text
stringlengths
70
351k
source
stringclasses
4 values
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api.rs | crate: router Self::PreDetermined(surcharge_details) => Some(surcharge_details.clone()), } } } pub enum ConnectorChoice { SessionMultiple(SessionConnectorDatas), StraightThrough(serde_json::Value), Decide, } impl ConnectorData { pub fn get_connector_by_name( _connectors: &Connectors, name: &str, connector_type: GetToken, connector_id: Option<common_utils::id_type::MerchantConnectorAccountId>, ) -> CustomResult<Self, errors::ApiErrorResponse> { let connector = Self::convert_connector(name)?; let connector_name = api_enums::Connector::from_str(name) .change_context(errors::ConnectorError::InvalidConnectorName) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable_lazy(|| format!("unable to parse connector name {name}"))?; Ok(Self { connector, pub fn get_connector_by_name( _connectors: &Connectors, name: &str, connector_type: GetToken, connector_id: Option<common_utils::id_type::MerchantConnectorAccountId>, ) -> CustomResult<Self, errors::ApiErrorResponse> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api.rs | crate: router use api_models::routing::{self as api_routing, RoutableConnectorChoice}; use common_enums::RoutableConnectors; use crate::{ configs::settings::Connectors, connector, consts, core::{ errors::{self, CustomResult}, payments::types as payments_types, }, services::connector_integration_interface::ConnectorEnum, types::{self, api::enums as api_enums}, }; fn foreign_try_from(from: ConnectorData) -> Result<Self, Self::Error> { { Ok(connector) => Ok(Self { choice_kind: api_routing::RoutableChoiceKind::FullStruct, connector, merchant_connector_id: from.merchant_connector_id, }),<|fim_suffix|> <|fim_middle|> Err(e) => Err(common_utils::errors::ValidationError::InvalidValue { message: format!("This is not a routable connector: {:?}", e), })?, } }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api.rs | crate: router use crate::{ configs::settings::Connectors, connector, consts, core::{ errors::{self, CustomResult}, payments::types as payments_types, }, services::connector_integration_interface::ConnectorEnum, types::{self, api::enums as api_enums}, }; fn convert_connector( connector_name: enums::TaxConnectors, ) -> CustomResult<ConnectorEnum, errors::ApiErrorResponse> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api.rs | crate: router let result = enums::Connector::from_str("Opennode"); assert!(result.is_err()); } } #[derive(Clone)] pub struct TaxCalculateConnectorData { pub connector: ConnectorEnum, pub connector_name: enums::TaxConnectors, } impl TaxCalculateConnectorData { pub fn get_connector_by_name(name: &str) -> CustomResult<Self, errors::ApiErrorResponse> { let connector_name = enums::TaxConnectors::from_str(name) .change_context(errors::ApiErrorResponse::IncorrectConnectorNameGiven) .attach_printable_lazy(|| format!("unable to parse connector: {name}"))?; let connector = Self::convert_connector(connector_name)?; Ok(Self { connector, connector_name, }) } fn convert_connector( connector_name: enums::TaxConnectors, pub fn get_connector_by_name(name: &str) -> CustomResult<Self, errors::ApiErrorResponse> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api.rs | crate: router pub use hyperswitch_interfaces::{ api::{ authentication::{ ConnectorAuthentication, ConnectorPostAuthentication, ConnectorPreAuthentication, ConnectorPreAuthenticationVersionCall, ExternalAuthentication, }, authentication_v2::{ ConnectorAuthenticationV2, ConnectorPostAuthenticationV2, ConnectorPreAuthenticationV2, ConnectorPreAuthenticationVersionCallV2, ExternalAuthenticationV2, }, fraud_check::FraudCheck, revenue_recovery::{ BillingConnectorPaymentsSyncIntegration, RevenueRecovery, RevenueRecoveryRecordBack, }, revenue_recovery_v2::RevenueRecoveryV2, BoxedConnector, Connector, ConnectorAccessToken, ConnectorAccessTokenV2, ConnectorCommon, ConnectorCommonExt, ConnectorMandateRevoke, ConnectorMandateRevokeV2, ConnectorTransactionId, ConnectorVerifyWebhookSource, ConnectorVerifyWebhookSourceV2, CurrencyUnit, }, connector_integration_v2::{BoxedConnectorV2, ConnectorV2}, }; use crate::{ configs::settings::Connectors, connector, consts, core::{ errors::{self, CustomResult}, payments::types as payments_types, }, services::connector_integration_interface::ConnectorEnum, types::{self, api::enums as api_enums}, }; fn test_convert_connector_parsing_fail_for_camel_case() { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api.rs | crate: router pub use hyperswitch_interfaces::{ api::{ authentication::{ ConnectorAuthentication, ConnectorPostAuthentication, ConnectorPreAuthentication, ConnectorPreAuthenticationVersionCall, ExternalAuthentication, }, authentication_v2::{ ConnectorAuthenticationV2, ConnectorPostAuthenticationV2, ConnectorPreAuthenticationV2, ConnectorPreAuthenticationVersionCallV2, ExternalAuthenticationV2, }, fraud_check::FraudCheck, revenue_recovery::{ BillingConnectorPaymentsSyncIntegration, RevenueRecovery, RevenueRecoveryRecordBack, }, revenue_recovery_v2::RevenueRecoveryV2, BoxedConnector, Connector, ConnectorAccessToken, ConnectorAccessTokenV2, ConnectorCommon, ConnectorCommonExt, ConnectorMandateRevoke, ConnectorMandateRevokeV2, ConnectorTransactionId, ConnectorVerifyWebhookSource, ConnectorVerifyWebhookSourceV2, CurrencyUnit, }, connector_integration_v2::{BoxedConnectorV2, ConnectorV2}, }; use crate::{ configs::settings::Connectors, connector, consts, core::{ errors::{self, CustomResult}, payments::types as payments_types, }, services::connector_integration_interface::ConnectorEnum, types::{self, api::enums as api_enums}, }; fn test_convert_connector_parsing_fail_for_unknown_type() { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api.rs | crate: router pub use hyperswitch_interfaces::{ api::{ authentication::{ ConnectorAuthentication, ConnectorPostAuthentication, ConnectorPreAuthentication, ConnectorPreAuthenticationVersionCall, ExternalAuthentication, }, authentication_v2::{ ConnectorAuthenticationV2, ConnectorPostAuthenticationV2, ConnectorPreAuthenticationV2, ConnectorPreAuthenticationVersionCallV2, ExternalAuthenticationV2, }, fraud_check::FraudCheck, revenue_recovery::{ BillingConnectorPaymentsSyncIntegration, RevenueRecovery, RevenueRecoveryRecordBack, }, revenue_recovery_v2::RevenueRecoveryV2, BoxedConnector, Connector, ConnectorAccessToken, ConnectorAccessTokenV2, ConnectorCommon, ConnectorCommonExt, ConnectorMandateRevoke, ConnectorMandateRevokeV2, ConnectorTransactionId, ConnectorVerifyWebhookSource, ConnectorVerifyWebhookSourceV2, CurrencyUnit, }, connector_integration_v2::{BoxedConnectorV2, ConnectorV2}, }; use crate::{ configs::settings::Connectors, connector, consts, core::{ errors::{self, CustomResult}, payments::types as payments_types, }, services::connector_integration_interface::ConnectorEnum, types::{self, api::enums as api_enums}, }; fn test_convert_connector_parsing_success() { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api.rs | crate: router .change_context(errors::ConnectorError::InvalidConnectorName) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable_lazy(|| format!("unable to parse connector name {name}"))?; Ok(Self { connector, connector_name, get_token: connector_type, merchant_connector_id: connector_id, }) } #[cfg(feature = "payouts")] pub fn get_payout_connector_by_name( _connectors: &Connectors, name: &str, connector_type: GetToken, connector_id: Option<common_utils::id_type::MerchantConnectorAccountId>, ) -> CustomResult<Self, errors::ApiErrorResponse> { let connector = Self::convert_connector(name)?; let payout_connector_name = api_enums::PayoutConnectors::from_str(name) .change_context(errors::ConnectorError::InvalidConnectorName) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable_lazy(|| format!("unable to parse payout connector name {name}"))?; let connector_name = api_enums::Connector::from(payout_connector_name); Ok(Self { pub fn get_payout_connector_by_name( _connectors: &Connectors, name: &str, connector_type: GetToken, connector_id: Option<common_utils::id_type::MerchantConnectorAccountId>, ) -> CustomResult<Self, errors::ApiErrorResponse> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
