text
stringlengths
70
351k
source
stringclasses
4 values
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/payments.rs | crate: router use actix_web::{web, Responder}; use error_stack::report; use hyperswitch_domain_models::payments::HeaderPayload; use router_env::{env, instrument, logger, tracing, types, Flow}; use super::app::ReqState; use crate::{ self as app, core::{ errors::{self, http_not_implemented}, payments::{self, PaymentRedirectFlow}, }, routes::lock_utils, services::{api, authentication as auth}, types::{ api::{ self as api_types, enums as api_enums, payments::{self as payment_types, PaymentIdTypeExt}, }, domain, transformers::ForeignTryFrom, }, }; pub async fn payments_retrieve_with_gateway_creds( state: web::Data<app::AppState>, req: actix_web::HttpRequest, json_payload: web::Json<payment_types::PaymentRetrieveBodyWithCredentials>, ) -> impl Responder { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/payments.rs | crate: router use crate::{ core::api_locking::{self, GetLockingInput}, services::authorization::permissions::Permission, }; use actix_web::{web, Responder}; use error_stack::report; use hyperswitch_domain_models::payments::HeaderPayload; use router_env::{env, instrument, logger, tracing, types, Flow}; use super::app::ReqState; use crate::{ self as app, core::{ errors::{self, http_not_implemented}, payments::{self, PaymentRedirectFlow}, }, routes::lock_utils, services::{api, authentication as auth}, types::{ api::{ self as api_types, enums as api_enums, payments::{self as payment_types, PaymentIdTypeExt}, }, domain, transformers::ForeignTryFrom, }, }; pub async fn payments_retrieve( state: web::Data<app::AppState>, req: actix_web::HttpRequest, path: web::Path<common_utils::id_type::PaymentId>, json_payload: web::Query<payment_types::PaymentRetrieveBody>, ) -> impl Responder { <|fim_suffix|> <|fim_middle|> }
ast_fragments
// file: hyperswitch/crates/router/src/routes/payments.rs | crate: router use actix_web::{web, Responder}; use hyperswitch_domain_models::payments::HeaderPayload; use router_env::{env, instrument, logger, tracing, types, Flow}; use super::app::ReqState; use crate::{ self as app, core::{ errors::{self, http_not_implemented}, payments::{self, PaymentRedirectFlow}, }, routes::lock_utils, services::{api, authentication as auth}, types::{ api::{ self as api_types, enums as api_enums, payments::{self as payment_types, PaymentIdTypeExt}, }, domain, transformers::ForeignTryFrom, }, }; pub async fn payments_start( state: web::Data<app::AppState>, req: actix_web::HttpRequest, path: web::Path<( common_utils::id_type::PaymentId, common_utils::id_type::MerchantId, String, )>, ) -> impl Responder { let flow = Flow::PaymentsStart; let (payment_id, merchant_id, attempt_id) = path.into_inner(); let payload = payment_types::PaymentsStartRequest { payment_id: payment_id.clone(), merchant_id: merchant_id.clone(), attempt_id: attempt_id.clone(), }; let locking_action = payload.get_locking_input(flow.clone()); tracing::Span::current().record("payment_id", payment_id.get_string_repr()); Box::pin(api::server_wrap( flow, state, &req, payload, |state, auth: auth::AuthenticationData, req, req_state| { payments::payments_core::< api_types::Authorize, payment_types::PaymentsResponse, _, _, _, payments::PaymentData<api_types::Authorize>, >( state, req_state, auth.merchant_account, auth.profile_id, auth.key_store, payments::operations::PaymentStart, req, api::AuthFlow::Client, payments::CallConnectorAction::Trigger, None, HeaderPayload::default(), None, ) }, &auth::MerchantIdAuth(merchant_id), locking_action, )) .await }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/payments.rs | crate: router use crate::{ core::api_locking::{self, GetLockingInput}, services::authorization::permissions::Permission, }; use actix_web::{web, Responder}; use error_stack::report; use hyperswitch_domain_models::payments::HeaderPayload; use masking::PeekInterface; use router_env::{env, instrument, logger, tracing, types, Flow}; use super::app::ReqState; use crate::{ self as app, core::{ errors::{self, http_not_implemented}, payments::{self, PaymentRedirectFlow}, }, routes::lock_utils, services::{api, authentication as auth}, types::{ api::{ self as api_types, enums as api_enums, payments::{self as payment_types, PaymentIdTypeExt}, }, domain, transformers::ForeignTryFrom, }, }; pub async fn payments_update_intent( state: web::Data<app::AppState>, req: actix_web::HttpRequest, json_payload: web::Json<payment_types::PaymentsUpdateIntentRequest>, path: web::Path<common_utils::id_type::GlobalPaymentId>, ) -> impl Responder { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/payments.rs | crate: router use crate::{ core::api_locking::{self, GetLockingInput}, services::authorization::permissions::Permission, }; use actix_web::{web, Responder}; use hyperswitch_domain_models::payments::HeaderPayload; use router_env::{env, instrument, logger, tracing, types, Flow}; use super::app::ReqState; use crate::{ self as app, core::{ errors::{self, http_not_implemented}, payments::{self, PaymentRedirectFlow}, }, routes::lock_utils, services::{api, authentication as auth}, types::{ api::{ self as api_types, enums as api_enums, payments::{self as payment_types, PaymentIdTypeExt}, }, domain, transformers::ForeignTryFrom, }, }; pub async fn payments_create_and_confirm_intent( state: web::Data<app::AppState>, req: actix_web::HttpRequest, json_payload: web::Json<payment_types::PaymentsRequest>, ) -> impl Responder { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/payments.rs | crate: router use crate::{ core::api_locking::{self, GetLockingInput}, services::authorization::permissions::Permission, }; use actix_web::{web, Responder}; use error_stack::report; use hyperswitch_domain_models::payments::HeaderPayload; use masking::PeekInterface; use router_env::{env, instrument, logger, tracing, types, Flow}; use super::app::ReqState; use crate::{ self as app, core::{ errors::{self, http_not_implemented}, payments::{self, PaymentRedirectFlow}, }, routes::lock_utils, services::{api, authentication as auth}, types::{ api::{ self as api_types, enums as api_enums, payments::{self as payment_types, PaymentIdTypeExt}, }, domain, transformers::ForeignTryFrom, }, }; pub async fn payments_get_intent( state: web::Data<app::AppState>, req: actix_web::HttpRequest, path: web::Path<common_utils::id_type::GlobalPaymentId>, ) -> impl Responder { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/payments.rs | crate: router use crate::{ core::api_locking::{self, GetLockingInput}, services::authorization::permissions::Permission, }; use actix_web::{web, Responder}; use error_stack::report; use hyperswitch_domain_models::payments::HeaderPayload; use masking::PeekInterface; use router_env::{env, instrument, logger, tracing, types, Flow}; use super::app::ReqState; use crate::{ self as app, core::{ errors::{self, http_not_implemented}, payments::{self, PaymentRedirectFlow}, }, routes::lock_utils, services::{api, authentication as auth}, types::{ api::{ self as api_types, enums as api_enums, payments::{self as payment_types, PaymentIdTypeExt}, }, domain, transformers::ForeignTryFrom, }, }; pub async fn payments_create_intent( state: web::Data<app::AppState>, req: actix_web::HttpRequest, json_payload: web::Json<payment_types::PaymentsCreateIntentRequest>, ) -> impl Responder { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/payments.rs | crate: router use crate::{ core::api_locking::{self, GetLockingInput}, services::authorization::permissions::Permission, }; use actix_web::{web, Responder}; use hyperswitch_domain_models::payments::HeaderPayload; use router_env::{env, instrument, logger, tracing, types, Flow}; use super::app::ReqState; use crate::{ self as app, core::{ errors::{self, http_not_implemented}, payments::{self, PaymentRedirectFlow}, }, routes::lock_utils, services::{api, authentication as auth}, types::{ api::{ self as api_types, enums as api_enums, payments::{self as payment_types, PaymentIdTypeExt}, }, domain, transformers::ForeignTryFrom, }, }; pub async fn payments_create( state: web::Data<app::AppState>, req: actix_web::HttpRequest, json_payload: web::Json<payment_types::PaymentsRequest>, ) -> impl Responder { { env::Env::Production => &auth::HeaderAuth(auth::ApiKeyAuth),<|fim_suffix|> <|fim_middle|> _ => auth::auth_type( &auth::HeaderAuth(auth::ApiKeyAuth), &auth::JWTAuth { permission: Permission::ProfilePaymentWrite, }, req.headers(), ), } }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/payments.rs | crate: router &auth::JWTAuth { permission: Permission::ProfileAccountWrite, }, req.headers(), ), locking_action, )) .await } #[cfg(all(feature = "v2", feature = "payment_methods_v2"))] #[instrument(skip_all, fields(flow = ?Flow::PaymentMethodsList))] pub async fn list_payment_methods( state: web::Data<app::AppState>, req: actix_web::HttpRequest, path: web::Path<common_utils::id_type::GlobalPaymentId>, query_payload: web::Query<api_models::payments::PaymentMethodsListRequest>, ) -> impl Responder { let flow = Flow::PaymentMethodsList; let payload = query_payload.into_inner(); let global_payment_id = path.into_inner(); tracing::Span::current().record("payment_id", global_payment_id.get_string_repr()); let internal_payload = internal_payload_types::PaymentsGenericRequestWithResourceId { pub async fn list_payment_methods( state: web::Data<app::AppState>, req: actix_web::HttpRequest, path: web::Path<common_utils::id_type::GlobalPaymentId>, query_payload: web::Query<api_models::payments::PaymentMethodsListRequest>, ) -> impl Responder { { Ok(headers) => headers,<|fim_suffix|> <|fim_middle|> Err(err) => { return api::log_and_return_error_response(err); } } }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/payments.rs | crate: router &auth::JWTAuth { permission: Permission::ProfilePaymentRead, }, req.headers(), ), locking_action, )) .await } #[cfg(feature = "v2")] #[instrument(skip(state, req), fields(flow, payment_id))] pub async fn payment_get_intent_using_merchant_reference_id( state: web::Data<app::AppState>, req: actix_web::HttpRequest, path: web::Path<common_utils::id_type::PaymentReferenceId>, ) -> impl Responder { let flow = Flow::PaymentsRetrieveUsingMerchantReferenceId; let header_payload = match HeaderPayload::foreign_try_from(req.headers()) { Ok(headers) => headers, Err(err) => { return api::log_and_return_error_response(err); } }; pub async fn payment_get_intent_using_merchant_reference_id( state: web::Data<app::AppState>, req: actix_web::HttpRequest, path: web::Path<common_utils::id_type::PaymentReferenceId>, ) -> impl Responder { { Ok(headers) => headers,<|fim_suffix|> <|fim_middle|> Err(err) => { return api::log_and_return_error_response(err); } } }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/payments.rs | crate: router use crate::{ core::api_locking::{self, GetLockingInput}, services::authorization::permissions::Permission, }; use router_env::{env, instrument, logger, tracing, types, Flow}; use crate::{ self as app, core::{ errors::{self, http_not_implemented}, payments::{self, PaymentRedirectFlow}, }, routes::lock_utils, services::{api, authentication as auth}, types::{ api::{ self as api_types, enums as api_enums, payments::{self as payment_types, PaymentIdTypeExt}, }, domain, transformers::ForeignTryFrom, }, }; fn get_locking_input<F>(&self, flow: F) -> api_locking::LockAction where F: types::FlowMetric, lock_utils::ApiIdentifier: From<F>, { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/payments.rs | crate: router use crate::{ core::api_locking::{self, GetLockingInput}, services::authorization::permissions::Permission, }; use router_env::{env, instrument, logger, tracing, types, Flow}; use crate::{ self as app, core::{ errors::{self, http_not_implemented}, payments::{self, PaymentRedirectFlow}, }, routes::lock_utils, services::{api, authentication as auth}, types::{ api::{ self as api_types, enums as api_enums, payments::{self as payment_types, PaymentIdTypeExt}, }, domain, transformers::ForeignTryFrom, }, }; fn get_locking_input<F>(&self, flow: F) -> api_locking::LockAction where F: types::FlowMetric, { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
