text stringlengths 70 351k | source stringclasses 4
values |
|---|---|
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use api_models::{
admin::{self as admin_types},
enums as api_enums, routing as routing_types,
};
use common_utils::{
date_time,
ext_traits::{AsyncExt, Encode, OptionExt, ValueExt},
fp_utils, id_type, pii, type_name,
... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
card_testing_guard_config: self
.card_testing_guard_config
.map(ForeignInto::foreign_into),
card_testing_secret_key,
is_debit_routing_enabled: self.... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
.await
.to_not_found_response(errors::ApiErrorResponse::MerchantAccountNotFound)?;
}
Ok(service_api::ApplicationResponse::Json(
api_models::admin::ProfileResponse::foreign_try_from(business_profile)
... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use api_models::{
admin::{self as admin_types},
enums as api_enums, routing as routing_types,
};
use diesel_models::{business_profile::CardTestingGuardConfig, organization::OrganizationBridge};
use crate::{
consts,
core:... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use api_models::{
admin::{self as admin_types},
enums as api_enums, routing as routing_types,
};
use common_utils::{
date_time,
ext_traits::{AsyncExt, Encode, OptionExt, ValueExt},
fp_utils, id_type, pii, type_name,
... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use api_models::{
admin::{self as admin_types},
enums as api_enums, routing as routing_types,
};
use crate::{
consts,
core::{
encryption::transfer_encryption_key,
errors::{self, RouterResponse, RouterResu... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use api_models::{
admin::{self as admin_types},
enums as api_enums, routing as routing_types,
};
use common_utils::{
date_time,
ext_traits::{AsyncExt, Encode, OptionExt, ValueExt},
fp_utils, id_type, pii, type_name,
... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use common_utils::{
date_time,
ext_traits::{AsyncExt, Encode, OptionExt, ValueExt},
fp_utils, id_type, pii, type_name,
types::keymanager::{self as km_types, KeyManagerState, ToEncryptable},
};
use diesel_models::{busines... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
format!(
"Failed while updating MerchantConnectorAccount: id: {:?}",
merchant_connector_id
)
})?;
let response = updated_mca.foreign_try_into()?;
Ok(service_api::... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use api_models::{
admin::{self as admin_types},
enums as api_enums, routing as routing_types,
};
use common_utils::{
date_time,
ext_traits::{AsyncExt, Encode, OptionExt, ValueExt},
fp_utils, id_type, pii, type_name,
... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use api_models::{
admin::{self as admin_types},
enums as api_enums, routing as routing_types,
};
use common_utils::{
date_time,
ext_traits::{AsyncExt, Encode, OptionExt, ValueExt},
fp_utils, id_type, pii, type_name,
... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
.await
.to_not_found_response(errors::ApiErrorResponse::MerchantConnectorAccountNotFound {
id: merchant_connector_id.get_string_repr().to_string(),
})?;
core_utils::validate_profile_id_from_auth_l... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use api_models::{
admin::{self as admin_types},
enums as api_enums, routing as routing_types,
};
use common_utils::{
date_time,
ext_traits::{AsyncExt, Encode, OptionExt, ValueExt},
fp_utils, id_type, pii, type_name,
... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
1,
router_env::metric_attributes!(
("connector", req.connector_name.to_string()),
("merchant", merchant_id.clone()),
),
);
let mca_response = mca.foreign_try_into()?;
Ok(servi... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
test_mode: self.test_mode,
business_country: self.business_country,
business_label: self.business_label.clone(),
business_sub_label: self.business_sub_label.clone(),
additional... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
.update_default_fallback_routing_of_connectors_under_profile(
self.store,
default_routing_config_for_profile,
self.key_manager_state,
... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
}
#[cfg(feature = "v2")]
struct DefaultFallbackRoutingConfigUpdate<'a> {
routable_connector: &'a Option<api_enums::RoutableConnectors>,
merchant_connector_id: &'a id_type::MerchantConnectorAccountId,
store: &'a dyn StorageIn... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
}
}