// file: hyperswitch/crates/router/src/types/api.rs | crate: router Self::PreDetermined(surcharge_details) => Some(surcharge_details.clone()), } } } pub enum ConnectorChoice { SessionMultiple(SessionConnectorDatas), StraightThrough(serde_json::Value), Decide, } impl ConnectorData { pub fn get_connector_by_name( _connectors: &Connectors, name: &str, connector_type: GetToken, connector_id: Option<common_utils::id_type::MerchantConnectorAccountId>, ) -> CustomResult<Self, errors::ApiErrorResponse> { let connector = Self::convert_connector(name)?; let connector_name = api_enums::Connector::from_str(name) .change_context(errors::ConnectorError::InvalidConnectorName) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable_lazy(|| format!("unable to parse connector name {name}"))?; Ok(Self { connector, pub fn get_connector_by_name( _connectors: &Connectors, name: &str, connector_type: GetToken, connector_id: Option<common_utils::id_type::MerchantConnectorAccountId>, ) -> CustomResult<Self, errors::ApiErrorResponse> { let connector = Self::convert_connector(name)?; let connector_name = api_enums::Connector::from_str(name) .change_context(errors::ConnectorError::InvalidConnectorName) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable_lazy(|| format!("unable to parse connector name {name}"))?; Ok(Self { connector, connector_name, get_token: connector_type, merchant_connector_id: connector_id, }) }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api.rs | crate: router } } /// Session Surcharge type pub enum SessionSurchargeDetails { /// Surcharge is calculated by hyperswitch Calculated(payments_types::SurchargeMetadata), /// Surcharge is sent by merchant PreDetermined(payments_types::SurchargeDetails), } impl SessionSurchargeDetails { pub fn fetch_surcharge_details( &self, payment_method: enums::PaymentMethod, payment_method_type: enums::PaymentMethodType, card_network: Option<&enums::CardNetwork>, ) -> Option<payments_types::SurchargeDetails> { match self { Self::Calculated(surcharge_metadata) => surcharge_metadata .get_surcharge_details(payments_types::SurchargeKey::PaymentMethodData( payment_method, payment_method_type, card_network.cloned(), )) pub fn fetch_surcharge_details( &self, payment_method: enums::PaymentMethod, payment_method_type: enums::PaymentMethodType, card_network: Option<&enums::CardNetwork>, ) -> Option<payments_types::SurchargeDetails> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api.rs | crate: router use api_models::routing::{self as api_routing, RoutableConnectorChoice}; use common_enums::RoutableConnectors; use crate::{ configs::settings::Connectors, connector, consts, core::{ errors::{self, CustomResult}, payments::types as payments_types, }, services::connector_integration_interface::ConnectorEnum, types::{self, api::enums as api_enums}, }; fn foreign_try_from(from: ConnectorData) -> Result<Self, Self::Error> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api.rs | crate: router && connector_data.connector.merchant_connector_id == routing_choice.connector.merchant_connector_id { final_list.push(connector_data); } } } Ok(final_list) } } ); pub fn convert_connector_data_to_routable_connectors( connectors: &[ConnectorData], ) -> CustomResult<Vec<RoutableConnectorChoice>, common_utils::errors::ValidationError> { connectors .iter() .map(|connector_data| RoutableConnectorChoice::foreign_try_from(connector_data.clone())) .collect() } impl ForeignTryFrom<ConnectorData> for RoutableConnectorChoice { type Error = error_stack::Report<common_utils::errors::ValidationError>; fn foreign_try_from(from: ConnectorData) -> Result<Self, Self::Error> { match RoutableConnectors::foreign_try_from(from.connector_name) { pub fn convert_connector_data_to_routable_connectors( connectors: &[ConnectorData], ) -> CustomResult<Vec<RoutableConnectorChoice>, common_utils::errors::ValidationError> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api.rs | crate: router pub merchant_connector_id: Option<common_utils::id_type::MerchantConnectorAccountId>, } #[derive(Clone, Debug)] pub struct SessionConnectorData { pub payment_method_sub_type: api_enums::PaymentMethodType, pub payment_method_type: api_enums::PaymentMethod, pub connector: ConnectorData, pub business_sub_label: Option<String>, } impl SessionConnectorData { pub fn new( payment_method_sub_type: api_enums::PaymentMethodType, connector: ConnectorData, business_sub_label: Option<String>, payment_method_type: api_enums::PaymentMethod, ) -> Self { Self { payment_method_sub_type, connector, business_sub_label, payment_method_type, } } pub fn new( payment_method_sub_type: api_enums::PaymentMethodType, connector: ConnectorData, business_sub_label: Option<String>, payment_method_type: api_enums::PaymentMethod, ) -> Self { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api.rs | crate: router .change_context(errors::ConnectorError::InvalidConnectorName) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable_lazy(|| format!("unable to parse payout connector name {name}"))?; let connector_name = api_enums::Connector::from(payout_connector_name); Ok(Self { connector, connector_name, get_token: connector_type, merchant_connector_id: connector_id, }) } pub fn convert_connector( connector_name: &str, ) -> CustomResult<ConnectorEnum, errors::ApiErrorResponse> { match enums::Connector::from_str(connector_name) { Ok(name) => match name { enums::Connector::Aci => Ok(ConnectorEnum::Old(Box::new(connector::Aci::new()))), enums::Connector::Adyen => { Ok(ConnectorEnum::Old(Box::new(connector::Adyen::new()))) } enums::Connector::Adyenplatform => Ok(ConnectorEnum::Old(Box::new( connector::Adyenplatform::new(), ))), enums::Connector::Airwallex => { pub fn convert_connector( connector_name: &str, ) -> CustomResult<ConnectorEnum, errors::ApiErrorResponse> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/pm_auth.rs | crate: router use std::str::FromStr; use pm_auth::{ connector::plaid, types::{ self as pm_auth_types, api::{BoxedPaymentAuthConnector, PaymentAuthConnectorData}, }, }; use crate::core::{ errors::{self, ApiErrorResponse}, pm_auth::helpers::PaymentAuthConnectorDataExt, }; fn get_connector_by_name(name: &str) -> errors::CustomResult<Self, ApiErrorResponse> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/pm_auth.rs | crate: router use pm_auth::{ connector::plaid, types::{ self as pm_auth_types, api::{BoxedPaymentAuthConnector, PaymentAuthConnectorData}, }, }; use crate::core::{ errors::{self, ApiErrorResponse}, pm_auth::helpers::PaymentAuthConnectorDataExt, }; fn convert_connector( connector_name: pm_auth_types::PaymentMethodAuthConnectors, ) -> errors::CustomResult<BoxedPaymentAuthConnector, ApiErrorResponse> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
// file: hyperswitch/crates/router/src/types/pm_auth.rs | crate: router use std::str::FromStr; use pm_auth::{ connector::plaid, types::{ self as pm_auth_types, api::{BoxedPaymentAuthConnector, PaymentAuthConnectorData}, }, }; use crate::core::{ errors::{self, ApiErrorResponse}, pm_auth::helpers::PaymentAuthConnectorDataExt, }; fn get_connector_by_name(name: &str) -> errors::CustomResult<Self, ApiErrorResponse> { let connector_name = pm_auth_types::PaymentMethodAuthConnectors::from_str(name) .change_context(ApiErrorResponse::IncorrectConnectorNameGiven) .attach_printable_lazy(|| { format!("unable to parse connector: {:?}", name.to_string()) })?; let connector = Self::convert_connector(connector_name.clone())?; Ok(Self { connector, connector_name, }) }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/storage/dispute.rs | crate: router use common_utils::errors::CustomResult; use diesel::{associations::HasTable, BoolExpressionMethods, ExpressionMethods, QueryDsl}; use diesel_models::{errors, query::generics::db_metrics, schema::dispute::dsl}; use crate::{connection::PgPooledConn, logger}; async fn get_dispute_status_with_count( conn: &PgPooledConn, merchant_id: &common_utils::id_type::MerchantId, profile_id_list: Option<Vec<common_utils::id_type::ProfileId>>, time_range: &common_utils::types::TimeRange, ) -> CustomResult<Vec<(common_enums::DisputeStatus, i64)>, errors::DatabaseError> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/storage/dispute.rs | crate: router use common_utils::errors::CustomResult; use diesel::{associations::HasTable, BoolExpressionMethods, ExpressionMethods, QueryDsl}; use diesel_models::{errors, query::generics::db_metrics, schema::dispute::dsl}; use hyperswitch_domain_models::disputes; use crate::{connection::PgPooledConn, logger}; async fn filter_by_constraints( conn: &PgPooledConn, merchant_id: &common_utils::id_type::MerchantId, dispute_list_constraints: &disputes::DisputeListConstraints, ) -> CustomResult<Vec<Self>, errors::DatabaseError> { {let mut filter = <Self as HasTable>::table() .filter(dsl::merchant_id.eq(merchant_id.to_owned())) .order(dsl::modified_at.desc()) .into_boxed();<|fim_suffix|> <|fim_middle|> db_metrics::track_database_call::<<Self as HasTable>::Table, _, _>( filter.get_results_async(conn), db_metrics::DatabaseOperation::Filter, ) .await .change_context(errors::DatabaseError::NotFound) .attach_printable_lazy(|| "Error filtering records by predicate")}}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/storage/dispute.rs | crate: router use common_utils::errors::CustomResult; use diesel::{associations::HasTable, BoolExpressionMethods, ExpressionMethods, QueryDsl}; use