// file: hyperswitch/crates/router/src/routes/payments.rs | crate: router use crate::{ core::api_locking::{self, GetLockingInput}, services::authorization::permissions::Permission, }; use router_env::{env, instrument, logger, tracing, types, Flow}; use crate::{ self as app, core::{ errors::{self, http_not_implemented}, payments::{self, PaymentRedirectFlow}, }, routes::lock_utils, services::{api, authentication as auth}, types::{ api::{ self as api_types, enums as api_enums, payments::{self as payment_types, PaymentIdTypeExt}, }, domain, transformers::ForeignTryFrom, }, }; fn get_locking_input<F>(&self, flow: F) -> api_locking::LockAction where F: types::FlowMetric, lock_utils::ApiIdentifier: From<F>, { match self.resource_id { payment_types::PaymentIdType::PaymentIntentId(ref id) if self.force_sync => { api_locking::LockAction::Hold { input: api_locking::LockingInput { unique_locking_key: id.get_string_repr().to_owned(), api_identifier: lock_utils::ApiIdentifier::from(flow), override_lock_retries: None, }, } } _ => api_locking::LockAction::NotApplicable, } }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/payments.rs | crate: router use hyperswitch_domain_models::payments::HeaderPayload; use crate::{ self as app, core::{ errors::{self, http_not_implemented}, payments::{self, PaymentRedirectFlow}, }, routes::lock_utils, services::{api, authentication as auth}, types::{ api::{ self as api_types, enums as api_enums, payments::{self as payment_types, PaymentIdTypeExt}, }, domain, transformers::ForeignTryFrom, }, }; pub fn get_or_generate_payment_id( payload: &mut payment_types::PaymentsRequest, ) -> errors::RouterResult<()> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/payments.rs | crate: router use crate::{ core::api_locking::{self, GetLockingInput}, services::authorization::permissions::Permission, }; use actix_web::{web, Responder}; use hyperswitch_domain_models::payments::HeaderPayload; use router_env::{env, instrument, logger, tracing, types, Flow}; use super::app::ReqState; use crate::{ self as app, core::{ errors::{self, http_not_implemented}, payments::{self, PaymentRedirectFlow}, }, routes::lock_utils, services::{api, authentication as auth}, types::{ api::{ self as api_types, enums as api_enums, payments::{self as payment_types, PaymentIdTypeExt}, }, domain, transformers::ForeignTryFrom, }, }; pub async fn retrieve_extended_card_info( state: web::Data<app::AppState>, req: actix_web::HttpRequest, path: web::Path<common_utils::id_type::PaymentId>, ) -> impl Responder { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/payments.rs | crate: router use crate::{ core::api_locking::{self, GetLockingInput}, services::authorization::permissions::Permission, }; use actix_web::{web, Responder}; use hyperswitch_domain_models::payments::HeaderPayload; use router_env::{env, instrument, logger, tracing, types, Flow}; use super::app::ReqState; use crate::{ self as app, core::{ errors::{self, http_not_implemented}, payments::{self, PaymentRedirectFlow}, }, routes::lock_utils, services::{api, authentication as auth}, types::{ api::{ self as api_types, enums as api_enums, payments::{self as payment_types, PaymentIdTypeExt}, }, domain, transformers::ForeignTryFrom, }, }; pub async fn get_payments_aggregates( state: web::Data<app::AppState>, req: actix_web::HttpRequest, payload: web::Query<common_utils::types::TimeRange>, ) -> impl Responder { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/payments.rs | crate: router use crate::{ core::api_locking::{self, GetLockingInput}, services::authorization::permissions::Permission, }; use actix_web::{web, Responder}; use hyperswitch_domain_models::payments::HeaderPayload; use router_env::{env, instrument, logger, tracing, types, Flow}; use super::app::ReqState; use crate::{ self as app, core::{ errors::{self, http_not_implemented}, payments::{self, PaymentRedirectFlow}, }, routes::lock_utils, services::{api, authentication as auth}, types::{ api::{ self as api_types, enums as api_enums, payments::{self as payment_types, PaymentIdTypeExt}, }, domain, transformers::ForeignTryFrom, }, }; pub async fn get_payment_filters_profile( state: web::Data<app::AppState>, req: actix_web::HttpRequest, ) -> impl Responder { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/payments.rs | crate: router use crate::{ core::api_locking::{self, GetLockingInput}, services::authorization::permissions::Permission, }; use actix_web::{web, Responder}; use hyperswitch_domain_models::payments::HeaderPayload; use router_env::{env, instrument, logger, tracing, types, Flow}; use super::app::ReqState; use crate::{ self as app, core::{ errors::{self, http_not_implemented}, payments::{self, PaymentRedirectFlow}, }, routes::lock_utils, services::{api, authentication as auth}, types::{ api::{ self as api_types, enums as api_enums, payments::{self as payment_types, PaymentIdTypeExt}, }, domain, transformers::ForeignTryFrom, }, }; pub async fn get_payment_filters( state: web::Data<app::AppState>, req: actix_web::HttpRequest, ) -> impl Responder { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/payments.rs | crate: router use crate::{ core::api_locking::{self, GetLockingInput}, services::authorization::permissions::Permission, }; use actix_web::{web, Responder}; use hyperswitch_domain_models::payments::HeaderPayload; use router_env::{env, instrument, logger, tracing, types, Flow}; use super::app::ReqState; use crate::{ self as app, core::{ errors::{self, http_not_implemented}, payments::{self, PaymentRedirectFlow}, }, routes::lock_utils, services::{api, authentication as auth}, types::{ api::{ self as api_types, enums as api_enums, payments::{self as payment_types, PaymentIdTypeExt}, }, domain, transformers::ForeignTryFrom, }, }; pub async fn get_filters_for_payments( state: web::Data<app::AppState>, req: actix_web::HttpRequest, payload: web::Json<common_utils::types::TimeRange>, ) -> impl Responder { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/payments.rs | crate: router use hyperswitch_domain_models::payments::HeaderPayload; use router_env::{env, instrument, logger, tracing, types, Flow}; use super::app::ReqState; use crate::{ self as app, core::{ errors::{self, http_not_implemented}, payments::{self, PaymentRedirectFlow}, }, routes::lock_utils, services::{api, authentication as auth}, types::{ api::{ self as api_types, enums as api_enums, payments::{self as payment_types, PaymentIdTypeExt}, }, domain, transformers::ForeignTryFrom, }, }; async fn authorize_verify_select<Op>( operation: Op, state: app::SessionState, req_state: ReqState, merchant_account: domain::MerchantAccount, profile_id: Option<common_utils::id_type::ProfileId>, key_store: domain::MerchantKeyStore, header_payload: HeaderPayload, req: api_models::payments::PaymentsRequest, auth_flow: api::AuthFlow, platform_merchant_account: Option<domain::MerchantAccount>, ) -> errors::RouterResponse<api_models::payments::PaymentsResponse> where Op: Sync + Clone + std::fmt::Debug + payments::operations::Operation< api_types::Authorize, api_models::payments::PaymentsRequest, Data = payments::PaymentData<api_types::Authorize>, > + payments::operations::Operation< api_types::SetupMandate, api_models::payments::PaymentsRequest, Data = payments::PaymentData<api_types::SetupMandate>, >, { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/blocklist.