwrap(); let refund_connector_meta = utils::get_connector_metadata(capture_response.response); let refund_response = CONNECTOR .refund_payment( refund_txn_id, Some(types::RefundsData { connector_metadata: refund_connector_meta, ..utils::PaymentRefundType::default().0 }), get_default_payment_info(None, None), ) .await .unwrap(); let response = CONNECTOR .rsync_retry_till_status_matches( enums::RefundStatus::Success, refund_response.response.unwrap().connector_refund_id, None, get_default_payment_info(None, None), ) .await .unwrap(); assert_eq!( response.response.unwrap().refund_status, enums::RefundStatus::Success, ); } <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="237" end="269"> async fn should_partially_refund_manually_captured_payment() { let capture_response = CONNECTOR .authorize_and_capture_payment( payment_method_details(), Some(types::PaymentsCaptureData { ..utils::PaymentCaptureType::default().0 }), get_default_payment_info(None, create_customer_and_get_token().await), ) .await .expect("Capture payment response"); let refund_txn_id = utils::get_connector_transaction_id(capture_response.response.clone()).unwrap(); let refund_connector_meta = utils::get_connector_metadata(capture_response.response); let response = CONNECTOR .refund_payment( refund_txn_id, Some(types::RefundsData { refund_amount: 50, connector_metadata: refund_connector_meta, ..utils::PaymentRefundType::default().0 }), get_default_payment_info(None, None), ) .await .unwrap(); assert_eq!( response.response.unwrap().refund_status, enums::RefundStatus::Success, ); } <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="39" end="55"> fn get_default_payment_info( connector_customer: Option<String>, payment_method_token: Option<String>, ) -> Option<utils::PaymentInfo> { Some(utils::PaymentInfo { address: None, auth_type: None, access_token: None, connector_meta_data: None, connector_customer, payment_method_token, #[cfg(feature = "payouts")] payout_method_data: None, #[cfg(feature = "payouts")] currency: None, }) } <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="78" end="82"> fn payment_method_details() -> Option<types::PaymentsAuthorizeData> { Some(types::PaymentsAuthorizeData { ..utils::PaymentAuthorizeType::default().0 }) }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/connector/ebanx.rs<|crate|> router anchor=get_url kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/connector/ebanx.rs" role="context" start="303" end="309"> fn get_url( &self, _req: &types::PayoutsRouterData<api::PoCancel>, connectors: &settings::Connectors, ) -> CustomResult<String, errors::ConnectorError> { Ok(format!("{}ws/payout/cancel", connectors.ebanx.base_url,)) } <file_sep path="hyperswitch/crates/router/src/connector/ebanx.rs" role="context" start="302" end="302"> use common_utils::types::{AmountConvertor, FloatMajorUnit, FloatMajorUnitForConnector}; use transformers as ebanx; use crate::{ configs::settings, core::errors::{self, CustomResult}, events::connector_api_logs::ConnectorEvent, services::{ConnectorIntegration, ConnectorSpecifications, ConnectorValidation}, types::{ self, api::{self, ConnectorCommon, ConnectorCommonExt}, }, utils::BytesExt, }; use crate::{ headers, services::{self, request}, }; <file_sep path="hyperswitch/crates/router/src/connector/ebanx.rs" role="context" start="319" end="326"> fn get_request_body( &self, req: &types::PayoutsRouterData<api::PoCancel>, _connectors: &settings::Connectors, ) -> CustomResult<RequestContent, errors::ConnectorError> { let connector_req = ebanx::EbanxPayoutCancelRequest::try_from(req)?; Ok(RequestContent::Json(Box::new(connector_req))) } <file_sep path="hyperswitch/crates/router/src/connector/ebanx.rs" role="context" start="311" end="317"> fn get_headers( &self, req: &types::PayoutsRouterData<api::PoCancel>, _connectors: &settings::Connectors, ) -> CustomResult<Vec<(String, request::Maskable<String>)>, errors::ConnectorError> { self.build_headers(req, _connectors) } <file_sep path="hyperswitch/crates/router/src/connector/ebanx.rs" role="context" start="292" end="298"> fn get_error_response( &self, res: types::Response, event_builder: Option<&mut ConnectorEvent>, ) -> CustomResult<types::ErrorResponse, errors::ConnectorError> { self.build_error_response(res, event_builder) } <file_sep path="hyperswitch/crates/router/src/connector/ebanx.rs" role="context" start="271" end="290"> fn handle_response( &self, data: &types::PayoutsRouterData<api::PoFulfill>, event_builder: Option<&mut ConnectorEvent>, res: types::Response, ) -> CustomResult<types::PayoutsRouterData<api::PoFulfill>, errors::ConnectorError> { let response: ebanx::EbanxFulfillResponse = res .response .parse_struct("EbanxFulfillResponse") .change_context(errors::ConnectorError::ResponseDeserializationFailed)?; event_builder.map(|i| i.set_response_body(&response)); router_env::logger::info!(connector_response=?response); types::RouterData::try_from(types::ResponseRouterData { response, data: data.clone(), http_code: res.status_code, }) } <file_sep path="hyperswitch/crates/router/src/connector/ebanx.rs" role="context" start="167" end="183"> fn build_request( &self, req: &types::PayoutsRouterData<api::PoCreate>, connectors: &settings::Connectors, ) -> CustomResult<Option<services::Request>, errors::ConnectorError> { let request = services::RequestBuilder::new() .method(services::Method::Post) .url(&types::PayoutCreateType::get_url(self, req, connectors)?) .attach_default_headers() .headers(types::PayoutCreateType::get_headers(self, req, connectors)?) .set_body(types::PayoutCreateType::get_request_body( self, req, connectors, )?) .build(); Ok(Some(request)) } <file_sep path="hyperswitch/crates/router/src/connector/ebanx.rs" role="context" start="250" end="268"> fn build_request( &self, req: &types::PayoutsRouterData<api::PoFulfill>, connectors: &settings::Connectors, ) -> CustomResult<Option<services::Request>, errors::ConnectorError> { let request = services::RequestBuilder::new() .method(services::Method::Post) .url(&types::PayoutFulfillType::get_url(self, req, connectors)?) .attach_default_headers() .headers(types::PayoutFulfillType::get_headers( self, req, connectors, )?) .set_body(types::PayoutFulfillType::get_request_body( self, req, connectors, )?) .build(); Ok(Some(request)) } <file_sep path="hyperswitch/crates/router/src/types.rs" role="context" start="226" end="226"> pub type PayoutsRouterData<F> = RouterData<F, PayoutsData, PayoutsResponseData>;
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/tests/connectors/square.rs<|crate|> router<|connector|> square anchor=should_capture_authorized_payment kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/tests/connectors/square.rs" role="context" start="100" end="110"> async fn should_capture_authorized_payment() { let response = CONNECTOR .authorize_and_capture_payment( payment_method_details(), None, get_default_payment_info(create_token().await), ) .await .expect("Capture payment response"); assert_eq!(response.status, enums::AttemptStatus::Charged); } <file_sep path="hyperswitch/crates/router/tests/connectors/square.rs" role="context" start="99" end="99"> use router::types::{self, storage::enums, PaymentsResponseData}; <file_sep path="hyperswitch/crates/router/tests/connectors/square.rs" role="context" start="132" end="155"> async fn should_sync_authorized_payment() { let authorize_response = CONNECTOR .authorize_payment( payment_method_details(), get_default_payment_info(create_token().await), ) .await .expect("Authorize payment response"); let txn_id = get_connector_transaction_id(authorize_response.response); let response = CONNECTOR .psync_retry_till_status_matches( enums::AttemptStatus::Authorized, Some(types::PaymentsSyncData { connector_transaction_id: types::ResponseId::ConnectorTransactionId( txn_id.unwrap(), ), ..Default::default() }), get_default_payment_info(None), ) .await .expect("PSync response"); assert_eq!(response.status, enums::AttemptStatus::Authorized,); } <file_sep path="hyperswitch/crates/router/tests/connectors/square.rs" role="context" start="115" end="128"> async fn should_partially_capture_authorized_payment() { let response = CONNECTOR .authorize_and_capture_payment( payment_method_details(), Some(types::PaymentsCaptureData { amount_to_capture: 50, ..utils::PaymentCaptureType::default().0 }), get_default_payment_info(create_token().await), ) .await .expect("Capture payment response"); assert_eq!(response.status, enums::AttemptStatus::Charged); } <file_sep path="hyperswitch/crates/router/tests/connectors/square.rs" role="context" start="87" end="96"> async fn should_only_authorize_payment() { let response = CONNECTOR .authorize_payment( payment_method_details(), get_default_payment_info(create_token().await), ) .await .expect("Authorize payment response"); assert_eq!(response.status, enums::AttemptStatus::Authorized); } <file_sep path="hyperswitch/crates/router/tests/connectors/square.rs" role="context" start="73" end="82"> async fn create_token() -> Option<String> { let token_response = CONNECTOR .create_connector_pm_token(token_details(), get_default_payment_info(None)) .await .expect("Authorize payment response"); match token_response.response.unwrap() { PaymentsResponseData::TokenizationResponse { token } => Some(token), _ => None, } } <file_sep path="hyperswitch/crates/router/tests/connectors/square.rs" role="context" start="54" end="56"> fn payment_method_details() -> Option<types::PaymentsAuthorizeData> { None } <file_sep path="hyperswitch/crates/router/tests/connectors/square.rs" role="context" start="39" end="52"> fn get_default_payment_info(payment_method_token: Option<String>) -> Option<utils::PaymentInfo> { Some(utils::PaymentInfo { address: None, auth_type: None, access_token: None, connector_meta_data: None, connector_customer: None, payment_method_token, #[cfg(feature = "payouts")] payout_method_data: None, #[cfg(feature = "payouts")] currency: None, }) } <file_sep path="hyperswitch/migrations/2023-07-07-091223_create_captures_table/up.sql" role="context" start="1" end="17"> CREATE TYPE "CaptureStatus" AS ENUM ( 'started', 'charged', 'pending', 'failed' ); ALTER TYPE "IntentStatus" ADD VALUE If NOT EXISTS 'partially_captured' AFTER 'requires_capture'; CREATE TABLE captures( capture_id VARCHAR(64) NOT NULL PRIMARY KEY, payment_id VARCHAR(64) NOT NULL, merchant_id VARCHAR(64) NOT NULL, status "CaptureStatus" NOT NULL, amount BIGINT NOT NULL, currency "Currency", connector VARCHAR(255), error_message VARCHAR(255),