diesel_models::{errors, query::generics::db_metrics, schema::dispute::dsl}; use hyperswitch_domain_models::disputes; use crate::{connection::PgPooledConn, logger}; async fn filter_by_constraints( conn: &PgPooledConn, merchant_id: &common_utils::id_type::MerchantId, dispute_list_constraints: &disputes::DisputeListConstraints, ) -> CustomResult<Vec<Self>, errors::DatabaseError> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/storage/payment_method.rs | crate: router pub use diesel_models::payment_method::{ PaymentMethod, PaymentMethodNew, PaymentMethodUpdate, PaymentMethodUpdateInternal, TokenizeCoreWorkflow, }; pub fn temporary_generic(token: String) -> Self { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/storage/payment_method.rs | crate: router pub use diesel_models::payment_method::{ PaymentMethod, PaymentMethodNew, PaymentMethodUpdate, PaymentMethodUpdateInternal, TokenizeCoreWorkflow, }; use crate::types::{api, domain}; pub(crate) fn get_token_data(&self) -> Option<PaymentTokenData> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/storage/payment_method.rs | crate: router pub use diesel_models::payment_method::{ PaymentMethod, PaymentMethodNew, PaymentMethodUpdate, PaymentMethodUpdateInternal, TokenizeCoreWorkflow, }; pub fn is_permanent_card(&self) -> bool { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/storage/payment_method.rs | crate: router pub use diesel_models::payment_method::{ PaymentMethod, PaymentMethodNew, PaymentMethodUpdate, PaymentMethodUpdateInternal, TokenizeCoreWorkflow, }; pub fn wallet_token(payment_method_id: String) -> Self { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
// file: hyperswitch/crates/router/src/types/storage/payment_method.rs | crate: router pub use diesel_models::payment_method::{ PaymentMethod, PaymentMethodNew, PaymentMethodUpdate, PaymentMethodUpdateInternal, TokenizeCoreWorkflow, }; pub fn temporary_generic(token: String) -> Self { Self::TemporaryGeneric(GenericTokenData { token }) }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/storage/payment_method.rs | crate: router pub use diesel_models::payment_method::{ PaymentMethod, PaymentMethodNew, PaymentMethodUpdate, PaymentMethodUpdateInternal, TokenizeCoreWorkflow, }; pub fn permanent_card( payment_method_id: Option<common_utils::id_type::GlobalPaymentMethodId>, locker_id: Option<String>, token: String, ) -> Self { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/storage/payment_method.rs | crate: router pub use diesel_models::payment_method::{ PaymentMethod, PaymentMethodNew, PaymentMethodUpdate, PaymentMethodUpdateInternal, TokenizeCoreWorkflow, }; pub fn permanent_card( payment_method_id: Option<String>, locker_id: Option<String>, token: String, network_token_locker_id: Option<String>, ) -> Self { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/storage/refund.rs | crate: router use common_utils::errors::CustomResult; use diesel::{associations::HasTable, BoolExpressionMethods, ExpressionMethods, QueryDsl}; use diesel_models::{ enums::{Currency, RefundStatus}, errors, query::generics::db_metrics, schema::refund::dsl, }; use hyperswitch_domain_models::refunds; use crate::{connection::PgPooledConn, logger}; async fn get_refund_status_with_count( conn: &PgPooledConn, merchant_id: &common_utils::id_type::MerchantId, profile_id_list: Option<Vec<common_utils::id_type::ProfileId>>, time_range: &common_utils::types::TimeRange, ) -> CustomResult<Vec<(RefundStatus, i64)>, errors::DatabaseError> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/storage/refund.rs | crate: router use api_models::payments::AmountFilter; use common_utils::errors::CustomResult; use diesel::{associations::HasTable, BoolExpressionMethods, ExpressionMethods, QueryDsl}; pub use diesel_models::refund::{ Refund, RefundCoreWorkflow, RefundNew, RefundUpdate, RefundUpdateInternal, }; use diesel_models::{ enums::{Currency, RefundStatus}, errors, query::generics::db_metrics, schema::refund::dsl, }; use hyperswitch_domain_models::refunds; use crate::{connection::PgPooledConn, logger}; async fn filter_by_meta_constraints( conn: &PgPooledConn, merchant_id: &common_utils::id_type::MerchantId, refund_list_details: &common_utils::types::TimeRange, ) -> CustomResult<api_models::refunds::RefundListMetaData, errors::DatabaseError> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/storage/refund.rs | crate: router use common_utils::errors::CustomResult; use diesel::{associations::HasTable, BoolExpressionMethods, ExpressionMethods, QueryDsl}; use diesel_models::{ enums::{Currency, RefundStatus}, errors, query::generics::db_metrics, schema::refund::dsl, }; use hyperswitch_domain_models::refunds; use crate::{connection::PgPooledConn, logger}; async fn get_refund_status_with_count( conn: &PgPooledConn, merchant_id: &common_utils::id_type::MerchantId, profile_id_list: Option<Vec<common_utils::id_type::ProfileId>>, time_range: &common_utils::types::TimeRange, ) -> CustomResult<Vec<(RefundStatus, i64)>, errors::DatabaseError> { { Some(ending_at) => query.filter(dsl::created_at.le(ending_at)),<|fim_suffix|> <|fim_middle|> None => query, } }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/storage/refund.rs | crate: router use api_models::payments::AmountFilter; use common_utils::errors::CustomResult; use diesel::{associations::HasTable, BoolExpressionMethods, ExpressionMethods, QueryDsl}; use diesel_models::{ enums::{Currency, RefundStatus}, errors, query::generics::db_metrics, schema::refund::dsl, }; use hyperswitch_domain_models::refunds; use crate::{connection::PgPooledConn, logger}; async fn filter_by_constraints( conn: &PgPooledConn, merchant_id: &common_utils::id_type::MerchantId, refund_list_details: &refunds::RefundListConstraints, limit: i64, offset: i64, ) -> CustomResult<Vec<Self>, errors::DatabaseError> { { Some(pid) => { filter = filter.filter(dsl::payment_id.eq(pid.to_owned())); }<|fim_suffix|> <|fim_middle|> None => { filter = filter.limit(limit).offset(offset); } } }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/storage/refund.rs | crate: router use api_models::payments::AmountFilter; use common_utils::errors::CustomResult; use diesel::{associations::HasTable, BoolExpressionMethods, ExpressionMethods, QueryDsl}; use diesel_models::{ enums::{Currency, RefundStatus}, errors, query::generics::db_metrics, schema::refund::dsl, }; use hyperswitch_domain_models::refunds; use crate::{connection::PgPooledConn, logger}; async fn get_refunds_count( conn: &PgPooledConn, merchant_id: &common_utils::id_type::MerchantId, refund_list_details: &refunds::RefundListConstraints, ) -> CustomResult<i64, errors::DatabaseError> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/storage/refund.rs | crate: router use api_models::payments::AmountFilter; use common_utils::errors::CustomResult; use diesel::{associations::HasTable, BoolExpressionMethods, ExpressionMethods, QueryDsl}; use diesel_models::{ enums::{Currency, RefundStatus}, errors, query::generics::db_metrics, schema::refund::dsl, }; use hyperswitch_domain_models::refunds; use crate::{connection::PgPooledConn, logger}; async fn filter_by_constraints( conn: &PgPooledConn, merchant_id: &common_utils::id_type::MerchantId, refund_list_details: &refunds::RefundListConstraints, limit: i64, offset: i64, ) -> CustomResult<Vec<Self>, errors::DatabaseError> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api/refunds.rs | crate: router pub use api_models::refunds::{ RefundRequest, RefundResponse, RefundStatus, RefundType, RefundUpdateRequest, RefundsRetrieveRequest, }; use crate::types::{storage::enums as storage_enums, transformers::ForeignFrom}; fn foreign_from(status: storage_enums::RefundStatus) -> Self { { storage_enums::RefundStatus::Failure | storage_enums::RefundStatus::TransactionFailure => Self::Failed,<|fim_suffix|> <|fim_middle|> storage_enums::RefundStatus::Success => Self::Succeeded, } }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api/refunds.rs | crate: router pub use api_models::refunds::{ RefundRequest, RefundResponse, RefundStatus, RefundType, RefundUpdateRequest, RefundsRetrieveRequest, }; use crate::types::{storage::enums as storage_enums, transformers::ForeignFrom}; fn foreign_from(status: storage_enums::RefundStatus) -> Self { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api/payments.rs | crate: router .attach_printable("Expected payment intent ID but got connector transaction ID"), } } } pub(crate) trait MandateValidationFieldsExt { fn validate_and_get_mandate_type( &self, ) -> errors::CustomResult<Option<MandateTransactionType>, errors::ValidationError>; } impl MandateValidationFieldsExt for MandateValidationFields { fn validate_and_get_mandate_type( &self, ) -> errors::CustomResult<Option<MandateTransactionType>, errors::ValidationError> { match (&self.mandate_data, &self.recurring_details) { (None, None) => Ok(None), (Some(_), Some(_)) => Err(errors::ValidationError::InvalidValue { message: "Expected one out of recurring_details and mandate_data but got both" .to_string(), } .into()), (_, Some(_)) => Ok(Some(MandateTransactionType::RecurringMandateTransaction)), (Some(_), _) => Ok(Some(MandateTransactionType::NewMandateTransaction)), } fn validate_and_get_mandate_type( &self, ) -> errors::CustomResult<Option<MandateTransactionType>, errors::ValidationError> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api/payments.rs | crate: router pub use api_models::{ feature_matrix::{ ConnectorFeatureMatrixResponse, FeatureMatrixListResponse, FeatureMatrixRequest, }, payments::{ AcceptanceType, Address, AddressDetails, Amount, AuthenticationForStartResponse, Card, CryptoData, CustomerAcceptance, CustomerDetails, CustomerDetailsResponse, MandateAmountData, MandateData, MandateTransactionType, MandateType, MandateValidationFields, NextActionType, OnlineMandate, OpenBankingSessionToken, PayLaterData, PaymentIdType, PaymentListConstraints, PaymentListFilters, PaymentListFiltersV2, PaymentMethodData, PaymentMethodDataRequest, PaymentMethodDataResponse, PaymentOp, PaymentRetrieveBody, PaymentRetrieveBodyWithCredentials, PaymentsAggregateResponse, PaymentsApproveRequest, PaymentsCancelRequest, PaymentsCaptureRequest, PaymentsCompleteAuthorizeRequest, PaymentsDynamicTaxCalculationRequest, PaymentsDynamicTaxCalculationResponse, PaymentsExternalAuthenticationRequest, PaymentsIncrementalAuthorizationRequest, PaymentsManualUpdateRequest, PaymentsPostSessionTokensRequest, PaymentsPostSessionTokensResponse, PaymentsRedirectRequest, PaymentsRedirectionResponse, PaymentsRejectRequest, PaymentsRequest, PaymentsResponse, PaymentsResponseForm, PaymentsRetrieveRequest, PaymentsSessionRequest, PaymentsSessionResponse, PaymentsStartRequest, PgRedirectResponse, PhoneDetails, RedirectionResponse, SessionToken, UrlDetails, VerifyRequest, VerifyResponse, WalletData, }, }; fn test_connector_id_type() { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api/payments.rs | crate: router PaymentsRequest { amount: Some(Amount::from(common_utils::types::MinorUnit::new(200))), payment_method_data: Some(PaymentMethodDataRequest { payment_method_data: Some(PaymentMethodData::Card(card())), billing: None, }), ..PaymentsRequest::default() } } //#[test] // FIXME: Fix test #[allow(dead_code)] fn verify_payments_request() { let pay_req = payments_request(); let serialized = serde_json::to_string(&pay_req).expect("error serializing payments request"); let _deserialized_pay_req: PaymentsRequest = serde_json::from_str(&serialized).expect("error de-serializing payments response"); //assert_eq!(pay_req, deserialized_pay_req) } // Intended to test the serialization and deserialization of the enum PaymentIdType #[test] fn test_connector_id_type() { let sample_1 = PaymentIdType::PaymentIntentId( fn verify_payments_request() { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api/payments.rs | crate: router pub use api_models::{ feature_matrix::{ ConnectorFeatureMatrixResponse, FeatureMatrixListResponse, FeatureMatrixRequest, }, payments::{ AcceptanceType, Address, AddressDetails, Amount, AuthenticationForStartResponse, Card, CryptoData, CustomerAcceptance, CustomerDetails, CustomerDetailsResponse, MandateAmountData, MandateData, MandateTransactionType, MandateType, MandateValidationFields, NextActionType, OnlineMandate, OpenBankingSessionToken, PayLaterData, PaymentIdType, PaymentListConstraints, PaymentListFilters, PaymentListFiltersV2, PaymentMethodData, PaymentMethodDataRequest, PaymentMethodDataResponse, PaymentOp, PaymentRetrieveBody, PaymentRetrieveBodyWithCredentials, PaymentsAggregateResponse, PaymentsApproveRequest, PaymentsCancelRequest, PaymentsCaptureRequest, PaymentsCompleteAuthorizeRequest, PaymentsDynamicTaxCalculationRequest, PaymentsDynamicTaxCalculationResponse, PaymentsExternalAuthenticationRequest, PaymentsIncrementalAuthorizationRequest, PaymentsManualUpdateRequest, PaymentsPostSessionTokensRequest, PaymentsPostSessionTokensResponse, PaymentsRedirectRequest, PaymentsRedirectionResponse, PaymentsRejectRequest, PaymentsRequest, PaymentsResponse, PaymentsResponseForm, PaymentsRetrieveRequest, PaymentsSessionRequest, PaymentsSessionResponse, PaymentsStartRequest, PgRedirectResponse, PhoneDetails, RedirectionResponse, SessionToken, UrlDetails, VerifyRequest, VerifyResponse, WalletData, }, }; fn payments_request() -> PaymentsRequest { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api/payments.rs | crate: router pub use api_models::payments::{ PaymentListFilterConstraints, PaymentListResponse, PaymentListResponseV2, }; pub use api_models::payments::{ PaymentsConfirmIntentRequest, PaymentsCreateIntentRequest, PaymentsIntentResponse, PaymentsUpdateIntentRequest, }; pub use api_models::{ feature_matrix::{ ConnectorFeatureMatrixResponse, FeatureMatrixListResponse, FeatureMatrixRequest, }, payments::{ AcceptanceType, Address, AddressDetails, Amount, AuthenticationForStartResponse, Card, CryptoData, CustomerAcceptance, CustomerDetails, CustomerDetailsResponse, MandateAmountData, MandateData, MandateTransactionType, MandateType, MandateValidationFields, NextActionType, OnlineMandate, OpenBankingSessionToken, PayLaterData, PaymentIdType, PaymentListConstraints, PaymentListFilters, PaymentListFiltersV2, PaymentMethodData, PaymentMethodDataRequest, PaymentMethodDataResponse, PaymentOp, PaymentRetrieveBody, PaymentRetrieveBodyWithCredentials, PaymentsAggregateResponse, PaymentsApproveRequest, PaymentsCancelRequest, PaymentsCaptureRequest, PaymentsCompleteAuthorizeRequest, PaymentsDynamicTaxCalculationRequest, PaymentsDynamicTaxCalculationResponse, PaymentsExternalAuthenticationRequest, PaymentsIncrementalAuthorizationRequest, PaymentsManualUpdateRequest, PaymentsPostSessionTokensRequest, PaymentsPostSessionTokensResponse, PaymentsRedirectRequest, PaymentsRedirectionResponse, PaymentsRejectRequest, PaymentsRequest, PaymentsResponse, PaymentsResponseForm, PaymentsRetrieveRequest, PaymentsSessionRequest, PaymentsSessionResponse, PaymentsStartRequest, PgRedirectResponse, PhoneDetails, RedirectionResponse, SessionToken, UrlDetails, VerifyRequest, VerifyResponse, WalletData, }, }; fn card() -> Card { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
// file: hyperswitch/crates/router/src/types/api/payments.rs | crate: router pub use api_models::{ feature_matrix::{ ConnectorFeatureMatrixResponse, FeatureMatrixListResponse, FeatureMatrixRequest, }, payments::{ AcceptanceType, Address, AddressDetails, Amount, AuthenticationForStartResponse, Card, CryptoData, CustomerAcceptance, CustomerDetails, CustomerDetailsResponse, MandateAmountData, MandateData, MandateTransactionType, MandateType, MandateValidationFields, NextActionType, OnlineMandate, OpenBankingSessionToken, PayLaterData, PaymentIdType, PaymentListConstraints, PaymentListFilters, PaymentListFiltersV2, PaymentMethodData, PaymentMethodDataRequest, PaymentMethodDataResponse, PaymentOp, PaymentRetrieveBody, PaymentRetrieveBodyWithCredentials, PaymentsAggregateResponse, PaymentsApproveRequest, PaymentsCancelRequest, PaymentsCaptureRequest, PaymentsCompleteAuthorizeRequest, PaymentsDynamicTaxCalculationRequest, PaymentsDynamicTaxCalculationResponse, PaymentsExternalAuthenticationRequest, PaymentsIncrementalAuthorizationRequest, PaymentsManualUpdateRequest, PaymentsPostSessionTokensRequest, PaymentsPostSessionTokensResponse, PaymentsRedirectRequest, PaymentsRedirectionResponse, PaymentsRejectRequest, PaymentsRequest, PaymentsResponse, PaymentsResponseForm, PaymentsRetrieveRequest, PaymentsSessionRequest, PaymentsSessionResponse, PaymentsStartRequest, PgRedirectResponse, PhoneDetails, RedirectionResponse, SessionToken, UrlDetails, VerifyRequest, VerifyResponse, WalletData, }, }; use crate::core::errors; fn validate_and_get_mandate_type( &self, ) -> errors::CustomResult<Option<MandateTransactionType>, errors::ValidationError> { match (&self.mandate_data, &self.recurring_details) { (None, None) => Ok(None), (Some(_), Some(_)) => Err(errors::ValidationError::InvalidValue { message: "Expected one out of recurring_details and mandate_data but got both" .to_string(), } .into()), (_, Some(_)) => Ok(Some(MandateTransactionType::RecurringMandateTransaction)), (Some(_), _) => Ok(Some(MandateTransactionType::NewMandateTransaction)), } }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api/payments.rs | crate: router use crate::core::errors; fn get_payment_intent_id( &self, ) -> errors::CustomResult<common_utils::id_type::GlobalPaymentId, errors::ValidationError> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api/payments.rs | crate: router use crate::core::errors; fn get_payment_intent_id( &self, ) -> errors::CustomResult<common_utils::id_type::PaymentId, errors::ValidationError> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api/files.rs | crate: router use crate::{ core::errors, types::{self, transformers::ForeignTryFrom}, }; fn foreign_try_from(item: &types::Connector) -> Result<Self, Self::Error> { { types::Connector::Stripe => Ok(Self::Stripe),<|fim_suffix|> <|fim_middle|> _ => Err(errors::ApiErrorResponse::NotSupported { message: "Connector not supported as file provider".to_owned(), } .into()), } }