Ok(())
}
}
struct ConnectorTypeAndConnectorName<'a> {
connector_type: &'a api_enums::ConnectorType,
connector_name: &'a api_enums::Connector,
}
impl ConnectorTypeAndConnectorName<'_> {
f... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
struct PMAuthConfigValidation<'a> {
connector_type: &'a api_enums::ConnectorType,
pm_auth_config: &'a Option<pii::SecretSerdeValue>,
db: &'a dyn StorageInterface,
merchant_id: &'a id_type::MerchantId,
profile_id: &'... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
}
}
}
struct ConnectorStatusAndDisabledValidation<'a> {
status: &'a Option<api_enums::ConnectorStatus>,
disabled: &'a Option<bool>,
auth: &'a types::ConnectorAuthType,
current_status: &'a api_enums::Connecto... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
threedsecureio::transformers::ThreedsecureioAuthType::try_from(self.auth_type)?;
Ok(())
}
}
}
}
struct ConnectorAuthTypeValidation<'a> {
auth_type: &'a types::ConnectorAuthTyp... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
db.find_merchant_account_by_merchant_id(&state.into(), merchant_id, key_store)
.await
.to_not_found_response(errors::ApiErrorResponse::MerchantAccountNotFound)
}
struct ConnectorAuthTypeAndMetadataValidation<'a> {
... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use common_utils::{
date_time,
ext_traits::{AsyncExt, Encode, OptionExt, ValueExt},
fp_utils, id_type, pii, type_name,
types::keymanager::{self as km_types, KeyManagerState, ToEncryptable},
};
use error_stack::{report, F... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use common_utils::{
date_time,
ext_traits::{AsyncExt, Encode, OptionExt, ValueExt},
fp_utils, id_type, pii, type_name,
types::keymanager::{self as km_types, KeyManagerState, ToEncryptable},
};
use crate::types::transform... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use common_utils::{
date_time,
ext_traits::{AsyncExt, Encode, OptionExt, ValueExt},
fp_utils, id_type, pii, type_name,
types::keymanager::{self as km_types, KeyManagerState, ToEncryptable},
};
use crate::{
consts,
... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
payout_routing_algorithm: None,
default_profile: business_profile_id_update,
payment_link_config: None,
pm_collect_link_config,
routing_algorithm: self.routing_algorithm,
... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
.to_not_found_response(errors::ApiErrorResponse::MerchantAccountNotFound)?;
Ok(service_api::ApplicationResponse::Json(
api::MerchantAccountResponse::foreign_try_from(merchant_account)
.change_context(err... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use common_utils::{
date_time,
ext_traits::{AsyncExt, Encode, OptionExt, ValueExt},
fp_utils, id_type, pii, type_name,
types::keymanager::{self as km_types, KeyManagerState, ToEncryptable},
};
use crate::{
consts,
... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use api_models::{
admin::{self as admin_types},
enums as api_enums, routing as routing_types,
};
use diesel_models::{business_profile::CardTestingGuardConfig, organization::OrganizationBridge};
use crate::{
consts,
core:... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
})
.map(|business_profile| business_profiles_vector.push(business_profile))
.ok();
}
Ok(business_profiles_vector)
}
}
#[cfg(all(feature = "v2", feature = "olap"))]
#[async_trait:... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use api_models::{
admin::{self as admin_types},
enums as api_enums, routing as routing_types,
};
use diesel_models::{business_profile::CardTestingGuardConfig, organization::OrganizationBridge};
use crate::types::transformers::Fo... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
/// If primary business details are empty, then create default profile
fn new(primary_business_details: Option<Vec<admin_types::PrimaryBusinessDetails>>) -> Self {
match primary_business_details {
Some(primar... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
let profile_id = self.profile.get_id().to_owned();
storage_impl::redis::cache::CacheKind::Routing(
format!(
"routing_config_{}_{}",
merchant_id.get_string_repr(),
... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
trait ProfileUpdateBridge {
async fn get_update_profile_object(
self,
state: &SessionState,
key_store: &domain::MerchantKeyStore,
business_profile: &domain::Profile,
) -> RouterResult<domain::Prof... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use api_models::{
admin::{self as admin_types},