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/connector/ebanx.rs<|crate|> router anchor=get_headers kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/connector/ebanx.rs" role="context" start="311" end="317"> fn get_headers( &self, req: &types::PayoutsRouterData<api::PoCancel>, _connectors: &settings::Connectors, ) -> CustomResult<Vec<(String, request::Maskable<String>)>, errors::ConnectorError> { self.build_headers(req, _connectors) } <file_sep path="hyperswitch/crates/router/src/connector/ebanx.rs" role="context" start="310" end="310"> use common_utils::request::RequestContent; use common_utils::types::{AmountConvertor, FloatMajorUnit, FloatMajorUnitForConnector}; use crate::{ configs::settings, core::errors::{self, CustomResult}, events::connector_api_logs::ConnectorEvent, services::{ConnectorIntegration, ConnectorSpecifications, ConnectorValidation}, types::{ self, api::{self, ConnectorCommon, ConnectorCommonExt}, }, utils::BytesExt, }; use crate::{ headers, services::{self, request}, }; <file_sep path="hyperswitch/crates/router/src/connector/ebanx.rs" role="context" start="328" end="344"> fn build_request( &self, req: &types::PayoutsRouterData<api::PoCancel>, connectors: &settings::Connectors, ) -> CustomResult<Option<services::Request>, errors::ConnectorError> { let request = services::RequestBuilder::new() .method(services::Method::Put) .url(&types::PayoutCancelType::get_url(self, req, connectors)?) .attach_default_headers() .headers(types::PayoutCancelType::get_headers(self, req, connectors)?) .set_body(types::PayoutCancelType::get_request_body( self, req, connectors, )?) .build(); Ok(Some(request)) } <file_sep path="hyperswitch/crates/router/src/connector/ebanx.rs" role="context" start="319" end="326"> fn get_request_body( &self, req: &types::PayoutsRouterData<api::PoCancel>, _connectors: &settings::Connectors, ) -> CustomResult<RequestContent, errors::ConnectorError> { let connector_req = ebanx::EbanxPayoutCancelRequest::try_from(req)?; Ok(RequestContent::Json(Box::new(connector_req))) } <file_sep path="hyperswitch/crates/router/src/connector/ebanx.rs" role="context" start="303" end="309"> fn get_url( &self, _req: &types::PayoutsRouterData<api::PoCancel>, connectors: &settings::Connectors, ) -> CustomResult<String, errors::ConnectorError> { Ok(format!("{}ws/payout/cancel", connectors.ebanx.base_url,)) } <file_sep path="hyperswitch/crates/router/src/connector/ebanx.rs" role="context" start="292" end="298"> fn get_error_response( &self, res: types::Response, event_builder: Option<&mut ConnectorEvent>, ) -> CustomResult<types::ErrorResponse, errors::ConnectorError> { self.build_error_response(res, event_builder) } <file_sep path="hyperswitch/crates/router/src/connector/ebanx.rs" role="context" start="167" end="183"> fn build_request( &self, req: &types::PayoutsRouterData<api::PoCreate>, connectors: &settings::Connectors, ) -> CustomResult<Option<services::Request>, errors::ConnectorError> { let request = services::RequestBuilder::new() .method(services::Method::Post) .url(&types::PayoutCreateType::get_url(self, req, connectors)?) .attach_default_headers() .headers(types::PayoutCreateType::get_headers(self, req, connectors)?) .set_body(types::PayoutCreateType::get_request_body( self, req, connectors, )?) .build(); Ok(Some(request)) } <file_sep path="hyperswitch/crates/router/src/types.rs" role="context" start="226" end="226"> pub type PayoutsRouterData<F> = RouterData<F, PayoutsData, PayoutsResponseData>;
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/services/api/client.rs<|crate|> router anchor=new kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=1<|meta_end|> <file_sep path="hyperswitch/crates/router/src/services/api/client.rs" role="context" start="198" end="207"> pub fn new(proxy_config: &Proxy) -> CustomResult<Self, ApiClientError> { let client = get_client_builder(proxy_config)? .build() .change_context(ApiClientError::InvalidProxyConfiguration)?; Ok(Self { proxy_config: proxy_config.clone(), client, request_id: None, }) } <file_sep path="hyperswitch/crates/router/src/services/api/client.rs" role="context" start="197" end="197"> use crate::{ configs::settings::Proxy, consts::BASE64_ENGINE, core::errors::{ApiClientError, CustomResult}, routes::SessionState, }; <file_sep path="hyperswitch/crates/router/src/services/api/client.rs" role="context" start="242" end="244"> fn json(&mut self, body: serde_json::Value) { self.inner = self.inner.take().map(|r| r.json(&body)); } <file_sep path="hyperswitch/crates/router/src/services/api/client.rs" role="context" start="209" end="229"> pub fn get_reqwest_client( &self, client_certificate: Option<masking::Secret<String>>, client_certificate_key: Option<masking::Secret<String>>, ) -> CustomResult<reqwest::Client, ApiClientError> { match (client_certificate, client_certificate_key) { (Some(certificate), Some(certificate_key)) => { let client_builder = get_client_builder(&self.proxy_config)?; let identity = create_identity_from_certificate_and_key(certificate, certificate_key)?; Ok(client_builder .identity(identity) .build() .change_context(ApiClientError::ClientConstructionFailed) .attach_printable( "Failed to construct client with certificate and certificate key", )?) } (_, _) => Ok(self.client.clone()), } } <file_sep path="hyperswitch/crates/router/src/services/api/client.rs" role="context" start="124" end="135"> pub fn create_certificate( encoded_certificate: masking::Secret<String>, ) -> Result<Vec<reqwest::Certificate>, error_stack::Report<ApiClientError>> { let decoded_certificate = BASE64_ENGINE .decode(encoded_certificate.expose()) .change_context(ApiClientError::CertificateDecodeFailed)?; let certificate = String::from_utf8(decoded_certificate) .change_context(ApiClientError::CertificateDecodeFailed)?; reqwest::Certificate::from_pem_bundle(certificate.as_bytes()) .change_context(ApiClientError::CertificateDecodeFailed) } <file_sep path="hyperswitch/crates/router/src/services/api/client.rs" role="context" start="101" end="122"> pub fn create_identity_from_certificate_and_key( encoded_certificate: masking::Secret<String>, encoded_certificate_key: masking::Secret<String>, ) -> Result<reqwest::Identity, error_stack::Report<ApiClientError>> { let decoded_certificate = BASE64_ENGINE .decode(encoded_certificate.expose()) .change_context(ApiClientError::CertificateDecodeFailed)?; let decoded_certificate_key = BASE64_ENGINE .decode(encoded_certificate_key.expose()) .change_context(ApiClientError::CertificateDecodeFailed)?; let certificate = String::from_utf8(decoded_certificate) .change_context(ApiClientError::CertificateDecodeFailed)?; let certificate_key = String::from_utf8(decoded_certificate_key) .change_context(ApiClientError::CertificateDecodeFailed)?; let key_chain = format!("{}{}", certificate_key, certificate); reqwest::Identity::from_pem(key_chain.as_bytes()) .change_context(ApiClientError::CertificateDecodeFailed) } <file_sep path="hyperswitch/crates/router/src/services/api/client.rs" role="context" start="296" end="309"> fn request_with_certificate( &self, method: Method, url: String, certificate: Option<masking::Secret<String>>, certificate_key: Option<masking::Secret<String>>, ) -> CustomResult<Box<dyn RequestBuilder>, ApiClientError> { let client_builder = self .get_reqwest_client(certificate, certificate_key) .change_context(ApiClientError::ClientConstructionFailed)?; Ok(Box::new(RouterRequestBuilder { inner: Some(client_builder.request(method, url)), })) } <file_sep path="hyperswitch/crates/router/src/services/api/client.rs" role="context" start="271" end="283"> fn send( self, ) -> CustomResult< Box< (dyn core::future::Future<Output = Result<reqwest::Response, reqwest::Error>> + 'static), >, ApiClientError, > { Ok(Box::new( self.inner.ok_or(ApiClientError::UnexpectedState)?.send(), )) } <file_sep path="hyperswitch/crates/router/src/services/api/client.rs" role="context" start="21" end="56"> fn get_client_builder( proxy_config: &Proxy, ) -> CustomResult<reqwest::ClientBuilder, ApiClientError> { let mut client_builder = reqwest::Client::builder() .redirect(reqwest::redirect::Policy::none()) .pool_idle_timeout(Duration::from_secs( proxy_config .idle_pool_connection_timeout .unwrap_or_default(), )); let proxy_exclusion_config = reqwest::NoProxy::from_string(&proxy_config.bypass_proxy_hosts.clone().unwrap_or_default()); // Proxy all HTTPS traffic through the configured HTTPS proxy if let Some(url) = proxy_config.https_url.as_ref() { client_builder = client_builder.proxy( reqwest::Proxy::https(url) .change_context(ApiClientError::InvalidProxyConfiguration) .attach_printable("HTTPS proxy configuration error")? .no_proxy(proxy_exclusion_config.clone()), ); } // Proxy all HTTP traffic through the configured HTTP proxy if let Some(url) = proxy_config.http_url.as_ref() { client_builder = client_builder.proxy( reqwest::Proxy::http(url) .change_context(ApiClientError::InvalidProxyConfiguration) .attach_printable("HTTP proxy configuration error")? .no_proxy(proxy_exclusion_config), ); } Ok(client_builder) }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/tests/connectors/stax.rs<|crate|> router<|connector|> stax anchor=should_capture_authorized_payment kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="125" end="135"> async fn should_capture_authorized_payment() { let response = CONNECTOR .authorize_and_capture_payment( payment_method_details(), None, get_default_payment_info(None, create_customer_and_get_token().await), ) .await .expect("Capture payment response"); assert_eq!(response.status, enums::AttemptStatus::Charged); } <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="124" end="124"> use router::types::{self, domain, storage::enums, PaymentsResponseData}; <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="156" end="179"> async fn should_sync_authorized_payment() { let authorize_response = CONNECTOR .authorize_payment( payment_method_details(), get_default_payment_info(None, create_customer_and_get_token().await), ) .await .expect("Authorize payment response"); let txn_id = utils::get_connector_transaction_id(authorize_response.response); let response = CONNECTOR .psync_retry_till_status_matches( enums::AttemptStatus::Authorized, Some(types::PaymentsSyncData { connector_transaction_id: types::ResponseId::ConnectorTransactionId( txn_id.unwrap(), ), ..Default::default() }), get_default_payment_info(None, None), ) .await .expect("PSync response"); assert_eq!(response.status, enums::AttemptStatus::Authorized,); } <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="139" end="152"> async fn should_partially_capture_authorized_payment() { let response = CONNECTOR .authorize_and_capture_payment( payment_method_details(), Some(types::PaymentsCaptureData { amount_to_capture: 50, ..utils::PaymentCaptureType::default().0 }), get_default_payment_info(None, create_customer_and_get_token().await), ) .await .expect("Capture payment response"); assert_eq!(response.status, enums::AttemptStatus::Charged); } <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="112" end="121"> async fn should_only_authorize_payment() { let response = CONNECTOR .authorize_payment( payment_method_details(), get_default_payment_info(None, create_customer_and_get_token().await), ) .await .expect("Authorize payment response"); assert_eq!(response.status, enums::AttemptStatus::Authorized); } <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="84" end="107"> async fn create_customer_and_get_token() -> Option<String> { let customer_response = CONNECTOR .create_connector_customer(customer_details(), get_default_payment_info(None, None)) .await .expect("Authorize payment response"); let connector_customer_id = match customer_response.response.unwrap() { PaymentsResponseData::ConnectorCustomerResponse { connector_customer_id, } => Some(connector_customer_id), _ => None, }; let token_response = CONNECTOR .create_connector_pm_token( token_details(), get_default_payment_info(connector_customer_id, None), ) .await .expect("Authorize payment response"); match token_response.response.unwrap() { PaymentsResponseData::TokenizationResponse { token } => Some(token), _ => None, } } <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="39" end="55"> fn get_default_payment_info( connector_customer: Option<String>, payment_method_token: Option<String>, ) -> Option<utils::PaymentInfo> { Some(utils::PaymentInfo { address: None, auth_type: None, access_token: None, connector_meta_data: None, connector_customer, payment_method_token, #[cfg(feature = "payouts")] payout_method_data: None, #[cfg(feature = "payouts")] currency: None, }) } <file_sep path="hyperswitch/migrations/2023-07-07-091223_create_captures_table/up.sql" role="context" start="1" end="17"> CREATE TYPE "CaptureStatus" AS ENUM ( 'started', 'charged', 'pending', 'failed' ); ALTER TYPE "IntentStatus" ADD VALUE If NOT EXISTS 'partially_captured' AFTER 'requires_capture'; CREATE TABLE captures( capture_id VARCHAR(64) NOT NULL PRIMARY KEY, payment_id VARCHAR(64) NOT NULL, merchant_id VARCHAR(64) NOT NULL, status "CaptureStatus" NOT NULL, amount BIGINT NOT NULL, currency "Currency", connector VARCHAR(255), error_message VARCHAR(255),