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::blocklist as api_blocklist; use router_env::Flow; use crate::{ core::{api_locking, blocklist}, routes::AppState, services::{api, authentication as auth, authorization::permissions::Permission}, }; pub async fn list_blocked_payment_methods( state: web::Data<AppState>, req: HttpRequest, query_payload: web::Query<api_blocklist::ListBlocklistQuery>, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/blocklist.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::blocklist as api_blocklist; use router_env::Flow; use crate::{ core::{api_locking, blocklist}, routes::AppState, services::{api, authentication as auth, authorization::permissions::Permission}, }; pub async fn toggle_blocklist_guard( state: web::Data<AppState>, req: HttpRequest, query_payload: web::Query<api_blocklist::ToggleBlocklistQuery>, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
// file: hyperswitch/crates/router/src/routes/blocklist.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::blocklist as api_blocklist; use router_env::Flow; use crate::{ core::{api_locking, blocklist}, routes::AppState, services::{api, authentication as auth, authorization::permissions::Permission}, }; pub async fn list_blocked_payment_methods( state: web::Data<AppState>, req: HttpRequest, query_payload: web::Query<api_blocklist::ListBlocklistQuery>, ) -> HttpResponse { let flow = Flow::ListBlocklist; Box::pin(api::server_wrap( flow, state, &req, query_payload.into_inner(), |state, auth: auth::AuthenticationData, query, _| { blocklist::list_blocklist_entries(state, auth.merchant_account, query) }, auth::auth_type( &auth::HeaderAuth(auth::ApiKeyAuth), &auth::JWTAuth { permission: Permission::MerchantAccountRead, }, req.headers(), ), api_locking::LockAction::NotApplicable, )) .await }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/blocklist.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::blocklist as api_blocklist; use router_env::Flow; use crate::{ core::{api_locking, blocklist}, routes::AppState, services::{api, authentication as auth, authorization::permissions::Permission}, }; pub async fn remove_entry_from_blocklist( state: web::Data<AppState>, req: HttpRequest, json_payload: web::Json<api_blocklist::DeleteFromBlocklistRequest>, ) -> HttpResponse { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/blocklist.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::blocklist as api_blocklist; use router_env::Flow; use crate::{ core::{api_locking, blocklist}, routes::AppState, services::{api, authentication as auth, authorization::permissions::Permission}, }; pub async fn add_entry_to_blocklist( state: web::Data<AppState>, req: HttpRequest, json_payload: web::Json<api_blocklist::AddToBlocklistRequest>, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
// file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn verify_email_request( state: web::Data<AppState>, http_req: HttpRequest, json_payload: web::Json<user_api::SendVerifyEmailRequest>, query: web::Query<user_api::AuthIdAndThemeIdQueryParam>, ) -> HttpResponse { let flow = Flow::VerifyEmailRequest; let query_params = query.into_inner(); Box::pin(api::server_wrap( flow, state.clone(), &http_req, json_payload.into_inner(), |state, _: (), req_body, _| { user_core::send_verification_mail( state, req_body, query_params.auth_id.clone(), query_params.theme_id.clone(), ) }, &auth::NoAuth, api_locking::LockAction::NotApplicable, )) .await }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn forgot_password( state: web::Data<AppState>, req: HttpRequest, payload: web::Json<user_api::ForgotPasswordRequest>, query: web::Query<user_api::AuthIdAndThemeIdQueryParam>, ) -> HttpResponse { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use common_utils::errors::ReportSwitchExt; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn set_dashboard_metadata( state: web::Data<AppState>, req: HttpRequest, json_payload: web::Json<user_api::dashboard_metadata::SetMetaDataRequest>, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn user_connect_account( state: web::Data<AppState>, http_req: HttpRequest, json_payload: web::Json<user_api::ConnectAccountRequest>, query: web::Query<user_api::AuthIdAndThemeIdQueryParam>, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn user_signup_with_merchant_id( state: web::Data<AppState>, http_req: HttpRequest, json_payload: web::Json<user_api::SignUpWithMerchantIdRequest>, query: web::Query<user_api::AuthIdAndThemeIdQueryParam>, ) -> HttpResponse { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn get_sso_auth_url( state: web::Data<AppState>, req: HttpRequest, query: web::Query<user_api::GetSsoAuthUrlRequest>, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn verify_email_request( state: web::Data<AppState>, http_req: HttpRequest, json_payload: web::Json<user_api::SendVerifyEmailRequest>, query: web::Query<user_api::AuthIdAndThemeIdQueryParam>, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user::sample_data::SampleDataRequest; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn switch_profile_for_user_in_org_and_merchant( state: web::Data<AppState>, http_req: HttpRequest, json_payload: web::Json<user_api::SwitchProfileRequest>, ) -> HttpResponse { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user::sample_data::SampleDataRequest; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn switch_merchant_for_user_in_org( state: web::Data<AppState>, http_req: HttpRequest, json_payload: web::Json<user_api::SwitchMerchantRequest>, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user::sample_data::SampleDataRequest; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn switch_org_for_user( state: web::Data<AppState>, http_req: HttpRequest, json_payload: web::Json<user_api::SwitchOrganizationRequest>, ) -> HttpResponse { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn list_profiles_for_user_in_org_and_merchant( state: web::Data<AppState>, req: HttpRequest, ) -> HttpResponse { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn list_merchants_for_user_in_org( state: web::Data<AppState>, req: HttpRequest, ) -> HttpResponse { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn list_orgs_for_user(state: web::Data<AppState>, req: HttpRequest) -> HttpResponse { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn transfer_user_key( state: web::Data<AppState>, req: HttpRequest, payload: web::Json<user_api::UserKeyTransferRequest>, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user::sample_data::SampleDataRequest; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use common_enums::TokenPurpose; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn terminate_auth_select( state: web::Data<AppState>, req: HttpRequest, json_payload: web::Json<user_api::AuthSelectRequest>, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn list_user_authentication_methods( state: web::Data<AppState>, req: HttpRequest, query: web::Query<user_api::GetUserAuthenticationMethodsRequest>, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn update_user_authentication_method( state: web::Data<AppState>, req: HttpRequest, json_payload: web::Json<user_api::UpdateUserAuthenticationMethodRequest>, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn create_user_authentication_method( state: web::Data<AppState>, req: HttpRequest, json_payload: web::Json<user_api::CreateUserAuthenticationMethodRequest>, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user::sample_data::SampleDataRequest; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use common_enums::TokenPurpose; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn sso_sign( state: web::Data<AppState>, req: HttpRequest, json_payload: web::Json<user_api::SsoSignInRequest>, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
// file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn get_sso_auth_url( state: web::Data<AppState>, req: HttpRequest, query: web::Query<user_api::GetSsoAuthUrlRequest>, ) -> HttpResponse { let flow = Flow::GetSsoAuthUrl; let payload = query.into_inner(); Box::pin(api::server_wrap( flow, state.clone(), &req, payload, |state, _: (), req, _| user_core::get_sso_auth_url(state, req), &auth::NoAuth, api_locking::LockAction::NotApplicable, )) .await }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user::sample_data::SampleDataRequest; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use common_enums::TokenPurpose; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn check_two_factor_auth_status_with_attempts( state: web::Data<AppState>, req: HttpRequest, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user::sample_data::SampleDataRequest; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn check_two_factor_auth_status( state: web::Data<AppState>, req: HttpRequest, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user::sample_data::SampleDataRequest; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use common_enums::TokenPurpose; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn terminate_two_factor_auth( state: web::Data<AppState>, req: HttpRequest, query: web::Query<user_api::SkipTwoFactorAuthQueryParam>, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user::sample_data::SampleDataRequest; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use common_enums::TokenPurpose; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn generate_recovery_codes(state: web::Data<AppState>, req: HttpRequest) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user::sample_data::SampleDataRequest; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use common_enums::TokenPurpose; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn totp_update( state: web::Data<AppState>, req: HttpRequest, json_payload: web::Json<user_api::VerifyTotpRequest>, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user::sample_data::SampleDataRequest; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use common_enums::TokenPurpose; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn verify_recovery_code( state: web::Data<AppState>, req: HttpRequest, json_payload: web::Json<user_api::VerifyRecoveryCodeRequest>, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user::sample_data::SampleDataRequest; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use common_enums::TokenPurpose; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn totp_verify( state: web::Data<AppState>, req: HttpRequest, json_payload: web::Json<user_api::VerifyTotpRequest>, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user::sample_data::SampleDataRequest; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn totp_reset(state: web::Data<AppState>, req: HttpRequest) -> HttpResponse { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user::sample_data::SampleDataRequest; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use common_enums::TokenPurpose; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn totp_begin(state: web::Data<AppState>, req: HttpRequest) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn user_from_email( state: web::Data<AppState>, req: HttpRequest, json_payload: web::Json<user_api::UserFromEmailRequest>, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn update_user_account_details( state: web::Data<AppState>, req: HttpRequest, json_payload: web::Json<user_api::UpdateUserAccountDetailsRequest>, ) -> HttpResponse { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user::sample_data::SampleDataRequest; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use common_enums::TokenPurpose; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn verify_email( state: web::Data<AppState>, http_req: HttpRequest, json_payload: web::Json<user_api::VerifyEmailRequest>, ) -> HttpResponse { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user::sample_data::SampleDataRequest; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use common_enums::TokenPurpose; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn accept_invite_from_email( state: web::Data<AppState>, req: HttpRequest, payload: web::Json<user_api::AcceptInviteFromEmailRequest>, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user::sample_data::SampleDataRequest; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn resend_invite( state: web::Data<AppState>, req: HttpRequest, payload: web::Json<user_api::ReInviteUserRequest>, query: web::Query<user_api::AuthIdAndThemeIdQueryParam>, ) -> HttpResponse { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user::sample_data::SampleDataRequest; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn invite_multiple_user( state: web::Data<AppState>, req: HttpRequest, payload: web::Json<Vec<user_api::InviteUserRequest>>, auth_id_query_param: web::Query<user_api::AuthIdAndThemeIdQueryParam>, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user::sample_data::SampleDataRequest; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use common_enums::TokenPurpose; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn reset_password( state: web::Data<AppState>, req: HttpRequest, payload: web::Json<user_api::ResetPasswordRequest>, ) -> HttpResponse { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use common_enums::TokenPurpose; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn rotate_password( state: web::Data<AppState>, req: HttpRequest, payload: web::Json<user_api::RotatePasswordRequest>, ) -> HttpResponse { <|fim_suffix|> <|fim_middle|> }
ast_fragments
// file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn list_user_roles_details( state: web::Data<AppState>, req: HttpRequest, payload: web::Json<user_api::GetUserRoleDetailsRequest>, ) -> HttpResponse { let flow = Flow::GetUserRoleDetails; Box::pin(api::server_wrap( flow, state.clone(), &req, payload.into_inner(), user_core::list_user_roles_details, &auth::JWTAuth { permission: Permission::ProfileUserRead, }, api_locking::LockAction::NotApplicable, )) .await }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user::sample_data::SampleDataRequest; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use common_enums::TokenPurpose; use common_utils::errors::ReportSwitchExt; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn delete_sample_data( state: web::Data<AppState>, http_req: HttpRequest, payload: web::Json<SampleDataRequest>, ) -> impl actix_web::Responder { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user::sample_data::SampleDataRequest; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use common_enums::TokenPurpose; use common_utils::errors::ReportSwitchExt; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn generate_sample_data( state: web::Data<AppState>, http_req: HttpRequest, payload: web::Json<SampleDataRequest>, ) -> impl actix_web::Responder { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn user_merchant_account_create( state: web::Data<AppState>, req: HttpRequest, json_payload: web::Json<user_api::UserMerchantCreate>, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn user_org_create( state: web::Data<AppState>, req: HttpRequest, json_payload: web::Json<user_api::UserOrgMerchantCreateRequest>, ) -> HttpResponse { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn create_tenant_user( state: web::Data<AppState>, http_req: HttpRequest, json_payload: web::Json<user_api::CreateTenantUserRequest>, ) -> HttpResponse { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn internal_user_signup( state: web::Data<AppState>, http_req: HttpRequest, json_payload: web::Json<user_api::CreateInternalUserRequest>, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use common_utils::errors::ReportSwitchExt; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn get_multiple_dashboard_metadata( state: web::Data<AppState>, req: HttpRequest, query: web::Query<user_api::dashboard_metadata::GetMultipleMetaDataRequest>, ) -> HttpResponse { <|fim_suffix|> <|fim_middle|> }
ast_fragments
// file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user::sample_data::SampleDataRequest; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn change_password( state: web::Data<AppState>, http_req: HttpRequest, json_payload: web::Json<user_api::ChangePasswordRequest>, ) -> HttpResponse { let flow = Flow::ChangePassword; Box::pin(api::server_wrap( flow, state.clone(), &http_req, json_payload.into_inner(), |state, user, req, _| user_core::change_password(state, req, user), &auth::DashboardNoPermissionAuth, api_locking::LockAction::NotApplicable, )) .await }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user::sample_data::SampleDataRequest; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn signout(state: web::Data<AppState>, http_req: HttpRequest) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn user_signin( state: web::Data<AppState>, http_req: HttpRequest, json_payload: web::Json<user_api::SignInRequest>, ) -> HttpResponse { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn user_signup( state: web::Data<AppState>, http_req: HttpRequest, json_payload: web::Json<user_api::SignUpRequest>, ) -> HttpResponse { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user::sample_data::SampleDataRequest; use api_models::{ errors::types::ApiErrorResponse, user::{self as user_api}, }; use router_env::Flow; use super::AppState; use crate::{ core::{api_locking, user as user_core}, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, utils::user::dashboard_metadata::{parse_string_to_enums, set_ip_address_if_required}, }; pub async fn get_user_details(state: web::Data<AppState>, req: HttpRequest) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user_role.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user_role::{self as user_role_api, role as role_api}; use router_env::Flow; use super::AppState; use crate::{ core::{ api_locking, user_role::{self as user_role_core, role as role_core}, }, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, }; pub async fn list_updatable_roles_at_entity_level( state: web::Data<AppState>, req: HttpRequest, query: web::Query<role_api::ListRolesAtEntityLevelRequest>, ) -> HttpResponse { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user_role.