ast_fragments
// file: hyperswitch/crates/router/src/types/api/files.rs | crate: router use crate::{ core::errors, types::{self, transformers::ForeignTryFrom}, }; fn foreign_try_from(item: &types::Connector) -> Result<Self, Self::Error> { match *item { types::Connector::Stripe => Ok(Self::Stripe), types::Connector::Checkout => Ok(Self::Checkout), _ => Err(errors::ApiErrorResponse::NotSupported { message: "Connector not supported as file provider".to_owned(), } .into()), } }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api/files.rs | crate: router use api_models::enums::FileUploadProvider; use crate::{ core::errors, types::{self, transformers::ForeignTryFrom}, }; fn foreign_try_from(item: FileUploadProvider) -> Result<Self, Self::Error> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api/verify_connector.rs | crate: router use crate::{ consts, core::errors, services::{ self, connector_integration_interface::{BoxedConnectorIntegrationInterface, ConnectorEnum}, }, types::{self, api, api::ConnectorCommon, domain, storage::enums as storage_enums}, SessionState, }; async fn verify( state: &SessionState, connector_data: VerifyConnectorData, ) -> errors::RouterResponse<()> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api/verify_connector.rs | crate: router use crate::{ consts, core::errors, services::{ self, connector_integration_interface::{BoxedConnectorIntegrationInterface, ConnectorEnum}, }, types::{self, api, api::ConnectorCommon, domain, storage::enums as storage_enums}, SessionState, }; fn get_router_data<F, R1, R2>( &self, state: &SessionState, request_data: R1, access_token: Option<types::AccessToken>, ) -> types::RouterData<F, R1, R2> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
// file: hyperswitch/crates/router/src/types/api/verify_connector.rs | crate: router use crate::{ consts, core::errors, services::{ self, connector_integration_interface::{BoxedConnectorIntegrationInterface, ConnectorEnum}, }, types::{self, api, api::ConnectorCommon, domain, storage::enums as storage_enums}, SessionState, }; fn get_payment_authorize_data(&self) -> types::PaymentsAuthorizeData { types::PaymentsAuthorizeData { payment_method_data: domain::PaymentMethodData::Card(self.card_details.clone()), email: None, customer_name: None, amount: 1000, minor_amount: common_utils::types::MinorUnit::new(1000), confirm: true, order_tax_amount: None, currency: storage_enums::Currency::USD, metadata: None, mandate_id: None, webhook_url: None, customer_id: None, off_session: None, browser_info: None, session_token: None, order_details: None, order_category: None, capture_method: None, enrolled_for_3ds: false, router_return_url: None, surcharge_details: None, setup_future_usage: None, payment_experience: None, payment_method_type: None, statement_descriptor: None, setup_mandate_details: None, complete_authorize_url: None, related_transaction_id: None, statement_descriptor_suffix: None, request_extended_authorization: None, request_incremental_authorization: false, authentication_data: None, customer_acceptance: None, split_payments: None, merchant_order_reference_id: None, integrity_object: None, additional_payment_method_data: None, shipping_cost: None, merchant_account_id: None, merchant_config_currency: None, } }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api/verify_connector.rs | crate: router use crate::{ consts, core::errors, services::{ self, connector_integration_interface::{BoxedConnectorIntegrationInterface, ConnectorEnum}, }, types::{self, api, api::ConnectorCommon, domain, storage::enums as storage_enums}, SessionState, }; fn get_payment_authorize_data(&self) -> types::PaymentsAuthorizeData { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api/verify_connector.rs | crate: router use crate::{ consts, core::errors, services::{ self, connector_integration_interface::{BoxedConnectorIntegrationInterface, ConnectorEnum}, }, types::{self, api, api::ConnectorCommon, domain, storage::enums as storage_enums}, SessionState, }; async fn handle_access_token_error_response<F, ResourceCommonData, Req, Resp>( connector: BoxedConnectorIntegrationInterface<F, ResourceCommonData, Req, Resp>, error_response: types::Response, ) -> errors::RouterResult<Option<types::AccessToken>> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api/verify_connector.rs | crate: router use crate::{ consts, core::errors, services::{ self, connector_integration_interface::{BoxedConnectorIntegrationInterface, ConnectorEnum}, }, types::{self, api, api::ConnectorCommon, domain, storage::enums as storage_enums}, SessionState, }; async fn handle_payment_error_response<F, ResourceCommonData, Req, Resp>( // connector: &(dyn api::Connector + Sync), connector: BoxedConnectorIntegrationInterface<F, ResourceCommonData, Req, Resp>, error_response: types::Response, ) -> errors::RouterResponse<()> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api/verify_connector.rs | crate: router use crate::{ consts, core::errors, services::{ self, connector_integration_interface::{BoxedConnectorIntegrationInterface, ConnectorEnum}, }, types::{self, api, api::ConnectorCommon, domain, storage::enums as storage_enums}, SessionState, }; async fn get_access_token( _state: &SessionState, _connector_data: VerifyConnectorData, ) -> errors::CustomResult<Option<types::AccessToken>, errors::ApiErrorResponse> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api/authentication.rs | crate: router use api_models::enums; use common_utils::errors::CustomResult; use crate::{ connector, core::errors, services::connector_integration_interface::ConnectorEnum, types::storage, }; fn convert_connector( connector_name: enums::AuthenticationConnectors, ) -> CustomResult<ConnectorEnum, errors::ApiErrorResponse> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api/authentication.rs | crate: router use api_models::enums; use common_utils::errors::CustomResult; use crate::{ connector, core::errors, services::connector_integration_interface::ConnectorEnum, types::storage, }; fn convert_connector( connector_name: enums::AuthenticationConnectors, ) -> CustomResult<ConnectorEnum, errors::ApiErrorResponse> { { enums::AuthenticationConnectors::Threedsecureio => { Ok(ConnectorEnum::Old(Box::new(&connector::Threedsecureio))) }<|fim_suffix|> <|fim_middle|> enums::AuthenticationConnectors::Juspaythreedsserver => Ok(ConnectorEnum::Old( Box::new(connector::Juspaythreedsserver::new()), )), } }
ast_fragments
// file: hyperswitch/crates/router/src/types/api/authentication.rs | crate: router use std::str::FromStr; use api_models::enums; use common_utils::errors::CustomResult; pub use hyperswitch_domain_models::{ router_flow_types::authentication::{ Authentication, PostAuthentication, PreAuthentication, PreAuthenticationVersionCall, }, router_request_types::authentication::MessageCategory, }; use crate::{ connector, core::errors, services::connector_integration_interface::ConnectorEnum, types::storage, }; pub fn get_connector_by_name(name: &str) -> CustomResult<Self, errors::ApiErrorResponse> { let connector_name = enums::AuthenticationConnectors::from_str(name) .change_context(errors::ApiErrorResponse::IncorrectConnectorNameGiven) .attach_printable_lazy(|| format!("unable to parse connector: {name}"))?; let connector = Self::convert_connector(connector_name)?; Ok(Self { connector, connector_name, }) }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api/authentication.rs | crate: router use common_utils::errors::CustomResult; pub use hyperswitch_domain_models::{ router_flow_types::authentication::{ Authentication, PostAuthentication, PreAuthentication, PreAuthenticationVersionCall, }, router_request_types::authentication::MessageCategory, }; use crate::{ connector, core::errors, services::connector_integration_interface::ConnectorEnum, types::storage, }; fn try_from(authentication: storage::Authentication) -> Result<Self, Self::Error> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