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/tests/connectors/stax.rs<|crate|> router<|connector|> stax anchor=should_refund_auto_captured_payment kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="361" end="374"> async fn should_refund_auto_captured_payment() { let response = CONNECTOR .make_payment_and_refund( payment_method_details(), None, get_default_payment_info(None, create_customer_and_get_token().await), ) .await .unwrap(); assert_eq!( response.response.unwrap().refund_status, enums::RefundStatus::Success, ); } <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="360" end="360"> use router::types::{self, domain, storage::enums, PaymentsResponseData}; <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="398" end="429"> async fn should_refund_succeeded_payment_multiple_times() { let payment_method_token = create_customer_and_get_token().await; let response = CONNECTOR .make_payment( payment_method_details(), get_default_payment_info(None, payment_method_token.clone()), ) .await .unwrap(); //try refund for previous payment let transaction_id = utils::get_connector_transaction_id(response.response).unwrap(); for _x in 0..2 { tokio::time::sleep(Duration::from_secs(60)).await; // to avoid 404 error let refund_response = CONNECTOR .refund_payment( transaction_id.clone(), Some(types::RefundsData { refund_amount: 50, ..utils::PaymentRefundType::default().0 }), get_default_payment_info(None, payment_method_token.clone()), ) .await .unwrap(); assert_eq!( refund_response.response.unwrap().refund_status, enums::RefundStatus::Success, ); } } <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="378" end="394"> async fn should_partially_refund_succeeded_payment() { let refund_response = CONNECTOR .make_payment_and_refund( payment_method_details(), Some(types::RefundsData { refund_amount: 50, ..utils::PaymentRefundType::default().0 }), get_default_payment_info(None, create_customer_and_get_token().await), ) .await .unwrap(); assert_eq!( refund_response.response.unwrap().refund_status, enums::RefundStatus::Success, ); } <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="331" end="357"> async fn should_sync_auto_captured_payment() { let authorize_response = CONNECTOR .make_payment( payment_method_details(), get_default_payment_info(None, create_customer_and_get_token().await), ) .await .unwrap(); assert_eq!(authorize_response.status, enums::AttemptStatus::Charged); let txn_id = utils::get_connector_transaction_id(authorize_response.response); assert_ne!(txn_id, None, "Empty connector transaction id"); let response = CONNECTOR .psync_retry_till_status_matches( enums::AttemptStatus::Charged, Some(types::PaymentsSyncData { connector_transaction_id: types::ResponseId::ConnectorTransactionId( txn_id.unwrap(), ), capture_method: Some(enums::CaptureMethod::Automatic), ..Default::default() }), get_default_payment_info(None, None), ) .await .unwrap(); assert_eq!(response.status, enums::AttemptStatus::Charged,); } <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="318" end="327"> async fn should_make_payment() { let authorize_response = CONNECTOR .make_payment( payment_method_details(), get_default_payment_info(None, create_customer_and_get_token().await), ) .await .unwrap(); assert_eq!(authorize_response.status, enums::AttemptStatus::Charged); } <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="39" end="55"> fn get_default_payment_info( connector_customer: Option<String>, payment_method_token: Option<String>, ) -> Option<utils::PaymentInfo> { Some(utils::PaymentInfo { address: None, auth_type: None, access_token: None, connector_meta_data: None, connector_customer, payment_method_token, #[cfg(feature = "payouts")] payout_method_data: None, #[cfg(feature = "payouts")] currency: None, }) } <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="84" end="107"> async fn create_customer_and_get_token() -> Option<String> { let customer_response = CONNECTOR .create_connector_customer(customer_details(), get_default_payment_info(None, None)) .await .expect("Authorize payment response"); let connector_customer_id = match customer_response.response.unwrap() { PaymentsResponseData::ConnectorCustomerResponse { connector_customer_id, } => Some(connector_customer_id), _ => None, }; let token_response = CONNECTOR .create_connector_pm_token( token_details(), get_default_payment_info(connector_customer_id, None), ) .await .expect("Authorize payment response"); match token_response.response.unwrap() { PaymentsResponseData::TokenizationResponse { token } => Some(token), _ => None, } } <file_sep path="hyperswitch/crates/router/src/connector/dummyconnector/transformers.rs" role="context" start="304" end="309"> pub enum RefundStatus { Succeeded, Failed, #[default] Processing, } <file_sep path="hyperswitch/crates/api_models/src/refunds.rs" role="context" start="378" end="384"> pub enum RefundStatus { Succeeded, Failed, #[default] Pending, Review, }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/connector/gpayments.rs<|crate|> router anchor=build_endpoint kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/connector/gpayments.rs" role="context" start="216" end="223"> fn build_endpoint( base_url: &str, connector_metadata: &Option<common_utils::pii::SecretSerdeValue>, ) -> CustomResult<String, errors::ConnectorError> { let metadata = gpayments::GpaymentsMetaData::try_from(connector_metadata)?; let endpoint_prefix = metadata.endpoint_prefix; Ok(base_url.replace("{{merchant_endpoint_prefix}}", &endpoint_prefix)) } <file_sep path="hyperswitch/crates/router/src/connector/gpayments.rs" role="context" start="215" end="215"> use common_utils::{ request::RequestContent, types::{AmountConvertor, MinorUnit, MinorUnitForConnector}, }; use transformers as gpayments; use crate::{ configs::settings, connector::{gpayments::gpayments_types::GpaymentsConnectorMetaData, utils::to_connector_meta}, core::errors::{self, CustomResult}, events::connector_api_logs::ConnectorEvent, headers, services, services::{request, ConnectorIntegration, ConnectorSpecifications, ConnectorValidation}, types::{ self, api::{self, ConnectorCommon, ConnectorCommonExt}, ErrorResponse, Response, }, utils::BytesExt, }; <file_sep path="hyperswitch/crates/router/src/connector/gpayments.rs" role="context" start="240" end="242"> fn get_content_type(&self) -> &'static str { self.common_get_content_type() } <file_sep path="hyperswitch/crates/router/src/connector/gpayments.rs" role="context" start="232" end="238"> fn get_headers( &self, req: &types::authentication::ConnectorAuthenticationRouterData, connectors: &settings::Connectors, ) -> CustomResult<Vec<(String, request::Maskable<String>)>, errors::ConnectorError> { self.build_headers(req, connectors) } <file_sep path="hyperswitch/crates/router/src/connector/gpayments.rs" role="context" start="202" end="207"> fn get_webhook_resource_object( &self, _request: &api::IncomingWebhookRequestDetails<'_>, ) -> CustomResult<Box<dyn masking::ErasedMaskSerialize>, errors::ConnectorError> { Err(report!(errors::ConnectorError::WebhooksNotImplemented)) } <file_sep path="hyperswitch/crates/router/src/connector/gpayments.rs" role="context" start="195" end="200"> fn get_webhook_event_type( &self, _request: &api::IncomingWebhookRequestDetails<'_>, ) -> CustomResult<api::IncomingWebhookEvent, errors::ConnectorError> { Err(report!(errors::ConnectorError::WebhooksNotImplemented)) } <file_sep path="hyperswitch/crates/router/src/connector/gpayments.rs" role="context" start="540" end="547"> fn get_url( &self, req: &types::authentication::PreAuthNVersionCallRouterData, connectors: &settings::Connectors, ) -> CustomResult<String, errors::ConnectorError> { let base_url = build_endpoint(self.base_url(connectors), &req.connector_meta_data)?; Ok(format!("{}/api/v2/auth/enrol", base_url,)) } <file_sep path="hyperswitch/crates/router/src/connector/gpayments.rs" role="context" start="348" end="358"> fn get_url( &self, req: &types::authentication::ConnectorPostAuthenticationRouterData, connectors: &settings::Connectors, ) -> CustomResult<String, errors::ConnectorError> { let base_url = build_endpoint(self.base_url(connectors), &req.connector_meta_data)?; Ok(format!( "{}/api/v2/auth/brw/result?threeDSServerTransID={}", base_url, req.request.threeds_server_transaction_id, )) } <file_sep path="hyperswitch/crates/router/src/connector/gpayments/transformers.rs" role="context" start="79" end="82"> pub struct GpaymentsMetaData { pub endpoint_prefix: String, pub merchant_id: common_utils::id_type::MerchantId, } <file_sep path="hyperswitch/postman/collection-dir/powertranz/Flow Testcases/Happy Cases/Scenario1-Create payment with confirm true/Payments - Create/event.test.js" role="context" start="61" end="78"> "INFO - Unable to assign variable {{client_secret}}, as jsonData.client_secret is undefined.", ); } // Response body should have value "succeeded" for "status" if (jsonData?.status) { pm.test( "[POST]::/payments - Content check if value for 'status' matches 'succeeded'", function () { pm.expect(jsonData.status).to.eql("succeeded"); }, ); }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/services/authentication.rs<|crate|> router anchor=is_jwt_auth kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=1<|meta_end|> <file_sep path="hyperswitch/crates/router/src/services/authentication.rs" role="context" start="3789" end="3797"> pub fn is_jwt_auth(headers: &HeaderMap) -> bool { let header_map_struct = HeaderMapStruct::new(headers); match header_map_struct.get_auth_string_from_header() { Ok(auth_str) => auth_str.starts_with("Bearer"), Err(_) => get_cookie_from_header(headers) .and_then(cookies::get_jwt_from_cookies) .is_ok(), } } <file_sep path="hyperswitch/crates/router/src/services/authentication.rs" role="context" start="3788" end="3788"> use actix_web::http::header::HeaderMap; use crate::{ core::{ api_keys, errors::{self, utils::StorageErrorExt, RouterResult}, }, headers, routes::app::SessionStateInfo, services::api, types::{domain, storage}, utils::OptionExt, }; pub type AuthenticationDataWithUserId = (AuthenticationData, String); <file_sep path="hyperswitch/crates/router/src/services/authentication.rs" role="context" start="3812" end="3814"> pub fn get_api_key(headers: &HeaderMap) -> RouterResult<&str> { get_header_value_by_key("api-key".into(), headers)?.get_required_value("api_key") } <file_sep path="hyperswitch/crates/router/src/services/authentication.rs" role="context" start="3799" end="3810"> pub async fn decode_jwt<T>(token: &str, state: &impl SessionStateInfo) -> RouterResult<T> where T: serde::de::DeserializeOwned, { let conf = state.conf(); let secret = conf.secrets.get_inner().jwt_secret.peek().as_bytes(); let key = DecodingKey::from_secret(secret); decode::<T>(token, &key, &Validation::new(Algorithm::HS256)) .map(|decoded| decoded.claims) .change_context(errors::ApiErrorResponse::InvalidJwtToken) } <file_sep path="hyperswitch/crates/router/src/services/authentication.rs" role="context" start="3777" end="3787"> pub fn is_ephemeral_auth<A: SessionStateInfo + Sync + Send>( headers: &HeaderMap, ) -> RouterResult<Box<dyn AuthenticateAndFetch<AuthenticationData, A>>> { let api_key = get_api_key(headers)?; if !api_key.starts_with("epk") { Ok(Box::new(HeaderAuth(ApiKeyAuth))) } else { Ok(Box::new(EphemeralKeyAuth)) } } <file_sep path="hyperswitch/crates/router/src/services/authentication.rs" role="context" start="3744" end="3774"> pub async fn get_ephemeral_or_other_auth<T>( headers: &HeaderMap, is_merchant_flow: bool, payload: Option<&impl ClientSecretFetch>, ) -> RouterResult<( Box<dyn AuthenticateAndFetch<AuthenticationData, T>>, api::AuthFlow, bool, )> where T: SessionStateInfo + Sync + Send, ApiKeyAuth: AuthenticateAndFetch<AuthenticationData, T>, PublishableKeyAuth: AuthenticateAndFetch<AuthenticationData, T>, EphemeralKeyAuth: AuthenticateAndFetch<AuthenticationData, T>, { let api_key = get_api_key(headers)?; if api_key.starts_with("epk") { Ok((Box::new(EphemeralKeyAuth), api::AuthFlow::Client, true)) } else if is_merchant_flow { Ok(( Box::new(HeaderAuth(ApiKeyAuth)), api::AuthFlow::Merchant, false, )) } else { let payload = payload.get_required_value("ClientSecretFetch")?; let (auth, auth_flow) = check_client_secret_and_get_auth(headers, payload)?; Ok((auth, auth_flow, false)) } } <file_sep path="hyperswitch/crates/router/src/services/authentication.rs" role="context" start="3872" end="3883"> pub fn auth_type<'a, T, A>( default_auth: &'a dyn AuthenticateAndFetch<T, A>, jwt_auth_type: &'a dyn AuthenticateAndFetch<T, A>, headers: &HeaderMap, ) -> &'a dyn AuthenticateAndFetch<T, A> where { if is_jwt_auth(headers) { return jwt_auth_type; } default_auth } <file_sep path="hyperswitch/crates/router/src/services/authentication.rs" role="context" start="3856" end="3864"> pub fn get_cookie_from_header(headers: &HeaderMap) -> RouterResult<&str> { let cookie = headers .get(cookies::get_cookie_header()) .ok_or(report!(errors::ApiErrorResponse::CookieNotFound))?; cookie .to_str() .change_context(errors::ApiErrorResponse::InvalidCookie) } <file_sep path="hyperswitch/crates/router/src/services/authentication.rs" role="context" start="1506" end="1508"> pub fn new(headers: &'a HeaderMap) -> Self { HeaderMapStruct { headers } } <file_sep path="hyperswitch/crates/router/src/services/authentication.rs" role="context" start="1501" end="1503"> pub(crate) struct HeaderMapStruct<'a> { headers: &'a HeaderMap, }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/services/authorization.rs<|crate|> router anchor=get_role_info_from_cache kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/services/authorization.rs" role="context" start="60" end="70"> async fn get_role_info_from_cache<A>(state: &A, role_id: &str) -> RouterResult<roles::RoleInfo> where A: SessionStateInfo + Sync, { let redis_conn = get_redis_connection(state)?; redis_conn .get_and_deserialize_key(&get_cache_key_from_role_id(role_id).into(), "RoleInfo") .await .change_context(ApiErrorResponse::InternalServerError) } <file_sep path="hyperswitch/crates/router/src/services/authorization.rs" role="context" start="59" end="59"> use crate::{ consts, core::errors::{ApiErrorResponse, RouterResult, StorageErrorExt}, routes::app::SessionStateInfo, }; <file_sep path="hyperswitch/crates/router/src/services/authorization.rs" role="context" start="76" end="92"> async fn get_role_info_from_db<A>( state: &A, role_id: &str, org_id: &id_type::OrganizationId, tenant_id: &id_type::TenantId, ) -> RouterResult<roles::RoleInfo> where A: SessionStateInfo + Sync, { state .session_state() .global_store .find_by_role_id_org_id_tenant_id(role_id, org_id, tenant_id) .await .map(roles::RoleInfo::from) .to_not_found_response(ApiErrorResponse::InvalidJwtToken) } <file_sep path="hyperswitch/crates/router/src/services/authorization.rs" role="context" start="72" end="74"> pub fn get_cache_key_from_role_id(role_id: &str) -> String { format!("{}{}", consts::ROLE_INFO_CACHE_PREFIX, role_id) } <file_sep path="hyperswitch/crates/router/src/services/authorization.rs" role="context" start="21" end="58"> pub async fn get_role_info<A>(state: &A, token: &AuthToken) -> RouterResult<roles::RoleInfo> where A: SessionStateInfo + Sync, { if let Some(role_info) = roles::predefined_roles::PREDEFINED_ROLES.get(token.role_id.as_str()) { return Ok(role_info.clone()); } if let Ok(role_info) = get_role_info_from_cache(state, &token.role_id) .await .map_err(|e| logger::error!("Failed to get permissions from cache {e:?}")) { return Ok(role_info.clone()); } let role_info = get_role_info_from_db( state, &token.role_id, &token.org_id, token .tenant_id .as_ref() .unwrap_or(&state.session_state().tenant.tenant_id), ) .await?; let token_expiry = i64::try_from(token.exp).change_context(ApiErrorResponse::InternalServerError)?; let cache_ttl = token_expiry - common_utils::date_time::now_unix_timestamp(); if cache_ttl > 0 { set_role_info_in_cache(state, &token.role_id, &role_info, cache_ttl) .await .map_err(|e| logger::error!("Failed to set role info in cache {e:?}")) .ok(); } Ok(role_info) } <file_sep path="hyperswitch/crates/router/src/services/authorization.rs" role="context" start="146" end="152"> fn get_redis_connection<A: SessionStateInfo>(state: &A) -> RouterResult<Arc<RedisConnectionPool>> { state .store() .get_redis_conn() .change_context(ApiErrorResponse::InternalServerError) .attach_printable("Failed to get redis connection") } <file_sep path="hyperswitch/crates/router/src/services/authorization/roles.rs" role="context" start="18" end="28"> pub struct RoleInfo { role_id: String, role_name: String, groups: Vec<PermissionGroup>, scope: RoleScope, entity_type: EntityType, is_invitable: bool, is_deletable: bool, is_updatable: bool, is_internal: bool, } <file_sep path="hyperswitch/crates/api_models/src/errors/types.rs" role="context" start="86" end="100"> pub enum ApiErrorResponse { Unauthorized(ApiError), ForbiddenCommonResource(ApiError), ForbiddenPrivateResource(ApiError), Conflict(ApiError), Gone(ApiError), Unprocessable(ApiError), InternalServerError(ApiError), NotImplemented(ApiError), ConnectorError(ApiError, #[serde(skip_serializing)] StatusCode), NotFound(ApiError), MethodNotAllowed(ApiError), BadRequest(ApiError), DomainError(ApiError), }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/services/authentication.rs<|crate|> router anchor=get_header_value_by_key kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/services/authentication.rs" role="context" start="3816" end="3829"> pub fn get_header_value_by_key(key: String, headers: &HeaderMap) -> RouterResult<Option<&str>> { headers .get(&key) .map(|source_str| { source_str .to_str() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable(format!( "Failed to convert header value to string for header key: {}", key )) }) .transpose() } <file_sep path="hyperswitch/crates/router/src/services/authentication.rs" role="context" start="3815" end="3815"> use std::str::FromStr; use actix_web::http::header::HeaderMap; use crate::core::errors::UserResult; use crate::{ core::{ api_keys, errors::{self, utils::StorageErrorExt, RouterResult}, }, headers, routes::app::SessionStateInfo, services::api, types::{domain, storage}, utils::OptionExt, }; pub type AuthenticationDataWithUserId = (AuthenticationData, String); <file_sep path="hyperswitch/crates/router/src/services/authentication.rs" role="context" start="3845" end="3854"> pub fn get_jwt_from_authorization_header(headers: &HeaderMap) -> RouterResult<&str> { headers .get(headers::AUTHORIZATION) .get_required_value(headers::AUTHORIZATION)? .to_str() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to convert JWT token to string")? .strip_prefix("Bearer ") .ok_or(errors::ApiErrorResponse::InvalidJwtToken.into()) } <file_sep path="hyperswitch/crates/router/src/services/authentication.rs" role="context" start="3830" end="3843"> pub fn get_id_type_by_key_from_headers<T: FromStr>( key: String, headers: &HeaderMap, ) -> RouterResult<Option<T>> { get_header_value_by_key(key.clone(), headers)? .map(|str_value| T::from_str(str_value)) .transpose() .map_err(|_err| { error_stack::report!(errors::ApiErrorResponse::InvalidDataFormat { field_name: key, expected_format: "Valid Id String".to_string(), }) }) } <file_sep path="hyperswitch/crates/router/src/services/authentication.rs" role="context" start="3812" end="3814"> pub fn get_api_key(headers: &HeaderMap) -> RouterResult<&str> { get_header_value_by_key("api-key".into(), headers)?.get_required_value("api_key") } <file_sep path="hyperswitch/crates/router/src/services/authentication.rs" role="context" start="3799" end="3810"> pub async fn decode_jwt<T>(token: &str, state: &impl SessionStateInfo) -> RouterResult<T> where T: serde::de::DeserializeOwned, { let conf = state.conf(); let secret = conf.secrets.get_inner().jwt_secret.peek().as_bytes(); let key = DecodingKey::from_secret(secret); decode::<T>(token, &key, &Validation::new(Algorithm::HS256)) .map(|decoded| decoded.claims) .change_context(errors::ApiErrorResponse::InvalidJwtToken) } <file_sep path="hyperswitch/crates/router/src/core/errors.rs" role="context" start="31" end="31"> pub type RouterResult<T> = CustomResult<T, ApiErrorResponse>; <file_sep path="hyperswitch/crates/api_models/src/errors/types.rs" role="context" start="86" end="100"> pub enum ApiErrorResponse { Unauthorized(ApiError), ForbiddenCommonResource(ApiError), ForbiddenPrivateResource(ApiError), Conflict(ApiError), Gone(ApiError), Unprocessable(ApiError), InternalServerError(ApiError), NotImplemented(ApiError), ConnectorError(ApiError, #[serde(skip_serializing)] StatusCode), NotFound(ApiError), MethodNotAllowed(ApiError), BadRequest(ApiError), DomainError(ApiError), }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/connector/threedsecureio.rs<|crate|> router anchor=get_request_body kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/connector/threedsecureio.rs" role="context" start="451" end="460"> fn get_request_body( &self, req: &types::authentication::ConnectorPostAuthenticationRouterData, _connectors: &settings::Connectors, ) -> CustomResult<RequestContent, errors::ConnectorError> { let req_obj = threedsecureio::ThreedsecureioPostAuthenticationRequest { three_ds_server_trans_id: req.request.threeds_server_transaction_id.clone(), }; Ok(RequestContent::Json(Box::new(req_obj))) } <file_sep path="hyperswitch/crates/router/src/connector/threedsecureio.rs" role="context" start="450" end="450"> use transformers as threedsecureio; use crate::{ configs::settings, core::errors::{self, CustomResult}, events::connector_api_logs::ConnectorEvent, headers, services::{ self, request::{self, Mask}, ConnectorIntegration, ConnectorSpecifications, ConnectorValidation, }, types::{ self, api::{self, ConnectorCommon, ConnectorCommonExt}, ErrorResponse, RequestContent, Response, }, utils::{self, BytesExt}, }; <file_sep path="hyperswitch/crates/router/src/connector/threedsecureio.rs" role="context" start="490" end="517"> fn handle_response( &self, data: &types::authentication::ConnectorPostAuthenticationRouterData, event_builder: Option<&mut ConnectorEvent>, res: Response, ) -> CustomResult< types::authentication::ConnectorPostAuthenticationRouterData, errors::ConnectorError, > { let response: threedsecureio::ThreedsecureioPostAuthenticationResponse = res .response .parse_struct("threedsecureio PaymentsSyncResponse") .change_context(errors::ConnectorError::ResponseDeserializationFailed)?; event_builder.map(|i| i.set_response_body(&response)); router_env::logger::info!