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user_role::{self as user_role_api, role as role_api}; use router_env::Flow; use super::AppState; use crate::{ core::{ api_locking, user_role::{self as user_role_core, role as role_core}, }, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, }; pub async fn list_invitable_roles_at_entity_level( state: web::Data<AppState>, req: HttpRequest, query: web::Query<role_api::ListRolesAtEntityLevelRequest>, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user_role.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user_role::{self as user_role_api, role as role_api}; use router_env::Flow; use super::AppState; use crate::{ core::{ api_locking, user_role::{self as user_role_core, role as role_core}, }, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, }; pub async fn accept_invitations_v2( state: web::Data<AppState>, req: HttpRequest, json_payload: web::Json<user_role_api::AcceptInvitationsV2Request>, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user_role.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use common_enums::TokenPurpose; use router_env::Flow; use super::AppState; use crate::{ core::{ api_locking, user_role::{self as user_role_core, role as role_core}, }, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, }; pub async fn list_invitations_for_user( state: web::Data<AppState>, req: HttpRequest, ) -> HttpResponse { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user_role.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user_role::{self as user_role_api, role as role_api}; use router_env::Flow; use super::AppState; use crate::{ core::{ api_locking, user_role::{self as user_role_core, role as role_core}, }, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, }; pub async fn list_roles_with_info( state: web::Data<AppState>, req: HttpRequest, query: web::Query<role_api::ListRolesRequest>, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user_role.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user_role::{self as user_role_api, role as role_api}; use router_env::Flow; use super::AppState; use crate::{ core::{ api_locking, user_role::{self as user_role_core, role as role_core}, }, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, }; pub async fn list_users_in_lineage( state: web::Data<AppState>, req: HttpRequest, query: web::Query<user_role_api::ListUsersInEntityRequest>, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user_role.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use router_env::Flow; use super::AppState; use crate::{ core::{ api_locking, user_role::{self as user_role_core, role as role_core}, }, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, }; pub async fn get_parent_group_info( state: web::Data<AppState>, http_req: HttpRequest, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user_role.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use router_env::Flow; use super::AppState; use crate::{ core::{ api_locking, user_role::{self as user_role_core, role as role_core}, }, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, }; pub async fn get_role_information( state: web::Data<AppState>, http_req: HttpRequest, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user_role.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user_role::{self as user_role_api, role as role_api}; use router_env::Flow; use super::AppState; use crate::{ core::{ api_locking, user_role::{self as user_role_core, role as role_core}, }, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, }; pub async fn delete_user_role( state: web::Data<AppState>, req: HttpRequest, payload: web::Json<user_role_api::DeleteUserRoleRequest>, ) -> HttpResponse { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user_role.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user_role::{self as user_role_api, role as role_api}; use common_enums::TokenPurpose; use router_env::Flow; use super::AppState; use crate::{ core::{ api_locking, user_role::{self as user_role_core, role as role_core}, }, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, }; pub async fn accept_invitations_pre_auth( state: web::Data<AppState>, req: HttpRequest, json_payload: web::Json<user_role_api::AcceptInvitationsPreAuthRequest>, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
// file: hyperswitch/crates/router/src/routes/user_role.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user_role::{self as user_role_api, role as role_api}; use router_env::Flow; use super::AppState; use crate::{ core::{ api_locking, user_role::{self as user_role_core, role as role_core}, }, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, }; pub async fn accept_invitations_v2( state: web::Data<AppState>, req: HttpRequest, json_payload: web::Json<user_role_api::AcceptInvitationsV2Request>, ) -> HttpResponse { let flow = Flow::AcceptInvitationsV2; let payload = json_payload.into_inner(); Box::pin(api::server_wrap( flow, state.clone(), &req, payload, |state, user, req_body, _| user_role_core::accept_invitations_v2(state, user, req_body), &auth::DashboardNoPermissionAuth, api_locking::LockAction::NotApplicable, )) .await }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user_role.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user_role::{self as user_role_api, role as role_api}; use router_env::Flow; use super::AppState; use crate::{ core::{ api_locking, user_role::{self as user_role_core, role as role_core}, }, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, }; pub async fn update_user_role( state: web::Data<AppState>, req: HttpRequest, json_payload: web::Json<user_role_api::UpdateUserRoleRequest>, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user_role.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user_role::{self as user_role_api, role as role_api}; use router_env::Flow; use super::AppState; use crate::{ core::{ api_locking, user_role::{self as user_role_core, role as role_core}, }, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, }; pub async fn update_role( state: web::Data<AppState>, req: HttpRequest, json_payload: web::Json<role_api::UpdateRoleRequest>, path: web::Path<String>, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user_role.