// file: hyperswitch/crates/router/src/types/api/verify_connector/paypal.rs | crate: router use super::{VerifyConnector, VerifyConnectorData}; use crate::{ connector, core::errors, routes::SessionState, services, types::{self, api}, }; async fn get_access_token( state: &SessionState, connector_data: VerifyConnectorData, ) -> errors::CustomResult<Option<types::AccessToken>, errors::ApiErrorResponse> { let token_data: types::AccessTokenRequestData = connector_data.connector_auth.clone().try_into()?; let router_data = connector_data.get_router_data(state, token_data, None); let request = connector_data .connector .get_connector_integration() .build_request(&router_data, &state.conf.connectors) .change_context(errors::ApiErrorResponse::InvalidRequestData { message: "Payment request cannot be built".to_string(), })? .ok_or(errors::ApiErrorResponse::InternalServerError)?; let response = services::call_connector_api(&state.to_owned(), request, "get_access_token") .await .change_context(errors::ApiErrorResponse::InternalServerError)?; match response { Ok(res) => Some( connector_data .connector .get_connector_integration() .handle_response(&router_data, None, res) .change_context(errors::ApiErrorResponse::InternalServerError)? .response .map_err(|_| errors::ApiErrorResponse::InternalServerError.into()), ) .transpose(), Err(response_data) => { Self::handle_access_token_error_response::< api::AccessTokenAuth, types::AccessTokenFlowData, types::AccessTokenRequestData, types::AccessToken, >( connector_data.connector.get_connector_integration(), response_data, ) .await } } }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api/verify_connector/paypal.rs | crate: router use super::{VerifyConnector, VerifyConnectorData}; use crate::{ connector, core::errors, routes::SessionState, services, types::{self, api}, }; async fn get_access_token( state: &SessionState, connector_data: VerifyConnectorData, ) -> errors::CustomResult<Option<types::AccessToken>, errors::ApiErrorResponse> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api/verify_connector/stripe.rs | crate: router use router_env::env; use crate::{ connector, core::errors, services, types, types::api::verify_connector::BoxedConnectorIntegrationInterface, }; async fn handle_payment_error_response<F, ResourceCommonData, Req, Resp>( connector: BoxedConnectorIntegrationInterface<F, ResourceCommonData, Req, Resp>, error_response: types::Response, ) -> errors::RouterResponse<()> { { (env::Env::Production, "card_declined") => Ok(services::ApplicationResponse::StatusOk),<|fim_suffix|> <|fim_middle|> _ => Err(errors::ApiErrorResponse::InvalidRequestData { message: error.reason.unwrap_or(error.message), } .into()), } }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/api/verify_connector/stripe.rs | crate: router use router_env::env; use crate::{ connector, core::errors, services, types, types::api::verify_connector::BoxedConnectorIntegrationInterface, }; async fn handle_payment_error_response<F, ResourceCommonData, Req, Resp>( connector: BoxedConnectorIntegrationInterface<F, ResourceCommonData, Req, Resp>, error_response: types::Response, ) -> errors::RouterResponse<()> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/event.rs | crate: router use common_utils::{ crypto::{Encryptable, OptionalEncryptableSecretString}, encryption::Encryption, type_name, types::keymanager::{KeyManagerState, ToEncryptable}, }; use masking::{PeekInterface, Secret}; use crate::{ errors::{CustomResult, ValidationError}, types::domain::types, }; async fn convert_back( state: &KeyManagerState, item: Self::DstType, key: &Secret<Vec<u8>>, key_manager_identifier: common_utils::types::keymanager::Identifier, ) -> CustomResult<Self, ValidationError> where Self: Sized, { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/event.rs | crate: router fn from(event_update: EventUpdate) -> Self { { EventUpdate::UpdateResponse { is_webhook_notified, response, } => Self { is_webhook_notified: Some(is_webhook_notified), response: response.map(Into::into), is_overall_delivery_successful: None, },<|fim_suffix|> <|fim_middle|> EventUpdate::OverallDeliveryStatusUpdate { is_overall_delivery_successful, } => Self { is_webhook_notified: None, response: None, is_overall_delivery_successful: Some(is_overall_delivery_successful), }, } }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/event.rs | crate: router fn from(event_update: EventUpdate) -> Self { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use common_utils::{ crypto::Encryptable, id_type, new_type::MerchantName, pii, type_name, types::keymanager::Identifier, }; use diesel_models::{ enums::{TotpStatus, UserRoleVersion, UserStatus}, organization::{self as diesel_org, Organization, OrganizationBridge}, user as storage_user, user_role::{UserRole, UserRoleNew}, }; use masking::{ExposeInterface, PeekInterface, Secret}; use crate::{ consts, core::{ admin, errors::{UserErrors, UserResult}, }, db::GlobalStorageInterface, routes::SessionState, services::{self, authentication::UserFromToken}, types::{domain, transformers::ForeignFrom}, utils::user::password, }; pub use decision_manager::*; use super::{types as domain_types, UserKeyStore}; pub async fn decrypt_and_get_totp_secret( &self, state: &SessionState, ) -> UserResult<Option<Secret<String>>> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use common_utils::{ crypto::Encryptable, id_type, new_type::MerchantName, pii, type_name, types::keymanager::Identifier, }; use diesel_models::{ enums::{TotpStatus, UserRoleVersion, UserStatus}, organization::{self as diesel_org, Organization, OrganizationBridge}, user as storage_user, user_role::{UserRole, UserRoleNew}, }; use {base64::Engine, common_utils::types::keymanager::EncryptionTransferRequest}; use crate::{ consts, core::{ admin, errors::{UserErrors, UserResult}, }, db::GlobalStorageInterface, routes::SessionState, services::{self, authentication::UserFromToken}, types::{domain, transformers::ForeignFrom}, utils::user::password, }; pub use decision_manager::*; use super::{types as domain_types, UserKeyStore}; pub async fn get_or_create_key_store(&self, state: &SessionState) -> UserResult<UserKeyStore> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use api_models::{ admin as admin_api, organization as api_org, user as user_api, user_role as user_role_api, }; use diesel_models::{ enums::{TotpStatus, UserRoleVersion, UserStatus}, organization::{self as diesel_org, Organization, OrganizationBridge}, user as storage_user, user_role::{UserRole, UserRoleNew}, }; use hyperswitch_domain_models::api::ApplicationResponse; use crate::{ consts, core::{ admin, errors::{UserErrors, UserResult}, }, db::GlobalStorageInterface, routes::SessionState, services::{self, authentication::UserFromToken}, types::{domain, transformers::ForeignFrom}, utils::user::password, }; pub use decision_manager::*; pub async fn create_new_merchant_and_insert_in_db( &self, state: SessionState, ) -> UserResult<domain::MerchantAccount> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use api_models::{ admin as admin_api, organization as api_org, user as user_api, user_role as user_role_api, }; use diesel_models::{ enums::{TotpStatus, UserRoleVersion, UserStatus}, organization::{self as diesel_org, Organization, OrganizationBridge}, user as storage_user, user_role::{UserRole, UserRoleNew}, }; use masking::{ExposeInterface, PeekInterface, Secret}; use crate::{ consts, core::{ admin, errors::{UserErrors, UserResult}, }, db::GlobalStorageInterface, routes::SessionState, services::{self, authentication::UserFromToken}, types::{domain, transformers::ForeignFrom}, utils::user::password, }; pub use decision_manager::*; pub fn new(password: Secret<String>) -> UserResult<Self> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use diesel_models::{ enums::{TotpStatus, UserRoleVersion, UserStatus}, organization::{self as diesel_org, Organization, OrganizationBridge}, user as storage_user, user_role::{UserRole, UserRoleNew}, }; fn foreign_from(value: UserStatus) -> Self { { UserStatus::Active => Self::Active,<|fim_suffix|> <|fim_middle|> UserStatus::InvitationSent => Self::InvitationSent, } }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use api_models::{ admin as admin_api, organization as api_org, user as user_api, user_role as user_role_api, }; use crate::{ consts, core::{ admin, errors::{UserErrors, UserResult}, }, db::GlobalStorageInterface, routes::SessionState, services::{self, authentication::UserFromToken}, types::{domain, transformers::ForeignFrom}, utils::user::password, }; type InviteeUserRequestWithInvitedUserToken = (user_api::InviteUserRequest, UserFromToken); type UserMerchantCreateRequestWithToken = (UserFromStorage, user_api::UserMerchantCreate, UserFromToken); fn try_from( (value, merchant_account_identifier): ( user_api::CreateTenantUserRequest, MerchantAccountIdentifier, ), ) -> UserResult<Self> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use diesel_models::{ enums::{TotpStatus, UserRoleVersion, UserStatus}, organization::{self as diesel_org, Organization, OrganizationBridge}, user as storage_user, user_role::{UserRole, UserRoleNew}, }; use crate::{ consts, core::{ admin, errors::{UserErrors, UserResult}, }, db::GlobalStorageInterface, routes::SessionState, services::{self, authentication::UserFromToken}, types::{domain, transformers::ForeignFrom}, utils::user::password, }; pub use decision_manager::*; pub async fn insert_in_v2(self, state: &SessionState) -> UserResult<UserRole> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use diesel_models::{ enums::{TotpStatus, UserRoleVersion, UserStatus}, organization::{self as diesel_org, Organization, OrganizationBridge}, user as storage_user, user_role::{UserRole, UserRoleNew}, }; use crate::{ consts, core::{ admin, errors::{UserErrors, UserResult}, }, db::GlobalStorageInterface, routes::SessionState, services::{self, authentication::UserFromToken}, types::{domain, transformers::ForeignFrom}, utils::user::password, }; fn convert_to_new_v2_role(self, entity: EntityInfo) -> UserRoleNew { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use common_enums::EntityType; fn from(value: ProfileLevel) -> Self { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use common_enums::EntityType; fn from(value: MerchantLevel) -> Self { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use common_enums::EntityType; use diesel_models::{ enums::{TotpStatus, UserRoleVersion, UserStatus}, organization::{self as diesel_org, Organization, OrganizationBridge}, user as storage_user, user_role::{UserRole, UserRoleNew}, }; fn from(value: OrganizationLevel) -> Self { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use common_enums::EntityType; fn from(value: TenantLevel) -> Self { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use diesel_models::{ enums::{TotpStatus, UserRoleVersion, UserStatus}, organization::{self as diesel_org, Organization, OrganizationBridge}, user as storage_user, user_role::{UserRole, UserRoleNew}, }; use crate::{ consts, core::{ admin, errors::{UserErrors, UserResult}, }, db::GlobalStorageInterface, routes::SessionState, services::{self, authentication::UserFromToken}, types::{domain, transformers::ForeignFrom}, utils::user::password, }; pub use decision_manager::*; pub fn add_entity<T>(self, entity: T) -> NewUserRole<T> where T: Clone, { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use diesel_models::{ enums::{TotpStatus, UserRoleVersion, UserStatus}, organization::{self as diesel_org, Organization, OrganizationBridge}, user as storage_user, user_role::{UserRole, UserRoleNew}, }; use masking::{ExposeInterface, PeekInterface, Secret}; use crate::{ consts, core::{ admin, errors::{UserErrors, UserResult}, }, db::GlobalStorageInterface, routes::SessionState, services::{self, authentication::UserFromToken}, types::{domain, transformers::ForeignFrom}, utils::user::password, }; pub use decision_manager::*; pub fn into_inner(self) -> Vec<Secret<String>> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use diesel_models::{ enums::{TotpStatus, UserRoleVersion, UserStatus}, organization::{self as diesel_org, Organization, OrganizationBridge}, user as storage_user, user_role::{UserRole, UserRoleNew}, }; use masking::{ExposeInterface, PeekInterface, Secret}; use crate::{ consts, core::{ admin, errors::{UserErrors, UserResult}, }, db::GlobalStorageInterface, routes::SessionState, services::{self, authentication::UserFromToken}, types::{domain, transformers::ForeignFrom}, utils::user::password, }; pub use decision_manager::*; pub fn get_hashed(&self) -> UserResult<Vec<Secret<String>>> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use api_models::{ admin as admin_api, organization as api_org, user as user_api, user_role as user_role_api, }; use diesel_models::{ enums::{TotpStatus, UserRoleVersion, UserStatus}, organization::{self as diesel_org, Organization, OrganizationBridge}, user as storage_user, user_role::{UserRole, UserRoleNew}, }; use masking::{ExposeInterface, PeekInterface, Secret}; use rand::distributions::{Alphanumeric, DistString}; use crate::{ consts, core::{ admin, errors::{UserErrors, UserResult}, }, db::GlobalStorageInterface, routes::SessionState, services::{self, authentication::UserFromToken}, types::{domain, transformers::ForeignFrom}, utils::user::password, }; pub use decision_manager::*; pub fn generate_new() -> Self { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use diesel_models::{ enums::{TotpStatus, UserRoleVersion, UserStatus}, organization::{self as diesel_org, Organization, OrganizationBridge}, user as storage_user, user_role::{UserRole, UserRoleNew}, }; use crate::{ consts, core::{ admin, errors::{UserErrors, UserResult}, }, db::GlobalStorageInterface, routes::SessionState, services::{self, authentication::UserFromToken}, types::{domain, transformers::ForeignFrom}, utils::user::password, }; pub use decision_manager::*; pub fn get_role_name(self) -> String { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use api_models::{ admin as admin_api, organization as api_org, user as user_api, user_role as user_role_api, }; use diesel_models::{ enums::{TotpStatus, UserRoleVersion, UserStatus}, organization::{self as diesel_org, Organization, OrganizationBridge}, user as storage_user, user_role::{UserRole, UserRoleNew}, }; use crate::{ consts, core::{ admin, errors::{UserErrors, UserResult}, }, db::GlobalStorageInterface, routes::SessionState, services::{self, authentication::UserFromToken}, types::{domain, transformers::ForeignFrom}, utils::user::password, }; pub use decision_manager::*; pub fn new(name: String) -> UserResult<Self> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use diesel_models::{ enums::{TotpStatus, UserRoleVersion, UserStatus}, organization::{self as diesel_org, Organization, OrganizationBridge}, user as storage_user, user_role::{UserRole, UserRoleNew}, }; fn foreign_from(value: UserStatus) -> Self { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use diesel_models::{ enums::{TotpStatus, UserRoleVersion, UserStatus}, organization::{self as diesel_org, Organization, OrganizationBridge}, user as storage_user, user_role::{UserRole, UserRoleNew}, }; use masking::{ExposeInterface, PeekInterface, Secret}; use crate::{ consts, core::{ admin, errors::{UserErrors, UserResult}, }, db::GlobalStorageInterface, routes::SessionState, services::{self, authentication::UserFromToken}, types::{domain, transformers::ForeignFrom}, utils::user::password, }; pub use decision_manager::*; pub fn get_recovery_codes(&self) -> Option<Vec<Secret<String>>> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use diesel_models::{ enums::{TotpStatus, UserRoleVersion, UserStatus}, organization::{self as diesel_org, Organization, OrganizationBridge}, user as storage_user, user_role::{UserRole, UserRoleNew}, }; use crate::{ consts, core::{ admin, errors::{UserErrors, UserResult}, }, db::GlobalStorageInterface, routes::SessionState, services::{self, authentication::UserFromToken}, types::{domain, transformers::ForeignFrom}, utils::user::password, }; pub use decision_manager::*; pub fn get_totp_status(&self) -> TotpStatus { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use api_models::{ admin as admin_api, organization as api_org, user as user_api, user_role as user_role_api, }; use common_utils::{ crypto::Encryptable, id_type, new_type::MerchantName, pii, type_name, types::keymanager::Identifier, }; use diesel_models::{ enums::{TotpStatus, UserRoleVersion, UserStatus}, organization::{self as diesel_org, Organization, OrganizationBridge}, user as storage_user, user_role::{UserRole, UserRoleNew}, }; use time::PrimitiveDateTime; use {base64::Engine, common_utils::types::keymanager::EncryptionTransferRequest}; use crate::{ consts, core::{ admin, errors::{UserErrors, UserResult}, }, db::GlobalStorageInterface, routes::SessionState, services::{self, authentication::UserFromToken}, types::{domain, transformers::ForeignFrom}, utils::user::password, }; pub use decision_manager::*; pub fn is_password_rotate_required(&self, state: &SessionState) -> UserResult<bool> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use diesel_models::{ enums::{TotpStatus, UserRoleVersion, UserStatus}, organization::{self as diesel_org, Organization, OrganizationBridge}, user as storage_user, user_role::{UserRole, UserRoleNew}, }; use crate::{ consts, core::{ admin, errors::{UserErrors, UserResult}, }, db::GlobalStorageInterface, routes::SessionState, services::{self, authentication::UserFromToken}, types::{domain, transformers::ForeignFrom}, utils::user::password, }; pub use decision_manager::*; pub fn is_verified(&self) -> bool { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use common_utils::{ crypto::Encryptable, id_type, new_type::MerchantName, pii, type_name, types::keymanager::Identifier, }; use diesel_models::{ enums::{TotpStatus, UserRoleVersion, UserStatus}, organization::{self as diesel_org, Organization, OrganizationBridge}, user as