(connector_response=?response); Ok( types::authentication::ConnectorPostAuthenticationRouterData { response: Ok( types::authentication::AuthenticationResponseData::PostAuthNResponse { trans_status: response.trans_status.into(), authentication_value: response.authentication_value, eci: response.eci, }, ), ..data.clone() }, ) } <file_sep path="hyperswitch/crates/router/src/connector/threedsecureio.rs" role="context" start="462" end="488"> fn build_request( &self, req: &types::authentication::ConnectorPostAuthenticationRouterData, connectors: &settings::Connectors, ) -> CustomResult<Option<services::Request>, errors::ConnectorError> { Ok(Some( services::RequestBuilder::new() .method(services::Method::Post) .url( &types::authentication::ConnectorPostAuthenticationType::get_url( self, req, connectors, )?, ) .attach_default_headers() .headers( types::authentication::ConnectorPostAuthenticationType::get_headers( self, req, connectors, )?, ) .set_body( types::authentication::ConnectorPostAuthenticationType::get_request_body( self, req, connectors, )?, ) .build(), )) } <file_sep path="hyperswitch/crates/router/src/connector/threedsecureio.rs" role="context" start="443" end="449"> fn get_url( &self, _req: &types::authentication::ConnectorPostAuthenticationRouterData, connectors: &settings::Connectors, ) -> CustomResult<String, errors::ConnectorError> { Ok(format!("{}/postauth", self.base_url(connectors),)) } <file_sep path="hyperswitch/crates/router/src/connector/threedsecureio.rs" role="context" start="439" end="441"> fn get_content_type(&self) -> &'static str { self.common_get_content_type() } <file_sep path="hyperswitch/crates/router/src/connector/threedsecureio.rs" role="context" start="368" end="394"> fn build_request( &self, req: &types::authentication::PreAuthNRouterData, connectors: &settings::Connectors, ) -> CustomResult<Option<services::Request>, errors::ConnectorError> { Ok(Some( services::RequestBuilder::new() .method(services::Method::Post) .url( &types::authentication::ConnectorPreAuthenticationType::get_url( self, req, connectors, )?, ) .attach_default_headers() .headers( types::authentication::ConnectorPreAuthenticationType::get_headers( self, req, connectors, )?, ) .set_body( types::authentication::ConnectorPreAuthenticationType::get_request_body( self, req, connectors, )?, ) .build(), )) } <file_sep path="hyperswitch/crates/router/src/connector/threedsecureio.rs" role="context" start="270" end="296"> fn build_request( &self, req: &types::authentication::ConnectorAuthenticationRouterData, connectors: &settings::Connectors, ) -> CustomResult<Option<services::Request>, errors::ConnectorError> { Ok(Some( services::RequestBuilder::new() .method(services::Method::Post) .url( &types::authentication::ConnectorAuthenticationType::get_url( self, req, connectors, )?, ) .attach_default_headers() .headers( types::authentication::ConnectorAuthenticationType::get_headers( self, req, connectors, )?, ) .set_body( types::authentication::ConnectorAuthenticationType::get_request_body( self, req, connectors, )?, ) .build(), )) } <file_sep path="hyperswitch/crates/router/src/types/authentication.rs" role="context" start="21" end="25"> pub type ConnectorPostAuthenticationRouterData = RouterData< api::PostAuthentication, ConnectorPostAuthenticationRequestData, AuthenticationResponseData, >;
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/tests/connectors/stax.rs<|crate|> router<|connector|> stax anchor=should_partially_capture_authorized_payment kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="139" end="152"> async fn should_partially_capture_authorized_payment() { let response = CONNECTOR .authorize_and_capture_payment( payment_method_details(), Some(types::PaymentsCaptureData { amount_to_capture: 50, ..utils::PaymentCaptureType::default().0 }), get_default_payment_info(None, create_customer_and_get_token().await), ) .await .expect("Capture payment response"); assert_eq!(response.status, enums::AttemptStatus::Charged); } <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="138" end="138"> use router::types::{self, domain, storage::enums, PaymentsResponseData}; <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="183" end="197"> async fn should_void_authorized_payment() { let response = CONNECTOR .authorize_and_void_payment( payment_method_details(), Some(types::PaymentsCancelData { connector_transaction_id: String::from(""), cancellation_reason: Some("requested_by_customer".to_string()), ..Default::default() }), get_default_payment_info(None, create_customer_and_get_token().await), ) .await .expect("Void payment response"); assert_eq!(response.status, enums::AttemptStatus::Voided); } <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="156" end="179"> async fn should_sync_authorized_payment() { let authorize_response = CONNECTOR .authorize_payment( payment_method_details(), get_default_payment_info(None, create_customer_and_get_token().await), ) .await .expect("Authorize payment response"); let txn_id = utils::get_connector_transaction_id(authorize_response.response); let response = CONNECTOR .psync_retry_till_status_matches( enums::AttemptStatus::Authorized, Some(types::PaymentsSyncData { connector_transaction_id: types::ResponseId::ConnectorTransactionId( txn_id.unwrap(), ), ..Default::default() }), get_default_payment_info(None, None), ) .await .expect("PSync response"); assert_eq!(response.status, enums::AttemptStatus::Authorized,); } <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="125" end="135"> async fn should_capture_authorized_payment() { let response = CONNECTOR .authorize_and_capture_payment( payment_method_details(), None, get_default_payment_info(None, create_customer_and_get_token().await), ) .await .expect("Capture payment response"); assert_eq!(response.status, enums::AttemptStatus::Charged); } <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="112" end="121"> async fn should_only_authorize_payment() { let response = CONNECTOR .authorize_payment( payment_method_details(), get_default_payment_info(None, create_customer_and_get_token().await), ) .await .expect("Authorize payment response"); assert_eq!(response.status, enums::AttemptStatus::Authorized); } <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="84" end="107"> async fn create_customer_and_get_token() -> Option<String> { let customer_response = CONNECTOR .create_connector_customer(customer_details(), get_default_payment_info(None, None)) .await .expect("Authorize payment response"); let connector_customer_id = match customer_response.response.unwrap() { PaymentsResponseData::ConnectorCustomerResponse { connector_customer_id, } => Some(connector_customer_id), _ => None, }; let token_response = CONNECTOR .create_connector_pm_token( token_details(), get_default_payment_info(connector_customer_id, None), ) .await .expect("Authorize payment response"); match token_response.response.unwrap() { PaymentsResponseData::TokenizationResponse { token } => Some(token), _ => None, } } <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="78" end="82"> fn payment_method_details() -> Option<types::PaymentsAuthorizeData> { Some(types::PaymentsAuthorizeData { ..utils::PaymentAuthorizeType::default().0 }) } <file_sep path="hyperswitch/crates/router/tests/connectors/utils.rs" role="context" start="920" end="920"> pub struct PaymentCaptureType(pub types::PaymentsCaptureData); <file_sep path="hyperswitch/migrations/2023-07-07-091223_create_captures_table/up.sql" role="context" start="1" end="17"> CREATE TYPE "CaptureStatus" AS ENUM ( 'started', 'charged', 'pending', 'failed' ); ALTER TYPE "IntentStatus" ADD VALUE If NOT EXISTS 'partially_captured' AFTER 'requires_capture'; CREATE TABLE captures( capture_id VARCHAR(64) NOT NULL PRIMARY KEY, payment_id VARCHAR(64) NOT NULL, merchant_id VARCHAR(64) NOT NULL, status "CaptureStatus" NOT NULL, amount BIGINT NOT NULL, currency "Currency", connector VARCHAR(255), error_message VARCHAR(255),
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/tests/connectors/square.rs<|crate|> router<|connector|> square anchor=should_void_authorized_payment kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=1<|meta_end|> <file_sep path="hyperswitch/crates/router/tests/connectors/square.rs" role="context" start="159" end="173"> async fn should_void_authorized_payment() { let response = CONNECTOR .authorize_and_void_payment( payment_method_details(), Some(types::PaymentsCancelData { connector_transaction_id: String::from(""), cancellation_reason: Some("requested_by_customer".to_string()), ..Default::default() }), get_default_payment_info(create_token().await), ) .await .expect("Void payment response"); assert_eq!(response.status, enums::AttemptStatus::Voided); } <file_sep path="hyperswitch/crates/router/tests/connectors/square.rs" role="context" start="158" end="158"> use router::types::{self, storage::enums, PaymentsResponseData}; <file_sep path="hyperswitch/crates/router/tests/connectors/square.rs" role="context" start="204" end="230"> async fn should_partially_refund_manually_captured_payment() { let refund_response = CONNECTOR .capture_payment_and_refund( payment_method_details(), None, Some(types::RefundsData { refund_amount: 50, ..utils::PaymentRefundType::default().0 }), get_default_payment_info(create_token().await), ) .await .unwrap(); let response = CONNECTOR .rsync_retry_till_status_matches( enums::RefundStatus::Success, refund_response.response.unwrap().connector_refund_id, None, get_default_payment_info(None), ) .await .unwrap(); assert_eq!( response.response.unwrap().refund_status, enums::RefundStatus::Success, ); } <file_sep path="hyperswitch/crates/router/tests/connectors/square.rs" role="context" start="177" end="200"> async fn should_refund_manually_captured_payment() { let refund_response = CONNECTOR .capture_payment_and_refund( payment_method_details(), None, None, get_default_payment_info(create_token().await), ) .await .unwrap(); let response = CONNECTOR .rsync_retry_till_status_matches( enums::RefundStatus::Success, refund_response.response.unwrap().connector_refund_id, None, get_default_payment_info(None), ) .await .unwrap(); assert_eq!