enums as api_enums, routing as routing_types,
};
use crate::{
consts,
core::{
encryption::transfer_encryption_key,
errors::{self, RouterResponse, RouterResu... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
default_fallback_routing
.expose()
.parse_value::<Vec<routing_types::RoutableConnectorChoice>>(
"Vec<RoutableConnectorChoice>",
)
... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use api_models::{
admin::{self as admin_types},
enums as api_enums, routing as routing_types,
};
use common_utils::{
date_time,
ext_traits::{AsyncExt, Encode, OptionExt, ValueExt},
fp_utils, id_type, pii, type_name,
... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use api_models::{
admin::{self as admin_types},
enums as api_enums, routing as routing_types,
};
use common_utils::{
date_time,
ext_traits::{AsyncExt, Encode, OptionExt, ValueExt},
fp_utils, id_type, pii, type_name,
... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use api_models::{
admin::{self as admin_types},
enums as api_enums, routing as routing_types,
};
use common_utils::{
date_time,
ext_traits::{AsyncExt, Encode, OptionExt, ValueExt},
fp_utils, id_type, pii, type_name,
... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use crate::{
consts,
core::{
encryption::transfer_encryption_key,
errors::{self, RouterResponse, RouterResult, StorageErrorExt},
payment_methods::{cards, transformers},
payments::helpers,
... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use common_utils::{
date_time,
ext_traits::{AsyncExt, Encode, OptionExt, ValueExt},
fp_utils, id_type, pii, type_name,
types::keymanager::{self as km_types, KeyManagerState, ToEncryptable},
};
use crate::{
consts,
... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
let profiles = core_utils::filter_objects_based_on_profile_id_list(profile_id_list, profiles);
let mut business_profiles = Vec::new();
for profile in profiles {
let business_profile = api_models::admin::ProfileRespon... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use api_models::{
admin::{self as admin_types},
enums as api_enums, routing as routing_types,
};
use crate::{
consts,
core::{
encryption::transfer_encryption_key,
errors::{self, RouterResponse, RouterResu... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use api_models::{
admin::{self as admin_types},
enums as api_enums, routing as routing_types,
};
use masking::{ExposeInterface, PeekInterface, Secret};
use crate::{
consts,
core::{
encryption::transfer_encryption... | ast_fragments |
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use api_models::{
admin::{self as admin_types},
enums as api_enums, routing as routing_types,
};
use common_utils::{
date_time,
ext_traits::{AsyncExt, Encode, OptionExt, ValueExt},
fp_utils, id_type, pii, type_name,
types::keym... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
Ok(business_profile)
}
}
#[cfg(feature = "v1")]
struct PaymentMethodsEnabled<'a> {
payment_methods_enabled: &'a Option<Vec<api_models::admin::PaymentMethodsEnabled>>,
}
#[cfg(feature = "v1")]
impl PaymentMethodsEnable... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
},
profile_id: business_profile.get_id().to_owned(),
applepay_verified_domains: None,
pm_auth_config: self.pm_auth_config.clone(),
status: connector_status,
connect... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use api_models::{
admin::{self as admin_types},
enums as api_enums, routing as routing_types,
};
use common_utils::{
date_time,
ext_traits::{AsyncExt, Encode, OptionExt, ValueExt},
fp_utils, id_type, pii, type_name,
... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use api_models::{
admin::{self as admin_types},
enums as api_enums, routing as routing_types,
};
use common_utils::{
date_time,
ext_traits::{AsyncExt, Encode, OptionExt, ValueExt},
fp_utils, id_type, pii, type_name,
... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use api_models::{
admin::{self as admin_types},
enums as api_enums, routing as routing_types,
};
use common_utils::{
date_time,
ext_traits::{AsyncExt, Encode, OptionExt, ValueExt},
fp_utils, id_type, pii, type_name,
... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
(None, _) => Some(false),
};
Ok((*connector_status, disabled))
}
}
struct ConnectorMetadata<'a> {
connector_metadata: &'a Option<pii::SecretSerdeValue>,
}
impl ConnectorMetadata<'_> {
fn valida... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use common_utils::{
date_time,