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user_role::{self as user_role_api, role as role_api}; use router_env::Flow; use super::AppState; use crate::{ core::{ api_locking, user_role::{self as user_role_core, role as role_core}, }, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, }; pub async fn get_parent_info_for_role( state: web::Data<AppState>, req: HttpRequest, path: web::Path<String>, ) -> HttpResponse { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user_role.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user_role::{self as user_role_api, role as role_api}; use router_env::Flow; use super::AppState; use crate::{ core::{ api_locking, user_role::{self as user_role_core, role as role_core}, }, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, }; pub async fn get_role( state: web::Data<AppState>, req: HttpRequest, path: web::Path<String>, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user_role.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use api_models::user_role::{self as user_role_api, role as role_api}; use router_env::Flow; use super::AppState; use crate::{ core::{ api_locking, user_role::{self as user_role_core, role as role_core}, }, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, }; pub async fn create_role( state: web::Data<AppState>, req: HttpRequest, json_payload: web::Json<role_api::CreateRoleRequest>, ) -> HttpResponse { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user_role.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use router_env::Flow; use super::AppState; use crate::{ core::{ api_locking, user_role::{self as user_role_core, role as role_core}, }, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, }; pub async fn get_groups_and_resources_for_role_from_token( state: web::Data<AppState>, req: HttpRequest, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user_role.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use router_env::Flow; use super::AppState; use crate::{ core::{ api_locking, user_role::{self as user_role_core, role as role_core}, }, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, }; pub async fn get_role_from_token(state: web::Data<AppState>, req: HttpRequest) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/user_role.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use router_env::Flow; use super::AppState; use crate::{ core::{ api_locking, user_role::{self as user_role_core, role as role_core}, }, services::{ api, authentication::{self as auth}, authorization::permissions::Permission, }, }; pub async fn get_authorization_info( state: web::Data<AppState>, http_req: HttpRequest, ) -> HttpResponse { <|fim_suffix|> <|fim_middle|> }
ast_fragments
// file: hyperswitch/crates/router/src/routes/recovery_webhooks.rs | crate: router use actix_web::{web, HttpRequest, Responder}; use router_env::{instrument, tracing, Flow}; use super::app::AppState; use crate::{ core::{ api_locking, webhooks::{self, types}, }, services::{api, authentication as auth}, }; pub async fn recovery_receive_incoming_webhook<W: types::OutgoingWebhookType>( state: web::Data<AppState>, req: HttpRequest, body: web::Bytes, path: web::Path<( common_utils::id_type::MerchantId, common_utils::id_type::ProfileId, common_utils::id_type::MerchantConnectorAccountId, )>, ) -> impl Responder { let flow = Flow::RecoveryIncomingWebhookReceive; let (merchant_id, profile_id, connector_id) = path.into_inner(); Box::pin(api::server_wrap( flow.clone(), state, &req, (), |state, auth, _, req_state| { webhooks::incoming_webhooks_wrapper::<W>( &flow, state.to_owned(), req_state, &req, auth.merchant_account, auth.profile, auth.key_store, &connector_id, body.clone(), false, ) }, &auth::MerchantIdAndProfileIdAuth { merchant_id, profile_id, }, api_locking::LockAction::NotApplicable, )) .await }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/recovery_webhooks.rs | crate: router use actix_web::{web, HttpRequest, Responder}; use router_env::{instrument, tracing, Flow}; use super::app::AppState; use crate::{ core::{ api_locking, webhooks::{self, types}, }, services::{api, authentication as auth}, }; pub async fn recovery_receive_incoming_webhook<W: types::OutgoingWebhookType>( state: web::Data<AppState>, req: HttpRequest, body: web::Bytes, path: web::Path<( common_utils::id_type::MerchantId, common_utils::id_type::ProfileId, common_utils::id_type::MerchantConnectorAccountId, )>, ) -> impl Responder { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/profiles.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use router_env::{instrument, tracing, Flow}; use super::app::AppState; use crate::{ core::{admin::*, api_locking}, services::{api, authentication as auth, authorization::permissions}, types::api::admin, }; pub async fn payment_connector_list_profile( state: web::Data<AppState>, req: HttpRequest, path: web::Path<common_utils::id_type::MerchantId>, ) -> HttpResponse { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/profiles.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use router_env::{instrument, tracing, Flow}; use super::app::AppState; use crate::{ core::{admin::*, api_locking}, services::{api, authentication as auth, authorization::permissions}, types::api::admin, }; pub async fn toggle_connector_agnostic_mit( state: web::Data<AppState>, req: HttpRequest, path: web::Path<( common_utils::id_type::MerchantId, common_utils::id_type::ProfileId, )>, json_payload: web::Json<api_models::admin::ConnectorAgnosticMitChoice>, ) -> HttpResponse { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/profiles.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use router_env::{instrument, tracing, Flow}; use super::app::AppState; use crate::{ core::{admin::*, api_locking}, services::{api, authentication as auth, authorization::permissions}, types::api::admin, }; pub async fn profiles_list_at_profile_level( state: web::Data<AppState>, req: HttpRequest, path: web::Path<common_utils::id_type::MerchantId>, ) -> HttpResponse { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/routes/profiles.rs | crate: router use actix_web::{web, HttpRequest, HttpResponse}; use router_env::{instrument, tracing, Flow}; use super::app::AppState; use crate::{ core::{admin::*, api_locking}, services::{api, authentication as auth, authorization::permissions}, types::api::admin, }; pub async fn profiles_list( state: web::Data<AppState>, req: HttpRequest, path: web::Path<common_utils::id_type::MerchantId>, ) -> HttpResponse { <|fim_suffix|> <|fim_middle|> }
ast_fragments