( response.response.unwrap().refund_status, enums::RefundStatus::Success, ); } <file_sep path="hyperswitch/crates/router/tests/connectors/square.rs" role="context" start="132" end="155"> async fn should_sync_authorized_payment() { let authorize_response = CONNECTOR .authorize_payment( payment_method_details(), get_default_payment_info(create_token().await), ) .await .expect("Authorize payment response"); let txn_id = get_connector_transaction_id(authorize_response.response); let response = CONNECTOR .psync_retry_till_status_matches( enums::AttemptStatus::Authorized, Some(types::PaymentsSyncData { connector_transaction_id: types::ResponseId::ConnectorTransactionId( txn_id.unwrap(), ), ..Default::default() }), get_default_payment_info(None), ) .await .expect("PSync response"); assert_eq!(response.status, enums::AttemptStatus::Authorized,); } <file_sep path="hyperswitch/crates/router/tests/connectors/square.rs" role="context" start="115" end="128"> async fn should_partially_capture_authorized_payment() { let response = CONNECTOR .authorize_and_capture_payment( payment_method_details(), Some(types::PaymentsCaptureData { amount_to_capture: 50, ..utils::PaymentCaptureType::default().0 }), get_default_payment_info(create_token().await), ) .await .expect("Capture payment response"); assert_eq!(response.status, enums::AttemptStatus::Charged); } <file_sep path="hyperswitch/crates/router/tests/connectors/square.rs" role="context" start="54" end="56"> fn payment_method_details() -> Option<types::PaymentsAuthorizeData> { None } <file_sep path="hyperswitch/crates/router/tests/connectors/square.rs" role="context" start="39" end="52"> fn get_default_payment_info(payment_method_token: Option<String>) -> Option<utils::PaymentInfo> { Some(utils::PaymentInfo { address: None, auth_type: None, access_token: None, connector_meta_data: None, connector_customer: None, payment_method_token, #[cfg(feature = "payouts")] payout_method_data: None, #[cfg(feature = "payouts")] currency: None, }) }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/utils/user_role.rs<|crate|> router anchor=get_single_merchant_id_and_profile_id kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/utils/user_role.rs" role="context" start="462" end="471"> pub async fn get_single_merchant_id_and_profile_id( state: &SessionState, user_role: &UserRole, ) -> UserResult<(id_type::MerchantId, id_type::ProfileId)> { let org_id = get_single_org_id(state, user_role).await?; let merchant_id = get_single_merchant_id(state, user_role, &org_id).await?; let profile_id = get_single_profile_id(state, user_role, &merchant_id).await?; Ok((merchant_id, profile_id)) } <file_sep path="hyperswitch/crates/router/src/utils/user_role.rs" role="context" start="461" end="461"> use common_utils::id_type; use diesel_models::{ enums::{UserRoleVersion, UserStatus}, role::ListRolesByEntityPayload, user_role::{UserRole, UserRoleUpdate}, }; use crate::{ consts, core::errors::{UserErrors, UserResult}, db::{ errors::StorageErrorExt, user_role::{ListUserRolesByOrgIdPayload, ListUserRolesByUserIdPayload}, }, routes::SessionState, services::authorization::{self as authz, roles}, types::domain, }; <file_sep path="hyperswitch/crates/router/src/utils/user_role.rs" role="context" start="493" end="509"> pub fn get_min_entity( user_entity: EntityType, filter_entity: Option<EntityType>, ) -> UserResult<EntityType> { let Some(filter_entity) = filter_entity else { return Ok(user_entity); }; if user_entity < filter_entity { return Err(report!(UserErrors::InvalidRoleOperation)).attach_printable(format!( "{} level user requesting data for {:?} level", user_entity, filter_entity )); } Ok(cmp::min(user_entity, filter_entity)) } <file_sep path="hyperswitch/crates/router/src/utils/user_role.rs" role="context" start="473" end="491"> pub async fn fetch_user_roles_by_payload( state: &SessionState, payload: ListUserRolesByOrgIdPayload<'_>, request_entity_type: Option<EntityType>, ) -> UserResult<HashSet<UserRole>> { Ok(state .global_store .list_user_roles_by_org_id(payload) .await .change_context(UserErrors::InternalServerError)? .into_iter() .filter_map(|user_role| { let (_entity_id, entity_type) = user_role.get_entity_id_and_type()?; request_entity_type .map_or(true, |req_entity_type| entity_type == req_entity_type) .then_some(user_role) }) .collect::<HashSet<_>>()) } <file_sep path="hyperswitch/crates/router/src/utils/user_role.rs" role="context" start="299" end="460"> pub async fn get_lineage_for_user_id_and_entity_for_accepting_invite( state: &SessionState, user_id: &str, tenant_id: &id_type::TenantId, entity_id: String, entity_type: EntityType, ) -> UserResult< Option<( id_type::OrganizationId, Option<id_type::MerchantId>, Option<id_type::ProfileId>, )>, > { match entity_type { EntityType::Tenant => Err(UserErrors::InvalidRoleOperationWithMessage( "Tenant roles are not allowed for this operation".to_string(), ) .into()), EntityType::Organization => { let Ok(org_id) = id_type::OrganizationId::try_from(std::borrow::Cow::from(entity_id.clone())) else { return Ok(None); }; let user_roles = state .global_store .list_user_roles_by_user_id(ListUserRolesByUserIdPayload { user_id, tenant_id, org_id: Some(&org_id), merchant_id: None, profile_id: None, entity_id: None, version: None, status: Some(UserStatus::InvitationSent), limit: None, }) .await .change_context(UserErrors::InternalServerError)? .into_iter() .collect::<HashSet<_>>(); if user_roles.len() > 1 { return Ok(None); } if let Some(user_role) = user_roles.into_iter().next() { let (_entity_id, entity_type) = user_role .get_entity_id_and_type() .ok_or(UserErrors::InternalServerError)?; if entity_type != EntityType::Organization { return Ok(None); } return Ok(Some(( user_role.org_id.ok_or(UserErrors::InternalServerError)?, None, None, ))); } Ok(None) } EntityType::Merchant => { let Ok(merchant_id) = id_type::MerchantId::wrap(entity_id) else { return Ok(None); }; let user_roles = state .global_store .list_user_roles_by_user_id(ListUserRolesByUserIdPayload { user_id, tenant_id, org_id: None, merchant_id: Some(&merchant_id), profile_id: None, entity_id: None, version: None, status: Some(UserStatus::InvitationSent), limit: None, }) .await .change_context(UserErrors::InternalServerError)? .into_iter() .collect::<HashSet<_>>(); if user_roles.len() > 1 { return Ok(None); } if let Some(user_role) = user_roles.into_iter().next() { let (_entity_id, entity_type) = user_role .get_entity_id_and_type() .ok_or(UserErrors::InternalServerError)?; if entity_type != EntityType::Merchant { return Ok(None); } return Ok(Some(( user_role.org_id.ok_or(UserErrors::InternalServerError)?, Some(merchant_id), None, ))); } Ok(None) } EntityType::Profile => { let Ok(profile_id) = id_type::ProfileId::try_from(std::borrow::Cow::from(entity_id)) else { return Ok(None); }; let user_roles = state .global_store .list_user_roles_by_user_id(ListUserRolesByUserIdPayload { user_id, tenant_id: &state.tenant.tenant_id, org_id: None, merchant_id: None, profile_id: Some(&profile_id), entity_id: None, version: None, status: Some(UserStatus::InvitationSent), limit: None, }) .await .change_context(UserErrors::InternalServerError)? .into_iter() .collect::<HashSet<_>>(); if user_roles.len() > 1 { return Ok(None); } if let Some(user_role) = user_roles.into_iter().next() { let (_entity_id, entity_type) = user_role .get_entity_id_and_type() .ok_or(UserErrors::InternalServerError)?; if entity_type != EntityType::Profile { return Ok(None); } return Ok(Some(( user_role.org_id.ok_or(UserErrors::InternalServerError)?, Some( user_role .merchant_id .ok_or(UserErrors::InternalServerError)?, ), Some(profile_id), ))); } Ok(None) } } } <file_sep path="hyperswitch/crates/router/src/utils/user_role.rs" role="context" start="261" end="297"> pub async fn get_single_profile_id( state: &SessionState, user_role: &UserRole, merchant_id: &id_type::MerchantId, ) -> UserResult<id_type::ProfileId> { let (_, entity_type) = user_role .get_entity_id_and_type() .ok_or(UserErrors::InternalServerError)?; match entity_type { EntityType::Tenant | EntityType::Organization | EntityType::Merchant => { let key_store = state .store .get_merchant_key_store_by_merchant_id( &state.into(), merchant_id, &state.store.get_master_key().to_vec().into(), ) .await .change_context(UserErrors::InternalServerError)?; Ok(state .store .list_profile_by_merchant_id(&state.into(), &key_store, merchant_id) .await .change_context(UserErrors::InternalServerError)? .pop() .ok_or(UserErrors::InternalServerError)? .get_id() .to_owned()) } EntityType::Profile => user_role .profile_id .clone() .ok_or(UserErrors::InternalServerError) .attach_printable("profile_id not found"), } } <file_sep path="hyperswitch/crates/router/src/utils/user_role.rs" role="context" start="206" end="230"> pub async fn get_single_org_id( state: &SessionState, user_role: &UserRole, ) -> UserResult<id_type::OrganizationId> { let (_, entity_type) = user_role .get_entity_id_and_type() .ok_or(UserErrors::InternalServerError)?; match entity_type { EntityType::Tenant => Ok(state .store .list_merchant_and_org_ids(&state.into(), 1, None) .await .change_context(UserErrors::InternalServerError) .attach_printable("Failed to get merchants list for org")? .pop() .ok_or(UserErrors::InternalServerError) .attach_printable("No merchants to get merchant or org id")? .1), EntityType::Organization | EntityType::Merchant | EntityType::Profile => user_role .org_id .clone() .ok_or(UserErrors::InternalServerError) .attach_printable("Org_id not found"), } } <file_sep path="hyperswitch/crates/router/tests/utils.rs" role="context" start="389" end="391"> pub struct MerchantId { merchant_id: common_utils::id_type::MerchantId, } <file_sep path="hyperswitch/migrations/2024-07-19-100016_change_primary_key_for_user_roles/up.sql" role="context" start="1" end="12"> -- Your SQL goes here -- The below query will lock the user_roles table -- Running this query is not necessary on higher environments -- as the application will work fine without these queries being run -- This query should be run after the new version of application is deployed ALTER TABLE user_roles DROP CONSTRAINT user_roles_pkey; -- Use the `user_id, merchant_id` columns as primary key -- These are already unique, not null columns -- So this query should not fail for not null or duplicate value reasons ALTER TABLE user_roles ADD PRIMARY KEY (user_id, merchant_id); <file_sep path="hyperswitch/crates/api_models/src/admin.rs" role="context" start="698" end="700"> pub struct MerchantId { pub merchant_id: id_type::MerchantId, }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/tests/connectors/stax.rs<|crate|> router<|connector|> stax anchor=should_void_authorized_payment kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=1<|meta_end|> <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="183" end="197"> async fn should_void_authorized_payment() { let response = CONNECTOR .authorize_and_void_payment( payment_method_details(), Some(types::PaymentsCancelData { connector_transaction_id: String::from(""), cancellation_reason: Some("requested_by_customer".to_string()), ..Default::default() }), get_default_payment_info(None, create_customer_and_get_token().await), ) .await .expect("Void payment response"); assert_eq!