ext_traits::{AsyncExt, Encode, OptionExt, ValueExt},
fp_utils, id_type, pii, type_name,
types::keymanager::{self as km_types, KeyManagerState, ToEncryptable},
};
use crate::{
consts,
... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use api_models::{
admin::{self as admin_types},
enums as api_enums, routing as routing_types,
};
use crate::{
consts,
core::{
encryption::transfer_encryption_key,
errors::{self, RouterResponse, RouterResu... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
let business_profile = self
.create_default_business_profile(state, merchant_account.clone(), key_store)
.await?;
merchant_account.default_profile = Some(business_... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use api_models::{
admin::{self as admin_types},
enums as api_enums, routing as routing_types,
};
/// Create a new profile action from the given information
/// If primary business details exist, then create profiles from... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
Self::Create
}
}
#[cfg(all(feature = "v2", feature = "olap"))]
/// Create an action to validate the provided organization_id
fn new(organization_id: id_type::OrganizationId) -> Self {
Self::V... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use common_utils::{
date_time,
ext_traits::{AsyncExt, Encode, OptionExt, ValueExt},
fp_utils, id_type, pii, type_name,
types::keymanager::{self as km_types, KeyManagerState, ToEncryptable},
};
/// Create an action to... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use common_utils::{
date_time,
ext_traits::{AsyncExt, Encode, OptionExt, ValueExt},
fp_utils, id_type, pii, type_name,
types::keymanager::{self as km_types, KeyManagerState, ToEncryptable},
};
/// Create an action to... | ast_fragments |
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use crate::types::transformers::ForeignFrom;
use crate::{
consts,
core::{
encryption::transfer_encryption_key,
errors::{self, RouterResponse, RouterResult, StorageErrorExt},
payment_methods::{cards, transformers},
... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use diesel_models::configs;
use diesel_models::{business_profile::CardTestingGuardConfig, organization::OrganizationBridge};
use crate::types::transformers::ForeignFrom;
use crate::{
consts,
core::{
encryption::transfer_... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use diesel_models::{business_profile::CardTestingGuardConfig, organization::OrganizationBridge};
use crate::types::transformers::ForeignFrom;
use crate::{
consts,
core::{
encryption::transfer_encryption_key,
erro... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use crate::{
consts,
core::{
encryption::transfer_encryption_key,
errors::{self, RouterResponse, RouterResult, StorageErrorExt},
payment_methods::{cards, transformers},
payments::helpers,
... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use common_utils::{
date_time,
ext_traits::{AsyncExt, Encode, OptionExt, ValueExt},
fp_utils, id_type, pii, type_name,
types::keymanager::{self as km_types, KeyManagerState, ToEncryptable},
};
use diesel_models::configs;... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use uuid::Uuid;
pub fn create_merchant_publishable_key() -> String {
<|fim_suffix|>
<|fim_middle|>
}
| ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
use std::str::FromStr;
use common_utils::{
date_time,
ext_traits::{AsyncExt, Encode, OptionExt, ValueExt},
fp_utils, id_type, pii, type_name,
types::keymanager::{self as km_types, KeyManagerState, ToEncryptable},
};
use ... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
state: SessionState,
req: admin_types::MerchantKeyTransferRequest,
) -> RouterResponse<admin_types::TransferKeyResponse> {
let resp = transfer_encryption_key(&state, req).await?;
Ok(service_api::ApplicationResponse::Jso... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
is_clear_pan_retries_enabled: self.is_clear_pan_retries_enabled,
force_3ds_challenge: self.force_3ds_challenge, //
is_debit_routing_enabled: self.is_debit_routing_enabled.unwrap_or_default... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
})
.await
.change_context(errors::ApiErrorResponse::InternalServerError)
.attach_printable("error while generating card testing secret key")?,
is_clear_pan_retr... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
})?;
Ok(business_profile)
}
_ => Err(report!(errors::ApiErrorResponse::MissingRequiredField {
field_name: "profile_id or business_country, ... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