storage_user, user_role::{UserRole, UserRoleNew}, }; use time::PrimitiveDateTime; use {base64::Engine, common_utils::types::keymanager::EncryptionTransferRequest}; use crate::{ consts, core::{ admin, errors::{UserErrors, UserResult}, }, db::GlobalStorageInterface, routes::SessionState, services::{self, authentication::UserFromToken}, types::{domain, transformers::ForeignFrom}, utils::user::password, }; pub use decision_manager::*; pub fn get_verification_days_left(&self, state: &SessionState) -> UserResult<Option<i64>> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use common_utils::{ crypto::Encryptable, id_type, new_type::MerchantName, pii, type_name, types::keymanager::Identifier, }; use diesel_models::{ enums::{TotpStatus, UserRoleVersion, UserStatus}, organization::{self as diesel_org, Organization, OrganizationBridge}, user as storage_user, user_role::{UserRole, UserRoleNew}, }; use crate::{ consts, core::{ admin, errors::{UserErrors, UserResult}, }, db::GlobalStorageInterface, routes::SessionState, services::{self, authentication::UserFromToken}, types::{domain, transformers::ForeignFrom}, utils::user::password, }; pub use decision_manager::*; pub fn get_email(&self) -> pii::Email { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use diesel_models::{ enums::{TotpStatus, UserRoleVersion, UserStatus}, organization::{self as diesel_org, Organization, OrganizationBridge}, user as storage_user, user_role::{UserRole, UserRoleNew}, }; use masking::{ExposeInterface, PeekInterface, Secret}; use crate::{ consts, core::{ admin, errors::{UserErrors, UserResult}, }, db::GlobalStorageInterface, routes::SessionState, services::{self, authentication::UserFromToken}, types::{domain, transformers::ForeignFrom}, utils::user::password, }; pub use decision_manager::*; pub fn get_name(&self) -> Secret<String> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use diesel_models::{ enums::{TotpStatus, UserRoleVersion, UserStatus}, organization::{self as diesel_org, Organization, OrganizationBridge}, user as storage_user, user_role::{UserRole, UserRoleNew}, }; use masking::{ExposeInterface, PeekInterface, Secret}; use crate::{ consts, core::{ admin, errors::{UserErrors, UserResult}, }, db::GlobalStorageInterface, routes::SessionState, services::{self, authentication::UserFromToken}, types::{domain, transformers::ForeignFrom}, utils::user::password, }; pub use decision_manager::*; pub fn compare_password(&self, candidate: &Secret<String>) -> UserResult<()> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use std::{ collections::HashSet, ops::{Deref, Not}, str::FromStr, }; use diesel_models::{ enums::{TotpStatus, UserRoleVersion, UserStatus}, organization::{self as diesel_org, Organization, OrganizationBridge}, user as storage_user, user_role::{UserRole, UserRoleNew}, }; use crate::{ consts, core::{ admin, errors::{UserErrors, UserResult}, }, db::GlobalStorageInterface, routes::SessionState, services::{self, authentication::UserFromToken}, types::{domain, transformers::ForeignFrom}, utils::user::password, }; pub use decision_manager::*; pub fn get_user_id(&self) -> &str { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use diesel_models::{ enums::{TotpStatus, UserRoleVersion, UserStatus}, organization::{self as diesel_org, Organization, OrganizationBridge}, user as storage_user, user_role::{UserRole, UserRoleNew}, }; fn from(value: storage_user::User) -> Self { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
// file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use api_models::{ admin as admin_api, organization as api_org, user as user_api, user_role as user_role_api, }; use crate::{ consts, core::{ admin, errors::{UserErrors, UserResult}, }, db::GlobalStorageInterface, routes::SessionState, services::{self, authentication::UserFromToken}, types::{domain, transformers::ForeignFrom}, utils::user::password, }; type InviteeUserRequestWithInvitedUserToken = (user_api::InviteUserRequest, UserFromToken); type UserMerchantCreateRequestWithToken = (UserFromStorage, user_api::UserMerchantCreate, UserFromToken); fn try_from( (value, merchant_account_identifier): ( user_api::CreateTenantUserRequest, MerchantAccountIdentifier, ), ) -> UserResult<Self> { let user_id = uuid::Uuid::new_v4().to_string(); let email = value.email.clone().try_into()?; let name = UserName::new(value.name.clone())?; let password = NewUserPassword { password: UserPassword::new(value.password.clone())?, is_temporary: false, }; let new_merchant = NewUserMerchant::from((value, merchant_account_identifier)); Ok(Self { user_id, name, email, password: Some(password), new_merchant, }) }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use crate::{ consts, core::{ admin, errors::{UserErrors, UserResult}, }, db::GlobalStorageInterface, routes::SessionState, services::{self, authentication::UserFromToken}, types::{domain, transformers::ForeignFrom}, utils::user::password, }; type InviteeUserRequestWithInvitedUserToken = (user_api::InviteUserRequest, UserFromToken); fn try_from(value: InviteeUserRequestWithInvitedUserToken) -> UserResult<Self> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use api_models::{ admin as admin_api, organization as api_org, user as user_api, user_role as user_role_api, }; use diesel_models::{ enums::{TotpStatus, UserRoleVersion, UserStatus}, organization::{self as diesel_org, Organization, OrganizationBridge}, user as storage_user, user_role::{UserRole, UserRoleNew}, }; use crate::{ consts, core::{ admin, errors::{UserErrors, UserResult}, }, db::GlobalStorageInterface, routes::SessionState, services::{self, authentication::UserFromToken}, types::{domain, transformers::ForeignFrom}, utils::user::password, }; type UserMerchantCreateRequestWithToken = (UserFromStorage, user_api::UserMerchantCreate, UserFromToken); fn try_from(value: UserMerchantCreateRequestWithToken) -> Result<Self, Self::Error> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use api_models::{ admin as admin_api, organization as api_org, user as user_api, user_role as user_role_api, }; use common_utils::{ crypto::Encryptable, id_type, new_type::MerchantName, pii, type_name, types::keymanager::Identifier, }; use crate::{ consts, core::{ admin, errors::{UserErrors, UserResult}, }, db::GlobalStorageInterface, routes::SessionState, services::{self, authentication::UserFromToken}, types::{domain, transformers::ForeignFrom}, utils::user::password, }; type InviteeUserRequestWithInvitedUserToken = (user_api::InviteUserRequest, UserFromToken); type UserMerchantCreateRequestWithToken = (UserFromStorage, user_api::UserMerchantCreate, UserFromToken); fn try_from( (value, org_id): (user_api::CreateInternalUserRequest, id_type::OrganizationId), ) -> UserResult<Self> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use api_models::{ admin as admin_api, organization as api_org, user as user_api, user_role as user_role_api, }; use crate::{ consts, core::{ admin, errors::{UserErrors, UserResult}, }, db::GlobalStorageInterface, routes::SessionState, services::{self, authentication::UserFromToken}, types::{domain, transformers::ForeignFrom}, utils::user::password, }; type InviteeUserRequestWithInvitedUserToken = (user_api::InviteUserRequest, UserFromToken); type UserMerchantCreateRequestWithToken = (UserFromStorage, user_api::UserMerchantCreate, UserFromToken); fn try_from(value: user_api::ConnectAccountRequest) -> UserResult<Self> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use api_models::{ admin as admin_api, organization as api_org, user as user_api, user_role as user_role_api, }; use crate::{ consts, core::{ admin, errors::{UserErrors, UserResult}, }, db::GlobalStorageInterface, routes::SessionState, services::{self, authentication::UserFromToken}, types::{domain, transformers::ForeignFrom}, utils::user::password, }; type InviteeUserRequestWithInvitedUserToken = (user_api::InviteUserRequest, UserFromToken); type UserMerchantCreateRequestWithToken = (UserFromStorage, user_api::UserMerchantCreate, UserFromToken); fn try_from(value: user_api::SignUpRequest) -> UserResult<Self> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/types/domain/user.rs | crate: router use api_models::{ admin as admin_api, organization as api_org, user as user_api, user_role as user_role_api, }; use crate::{ consts, core::{ admin, errors::{UserErrors, UserResult}, }, db::GlobalStorageInterface, routes::SessionState, services::{self, authentication::UserFromToken}, types::{domain, transformers::ForeignFrom}, utils::user::password, }; type InviteeUserRequestWithInvitedUserToken = (user_api::InviteUserRequest, UserFromToken); type UserMerchantCreateRequestWithToken = (UserFromStorage, user_api::UserMerchantCreate, UserFromToken); fn try_from(value: user_api::SignUpWithMerchantIdRequest) -> UserResult<Self> { <|fim_suffix|> <|fim_middle|> }
ast_fragments