(response.status, enums::AttemptStatus::Voided); } <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="182" end="182"> use router::types::{self, domain, storage::enums, PaymentsResponseData}; <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="237" end="269"> async fn should_partially_refund_manually_captured_payment() { let capture_response = CONNECTOR .authorize_and_capture_payment( payment_method_details(), Some(types::PaymentsCaptureData { ..utils::PaymentCaptureType::default().0 }), get_default_payment_info(None, create_customer_and_get_token().await), ) .await .expect("Capture payment response"); let refund_txn_id = utils::get_connector_transaction_id(capture_response.response.clone()).unwrap(); let refund_connector_meta = utils::get_connector_metadata(capture_response.response); let response = CONNECTOR .refund_payment( refund_txn_id, Some(types::RefundsData { refund_amount: 50, connector_metadata: refund_connector_meta, ..utils::PaymentRefundType::default().0 }), get_default_payment_info(None, None), ) .await .unwrap(); assert_eq!( response.response.unwrap().refund_status, enums::RefundStatus::Success, ); } <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="201" end="233"> async fn should_refund_manually_captured_payment() { let capture_response = CONNECTOR .authorize_and_capture_payment( payment_method_details(), Some(types::PaymentsCaptureData { ..utils::PaymentCaptureType::default().0 }), get_default_payment_info(None, create_customer_and_get_token().await), ) .await .expect("Capture payment response"); let refund_txn_id = utils::get_connector_transaction_id(capture_response.response.clone()).unwrap(); let refund_connector_meta = utils::get_connector_metadata(capture_response.response); let response = CONNECTOR .refund_payment( refund_txn_id, Some(types::RefundsData { connector_metadata: refund_connector_meta, ..utils::PaymentRefundType::default().0 }), get_default_payment_info(None, None), ) .await .unwrap(); assert_eq!( response.response.unwrap().refund_status, enums::RefundStatus::Success, ); } <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="156" end="179"> async fn should_sync_authorized_payment() { let authorize_response = CONNECTOR .authorize_payment( payment_method_details(), get_default_payment_info(None, create_customer_and_get_token().await), ) .await .expect("Authorize payment response"); let txn_id = utils::get_connector_transaction_id(authorize_response.response); let response = CONNECTOR .psync_retry_till_status_matches( enums::AttemptStatus::Authorized, Some(types::PaymentsSyncData { connector_transaction_id: types::ResponseId::ConnectorTransactionId( txn_id.unwrap(), ), ..Default::default() }), get_default_payment_info(None, None), ) .await .expect("PSync response"); assert_eq!(response.status, enums::AttemptStatus::Authorized,); } <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="139" end="152"> async fn should_partially_capture_authorized_payment() { let response = CONNECTOR .authorize_and_capture_payment( payment_method_details(), Some(types::PaymentsCaptureData { amount_to_capture: 50, ..utils::PaymentCaptureType::default().0 }), get_default_payment_info(None, create_customer_and_get_token().await), ) .await .expect("Capture payment response"); assert_eq!(response.status, enums::AttemptStatus::Charged); } <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="78" end="82"> fn payment_method_details() -> Option<types::PaymentsAuthorizeData> { Some(types::PaymentsAuthorizeData { ..utils::PaymentAuthorizeType::default().0 }) } <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="39" end="55"> fn get_default_payment_info( connector_customer: Option<String>, payment_method_token: Option<String>, ) -> Option<utils::PaymentInfo> { Some(utils::PaymentInfo { address: None, auth_type: None, access_token: None, connector_meta_data: None, connector_customer, payment_method_token, #[cfg(feature = "payouts")] payout_method_data: None, #[cfg(feature = "payouts")] currency: None, }) }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/tests/connectors/stax.rs<|crate|> router<|connector|> stax anchor=should_partially_refund_succeeded_payment kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="378" end="394"> async fn should_partially_refund_succeeded_payment() { let refund_response = CONNECTOR .make_payment_and_refund( payment_method_details(), Some(types::RefundsData { refund_amount: 50, ..utils::PaymentRefundType::default().0 }), get_default_payment_info(None, create_customer_and_get_token().await), ) .await .unwrap(); assert_eq!( refund_response.response.unwrap().refund_status, enums::RefundStatus::Success, ); } <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="377" end="377"> use router::types::{self, domain, storage::enums, PaymentsResponseData}; <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="433" end="455"> async fn should_sync_refund() { let refund_response = CONNECTOR .make_payment_and_refund( payment_method_details(), None, get_default_payment_info(None, create_customer_and_get_token().await), ) .await .unwrap(); let response = CONNECTOR .rsync_retry_till_status_matches( enums::RefundStatus::Success, refund_response.response.unwrap().connector_refund_id, None, get_default_payment_info(None, None), ) .await .unwrap(); assert_eq!( response.response.unwrap().refund_status, enums::RefundStatus::Success, ); } <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="398" end="429"> async fn should_refund_succeeded_payment_multiple_times() { let payment_method_token = create_customer_and_get_token().await; let response = CONNECTOR .make_payment( payment_method_details(), get_default_payment_info(None, payment_method_token.clone()), ) .await .unwrap(); //try refund for previous payment let transaction_id = utils::get_connector_transaction_id(response.response).unwrap(); for _x in 0..2 { tokio::time::sleep(Duration::from_secs(60)).await; // to avoid 404 error let refund_response = CONNECTOR .refund_payment( transaction_id.clone(), Some(types::RefundsData { refund_amount: 50, ..utils::PaymentRefundType::default().0 }), get_default_payment_info(None, payment_method_token.clone()), ) .await .unwrap(); assert_eq!( refund_response.response.unwrap().refund_status, enums::RefundStatus::Success, ); } } <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="361" end="374"> async fn should_refund_auto_captured_payment() { let response = CONNECTOR .make_payment_and_refund( payment_method_details(), None, get_default_payment_info(None, create_customer_and_get_token().await), ) .await .unwrap(); assert_eq!( response.response.unwrap().refund_status, enums::RefundStatus::Success, ); } <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="331" end="357"> async fn should_sync_auto_captured_payment() { let authorize_response = CONNECTOR .make_payment( payment_method_details(), get_default_payment_info(None, create_customer_and_get_token().await), ) .await .unwrap(); assert_eq!(authorize_response.status, enums::AttemptStatus::Charged); let txn_id = utils::get_connector_transaction_id(authorize_response.response); assert_ne!(txn_id, None, "Empty connector transaction id"); let response = CONNECTOR .psync_retry_till_status_matches( enums::AttemptStatus::Charged, Some(types::PaymentsSyncData { connector_transaction_id: types::ResponseId::ConnectorTransactionId( txn_id.unwrap(), ), capture_method: Some(enums::CaptureMethod::Automatic), ..Default::default() }), get_default_payment_info(None, None), ) .await .unwrap(); assert_eq!(response.status, enums::AttemptStatus::Charged,); } <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="78" end="82"> fn payment_method_details() -> Option<types::PaymentsAuthorizeData> { Some(types::PaymentsAuthorizeData { ..utils::PaymentAuthorizeType::default().0 }) } <file_sep path="hyperswitch/crates/router/tests/connectors/stax.rs" role="context" start="39" end="55"> fn get_default_payment_info( connector_customer: Option<String>, payment_method_token: Option<String>, ) -> Option<utils::PaymentInfo> { Some(utils::PaymentInfo { address: None, auth_type: None, access_token: None, connector_meta_data: None, connector_customer, payment_method_token, #[cfg(feature = "payouts")] payout_method_data: None, #[cfg(feature = "payouts")] currency: None, }) } <file_sep path="hyperswitch/crates/router/src/connector/dummyconnector/transformers.rs" role="context" start="304" end="309"> pub enum RefundStatus { Succeeded, Failed, #[default] Processing, } <file_sep path="hyperswitch/crates/api_models/src/refunds.rs" role="context" start="378" end="384"> pub enum RefundStatus { Succeeded, Failed, #[default] Pending, Review, }
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/types/api.rs<|crate|> router anchor=foreign_try_from kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/types/api.rs" role="context" start="198" end="209"> fn foreign_try_from(from: ConnectorData) -> Result<Self, Self::Error> { match RoutableConnectors::foreign_try_from(from.connector_name) { Ok(connector) => Ok(Self { choice_kind: api_routing::RoutableChoiceKind::FullStruct, connector, merchant_connector_id: from.merchant_connector_id, }), Err(e) => Err(common_utils::errors::ValidationError::InvalidValue { message: format!("This is not a routable connector: {:?}", e), })?, } } <file_sep path="hyperswitch/crates/router/src/types/api.rs" role="context" start="197" end="197"> use api_models::routing::{self as api_routing, RoutableConnectorChoice}; use common_enums::RoutableConnectors; use crate::{ configs::settings::Connectors, connector, consts, core::{ errors::{self, CustomResult}, payments::types as payments_types, }, services::connector_integration_interface::ConnectorEnum, types::{self, api::enums as api_enums}, }; <file_sep path="hyperswitch/crates/router/src/types/api.rs" role="context" start="247" end="264"> pub fn get_connector_by_name( _connectors: &Connectors, name: &str, connector_type: GetToken, connector_id: Option<common_utils::id_type::MerchantConnectorAccountId>, ) -> CustomResult<Self, errors::ApiErrorResponse> { let connector = Self::convert_connector(name)?; let connector_name = api_enums::Connector::from_str(name) .change_context(errors::ConnectorError::InvalidConnectorName) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable_lazy(|| format!("unable to parse connector name {name}"))?; Ok(Self { connector, connector_name, get_token: connector_type, merchant_connector_id: connector_id, }) } <file_sep path="hyperswitch/crates/router/src/types/api.rs" role="context" start="221" end="237"> pub fn fetch_surcharge_details( &self, payment_method: enums::PaymentMethod, payment_method_type: enums::PaymentMethodType, card_network: Option<&enums::CardNetwork>, ) -> Option<payments_types::SurchargeDetails> { match self { Self::Calculated(surcharge_metadata) => surcharge_metadata .get_surcharge_details(payments_types::SurchargeKey::PaymentMethodData( payment_method, payment_method_type, card_network.cloned(), )) .cloned(), Self::PreDetermined(surcharge_details) => Some(surcharge_details.clone()), } } <file_sep path="hyperswitch/crates/router/src/types/api.rs" role="context" start="187" end="194"> pub fn convert_connector_data_to_routable_connectors( connectors: &[ConnectorData], ) -> CustomResult<Vec<RoutableConnectorChoice>, common_utils::errors::ValidationError> { connectors .iter() .map(|connector_data| RoutableConnectorChoice::foreign_try_from(connector_data.clone())) .collect() } <file_sep path="hyperswitch/crates/router/src/types/api.rs" role="context" start="133" end="145"> pub fn new( payment_method_sub_type: api_enums::PaymentMethodType, connector: ConnectorData, business_sub_label: Option<String>, payment_method_type: api_enums::PaymentMethod, ) -> Self { Self { payment_method_sub_type, connector, business_sub_label, payment_method_type, } } <file_sep path="hyperswitch/crates/router/src/types/api.rs" role="context" start="197" end="197"> type Error = error_stack::Report<common_utils::errors::ValidationError>; <file_sep path="hyperswitch/crates/router/src/types/api.rs" role="context" start="117" end="122"> pub struct ConnectorData { pub connector: ConnectorEnum, pub connector_name: types::Connector, pub get_token: GetToken, pub merchant_connector_id: Option<common_utils::id_type::MerchantConnectorAccountId>, } <file_sep path="hyperswitch/crates/router/src/core/routing.rs" role="context" start="1861" end="1861"> pub struct RoutableConnectors(Vec<routing_types::RoutableConnectorChoice>); <file_sep path="hyperswitch/crates/api_models/src/payment_methods.rs" role="context" start="2478" end="2478"> type Error = error_stack::Report<errors::ValidationError>;