}
Some(vec)
}
None => None,
};
Ok(payment_methods_enabled)
}
}
#[cfg(all(feature = "v1", feature = "olap"))]
#[async_trait::async_trait]
impl MerchantConnector... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
async fn validate_and_get_business_profile(
self,
merchant_account: &domain::MerchantAccount,
db: &dyn StorageInterface,
key_manager_state: &KeyManagerState,
key_store: &domain::MerchantKeySto... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
merchant_id,
merchant_connector_id,
key_store,
)
.await
.to_not_found_response(
errors::ApiErrorResponse::MerchantConnectorAccountNotFound {
id: mer... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
trait MerchantAccountUpdateBridge {
async fn get_update_merchant_object(
self,
state: &SessionState,
merchant_id: &id_type::MerchantId,
key_store: &domain::MerchantKeyStore,
) -> RouterResult<stor... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
trait MerchantAccountCreateBridge {
async fn create_domain_model_from_request(
self,
state: &SessionState,
key: domain::MerchantKeyStore,
identifier: &id_type::MerchantId,
) -> RouterResult<domain... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
}
#[cfg(all(feature = "v2", feature = "olap"))]
{
CreateOrValidateOrganization::new(org_id.organization_id)
.create_or_validate(state.accounts_store.as_ref())
.await
.map(ForeignFr... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
async fn create_domain_model_from_request(
self,
state: &SessionState,
key: &domain::MerchantKeyStore,
merchant_id: &id_type::MerchantId,
) -> RouterResult<domain::Profile>;
}
#[cfg(feature = "ol... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/admin.rs | crate: router
}),
errors::ConnectorError::FailedToObtainAuthType => {
err.change_context(errors::ApiErrorResponse::InvalidRequestData {
message: "The auth type is invalid... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/api_locking.rs | crate: router
use redis_interface as redis;
use router_env::{instrument, logger, tracing};
use super::errors::{self, RouterResult};
use crate::routes::{app::SessionStateInfo, lock_utils};
pub async fn free_lock_action<A>(
self,
... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/api_locking.rs | crate: router
use actix_web::rt::time as actix_time;
use error_stack::{report, ResultExt};
use redis_interface as redis;
use router_env::{instrument, logger, tracing};
use super::errors::{self, RouterResult};
use crate::routes::{app::SessionSta... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/api_locking.rs | crate: router
use actix_web::rt::time as actix_time;
use error_stack::{report, ResultExt};
use redis_interface as redis;
use router_env::{instrument, logger, tracing};
use super::errors::{self, RouterResult};
use crate::routes::{app::SessionSta... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/api_locking.rs | crate: router
use super::errors::{self, RouterResult};
fn get_redis_locking_key(&self, merchant_id: common_utils::id_type::MerchantId) -> String {
{<|fim_suffix|>
<|fim_middle|>
}}
| ast_fragments |
// file: hyperswitch/crates/router/src/core/api_locking.rs | crate: router
use super::errors::{self, RouterResult};
fn get_redis_locking_key(&self, merchant_id: common_utils::id_type::MerchantId) -> String {
format!(
"{}_{}_{}_{}",
API_LOCK_PREFIX,
merchant_id.get_string_repr... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/pm_auth.rs | crate: router
use api_models::{
enums,
payment_methods::{self, BankAccountAccessCreds},
};
use pm_auth::{
connector::plaid::transformers::PlaidAuthType,
types::{
self as pm_auth_types,
api::{
auth_service... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/pm_auth.rs | crate: router
use std::{collections::HashMap, str::FromStr};
use api_models::{
enums,
payment_methods::{self, BankAccountAccessCreds},
};
use masking::{ExposeInterface, PeekInterface, Secret};
use pm_auth::{
connector::plaid::transforme... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/pm_auth.rs | crate: router
use std::{collections::HashMap, str::FromStr};
use masking::{ExposeInterface, PeekInterface, Secret};
use pm_auth::{
connector::plaid::transformers::PlaidAuthType,
types::{
self as pm_auth_types,
api::{
... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/pm_auth.rs | crate: router
use common_enums::{enums::MerchantStorageScheme, PaymentMethodType};
use crate::{
core::{