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/connector/stripe.rs<|crate|> router anchor=build_request kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/connector/stripe.rs" role="context" start="1760" end="1773"> fn build_request( &self, req: &types::RetrieveFileRouterData, connectors: &settings::Connectors, ) -> CustomResult<Option<services::Request>, errors::ConnectorError> { Ok(Some( services::RequestBuilder::new() .method(services::Method::Get) .url(&types::RetrieveFileType::get_url(self, req, connectors)?) .attach_default_headers() .headers(types::RetrieveFileType::get_headers(self, req, connectors)?) .build(), )) } <file_sep path="hyperswitch/crates/router/src/connector/stripe.rs" role="context" start="1759" end="1759"> use common_utils::{ request::RequestContent, types::{AmountConvertor, MinorUnit, MinorUnitForConnector}, }; use self::transformers as stripe; use super::utils::{self as connector_utils, PaymentMethodDataType, RefundsRequestData}; use crate::{ configs::settings, consts, core::{ errors::{self, CustomResult}, payments, }, events::connector_api_logs::ConnectorEvent, headers, services::{ self, request::{self, Mask}, ConnectorSpecifications, ConnectorValidation, }, types::{ self, api::{self, ConnectorCommon, ConnectorCommonExt}, domain, }, utils::{crypto, ByteSliceExt, BytesExt, OptionExt}, }; type Verify = dyn services::ConnectorIntegration< api::SetupMandate, types::SetupMandateRequestData, types::PaymentsResponseData, >; <file_sep path="hyperswitch/crates/router/src/connector/stripe.rs" role="context" start="1802" end="1841"> fn get_error_response( &self, res: types::Response, event_builder: Option<&mut ConnectorEvent>, ) -> CustomResult<types::ErrorResponse, errors::ConnectorError> { let response: stripe::ErrorResponse = res .response .parse_struct("ErrorResponse") .change_context(errors::ConnectorError::ResponseDeserializationFailed)?; event_builder.map(|i| i.set_error_response_body(&response)); router_env::logger::info!(connector_response=?response); Ok(types::ErrorResponse { status_code: res.status_code, code: response .error .code .clone() .unwrap_or_else(|| consts::NO_ERROR_CODE.to_string()), message: response .error .code .unwrap_or_else(|| consts::NO_ERROR_MESSAGE.to_string()), reason: response.error.message.map(|message| { response .error .decline_code .map(|decline_code| { format!("message - {}, decline_code - {}", message, decline_code) }) .unwrap_or(message) }), attempt_status: None, connector_transaction_id: response.error.payment_intent.map(|pi| pi.id), network_advice_code: None, network_decline_code: None, network_error_message: None, }) } <file_sep path="hyperswitch/crates/router/src/connector/stripe.rs" role="context" start="1776" end="1800"> fn handle_response( &self, data: &types::RetrieveFileRouterData, event_builder: Option<&mut ConnectorEvent>, res: types::Response, ) -> CustomResult< types::RouterData< api::Retrieve, types::RetrieveFileRequestData, types::RetrieveFileResponse, >, errors::ConnectorError, > { let response = res.response; event_builder.map(|event| event.set_response_body(&serde_json::json!({"connector_response_type": "file", "status_code": res.status_code}))); router_env::logger::info!(connector_response_type=?"file"); Ok(types::RetrieveFileRouterData { response: Ok(types::RetrieveFileResponse { file_data: response.to_vec(), }), ..data.clone() }) } <file_sep path="hyperswitch/crates/router/src/connector/stripe.rs" role="context" start="1749" end="1758"> fn get_url( &self, req: &types::RetrieveFileRouterData, connectors: &settings::Connectors, ) -> CustomResult<String, errors::ConnectorError> { Ok(format!( "{}v1/files/{}/contents", connectors.stripe.base_url_file_upload, req.request.provider_file_id )) } <file_sep path="hyperswitch/crates/router/src/connector/stripe.rs" role="context" start="1737" end="1747"> fn get_headers( &self, req: &types::RouterData< api::Retrieve, types::RetrieveFileRequestData, types::RetrieveFileResponse, >, _connectors: &settings::Connectors, ) -> CustomResult<Vec<(String, request::Maskable<String>)>, errors::ConnectorError> { self.get_auth_header(&req.connector_auth_type) } <file_sep path="hyperswitch/crates/router/src/connector/stripe.rs" role="context" start="48" end="52"> pub const fn new() -> &'static Self { &Self { amount_converter: &MinorUnitForConnector, } } <file_sep path="hyperswitch/crates/router/src/connector/stripe.rs" role="context" start="2675" end="2681"> fn get_headers( &self, req: &types::PayoutsRouterData<api::PoRecipientAccount>, connectors: &settings::Connectors, ) -> CustomResult<Vec<(String, request::Maskable<String>)>, errors::ConnectorError> { self.build_headers(req, connectors) } <file_sep path="hyperswitch/crates/router/src/core/relay.rs" role="context" start="97" end="97"> type Request = relay_api_models::RelayRefundRequestData;
symbol_neighborhood
<|meta_start|><|file|> hyperswitch/crates/router/src/services/authorization.rs<|crate|> router anchor=set_role_info_in_cache kind=fn pack=symbol_neighborhood lang=rust role_window=k3 hops=2<|meta_end|> <file_sep path="hyperswitch/crates/router/src/services/authorization.rs" role="context" start="94" end="113"> pub async fn set_role_info_in_cache<A>( state: &A, role_id: &str, role_info: &roles::RoleInfo, expiry: i64, ) -> RouterResult<()> where A: SessionStateInfo + Sync, { let redis_conn = get_redis_connection(state)?; redis_conn .serialize_and_set_key_with_expiry( &get_cache_key_from_role_id(role_id).into(), role_info, expiry, ) .await .change_context(ApiErrorResponse::InternalServerError) } <file_sep path="hyperswitch/crates/router/src/services/authorization.rs" role="context" start="93" end="93"> use crate::{ consts, core::errors::{ApiErrorResponse, RouterResult, StorageErrorExt}, routes::app::SessionStateInfo, }; <file_sep path="hyperswitch/crates/router/src/services/authorization.rs" role="context" start="130" end="144"> pub fn check_tenant( token_tenant_id: Option<id_type::TenantId>, header_tenant_id: &id_type::TenantId, ) -> RouterResult<()> { if let Some(tenant_id) = token_tenant_id { if tenant_id != *header_tenant_id { return Err(ApiErrorResponse::InvalidJwtToken).attach_printable(format!( "Token tenant ID: '{}' does not match Header tenant ID: '{}'", tenant_id.get_string_repr().to_owned(), header_tenant_id.get_string_repr().to_owned() )); } } Ok(()) } <file_sep path="hyperswitch/crates/router/src/services/authorization.rs" role="context" start="115" end="128"> pub fn check_permission( required_permission: permissions::Permission, role_info: &roles::RoleInfo, ) -> RouterResult<()> { role_info .check_permission_exists(required_permission) .then_some(()) .ok_or( ApiErrorResponse::AccessForbidden { resource: required_permission.to_string(), } .into(), ) } <file_sep path="hyperswitch/crates/router/src/services/authorization.rs" role="context" start="76" end="92"> async fn get_role_info_from_db<A>( state: &A, role_id: &str, org_id: &id_type::OrganizationId, tenant_id: &id_type::TenantId, ) -> RouterResult<roles::RoleInfo> where A: SessionStateInfo + Sync, { state .session_state() .global_store .find_by_role_id_org_id_tenant_id(role_id, org_id, tenant_id) .await .map(roles::RoleInfo::from) .to_not_found_response(ApiErrorResponse::InvalidJwtToken) } <file_sep path="hyperswitch/crates/router/src/services/authorization.rs" role="context" start="72" end="74"> pub fn get_cache_key_from_role_id(role_id: &str) -> String { format!("{}{}", consts::ROLE_INFO_CACHE_PREFIX, role_id) } <file_sep path="hyperswitch/crates/router/src/services/authorization.rs" role="context" start="21" end="58"> pub async fn get_role_info<A>(state: &A, token: &AuthToken) -> RouterResult<roles::RoleInfo> where A: SessionStateInfo + Sync, { if let Some(role_info) = roles::predefined_roles::PREDEFINED_ROLES.get(token.role_id.as_str()) { return Ok(role_info.clone()); } if let Ok(role_info) = get_role_info_from_cache(state, &token.role_id) .await .map_err(|e| logger::error!("Failed to get permissions from cache {e:?}")) { return Ok(role_info.clone()); } let role_info = get_role_info_from_db( state, &token.role_id, &token.org_id, token .tenant_id .as_ref() .unwrap_or(&state.session_state().tenant.tenant_id), ) .await?; let token_expiry = i64::try_from(token.exp).change_context(ApiErrorResponse::InternalServerError)?; let cache_ttl = token_expiry - common_utils::date_time::now_unix_timestamp(); if cache_ttl > 0 { set_role_info_in_cache(state, &token.role_id, &role_info, cache_ttl) .await .map_err(|e| logger::error!("Failed to set role info in cache {e:?}")) .ok(); } Ok(role_info) } <file_sep path="hyperswitch/crates/router/src/services/authorization.rs" role="context" start="146" end="152"> fn get_redis_connection<A: SessionStateInfo>(state: &A) -> RouterResult<Arc<RedisConnectionPool>> { state .store() .get_redis_conn() .change_context(ApiErrorResponse::InternalServerError) .attach_printable("Failed to get redis connection") } <file_sep path="hyperswitch/crates/router/src/services/authorization/roles.rs" role="context" start="18" end="28"> pub struct RoleInfo { role_id: String, role_name: String, groups: Vec<PermissionGroup>, scope: RoleScope, entity_type: EntityType, is_invitable: bool, is_deletable: bool, is_updatable: bool, is_internal: bool, } <file_sep path="hyperswitch/crates/api_models/src/errors/types.rs" role="context" start="86" end="100"> pub enum ApiErrorResponse { Unauthorized(ApiError), ForbiddenCommonResource(ApiError), ForbiddenPrivateResource(ApiError), Conflict(ApiError), Gone(ApiError), Unprocessable(ApiError), InternalServerError(ApiError), NotImplemented(ApiError), ConnectorError(ApiError, #[serde(skip_serializing)] StatusCode), NotFound(ApiError), MethodNotAllowed(ApiError), BadRequest(ApiError), DomainError(ApiError), }
symbol_neighborhood