errors::{self, ApiErrorResponse, RouterResponse, RouterResult, StorageErrorExt},
payment_methods::cards,
payments::h... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/pm_auth.rs | crate: router
use api_models::{
enums,
payment_methods::{self, BankAccountAccessCreds},
};
use helpers::PaymentAuthConnectorDataExt;
use pm_auth::{
connector::plaid::transformers::PlaidAuthType,
types::{
self as pm_auth_type... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/pm_auth.rs | crate: router
_state: SessionState,
_merchant_account: domain::MerchantAccount,
_key_store: domain::MerchantKeyStore,
_payload: api_models::pm_auth::LinkTokenCreateRequest,
_headers: Option<hyperswitch_domain_models::payments::H... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/pm_auth.rs | crate: router
use std::{collections::HashMap, str::FromStr};
use api_models::{
enums,
payment_methods::{self, BankAccountAccessCreds},
};
use common_utils::{
consts,
crypto::{HmacSha256, SignMessage},
ext_traits::{AsyncExt, Valu... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/pm_auth.rs | crate: router
use api_models::{
enums,
payment_methods::{self, BankAccountAccessCreds},
};
use hyperswitch_domain_models::payments::PaymentIntent;
use pm_auth::{
connector::plaid::transformers::PlaidAuthType,
types::{
self a... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/pm_auth.rs | crate: router
use api_models::{
enums,
payment_methods::{self, BankAccountAccessCreds},
};
use common_enums::{enums::MerchantStorageScheme, PaymentMethodType};
use common_utils::{
consts,
crypto::{HmacSha256, SignMessage},
ext_t... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/pm_auth.rs | crate: router
use std::{collections::HashMap, str::FromStr};
use api_models::{
enums,
payment_methods::{self, BankAccountAccessCreds},
};
use common_enums::{enums::MerchantStorageScheme, PaymentMethodType};
use hex;
use common_utils::{
... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/pm_auth.rs | crate: router
use std::{collections::HashMap, str::FromStr};
use api_models::{
enums,
payment_methods::{self, BankAccountAccessCreds},
};
use helpers::PaymentAuthConnectorDataExt;
use hyperswitch_domain_models::payments::PaymentIntent;
use ... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/payments/tokenization.rs | crate: router
use api_models::{
payment_methods::PaymentMethodDataWalletInfo, payments::ConnectorMandateReferenceId,
};
use hyperswitch_domain_models::mandates::{
CommonMandateReference, PaymentsMandateReference, PaymentsManda... | ast_fragments |
// file: hyperswitch/crates/router/src/core/payments/tokenization.rs | crate: router
use api_models::{
payment_methods::PaymentMethodDataWalletInfo, payments::ConnectorMandateReferenceId,
};
use common_enums::{ConnectorMandateStatus, PaymentMethod};
use common_utils::{
crypto::Encryptable,
ext_traits::{Asyn... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/payments/tokenization.rs | crate: router
use api_models::{
payment_methods::PaymentMethodDataWalletInfo, payments::ConnectorMandateReferenceId,
};
use common_enums::{ConnectorMandateStatus, PaymentMethod};
use common_utils::{
crypto::Encryptable,
ex... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/payments/tokenization.rs | crate: router
use std::collections::HashMap;
use api_models::{
payment_methods::PaymentMethodDataWalletInfo, payments::ConnectorMandateReferenceId,
};
use common_enums::{ConnectorMandateStatus, PaymentMethod};
use common_utils::{
... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/payments/tokenization.rs | crate: router
use hyperswitch_domain_models::mandates::{
CommonMandateReference, PaymentsMandateReference, PaymentsMandateReferenceRecord,
};
use masking::{ExposeInterface, Secret};
use crate::{
consts,
core::{
err... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/payments/tokenization.rs | crate: router
use api_models::payment_methods::PaymentMethodsData;
use api_models::{
payment_methods::PaymentMethodDataWalletInfo, payments::ConnectorMandateReferenceId,
};
use crate::{
consts,
core::{
errors::{sel... | ast_fragments |
<|fim_prefix|>
// file: hyperswitch/crates/router/src/core/payments/tokenization.rs | crate: router
use api_models::payment_methods::PaymentMethodsData;
use api_models::{
payment_methods::PaymentMethodDataWalletInfo, payments::ConnectorMandateReferenceId,
};
use common_utils::{
crypto::Encryptable,
ext_trai... | ast_fragments |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.