text
stringlengths
70
351k
source
stringclasses
4 values
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user.rs | crate: router use common_utils::{ encryption::Encryption, errors::CustomResult, id_type, type_name, types::keymanager::Identifier, }; use masking::{ExposeInterface, Secret}; use crate::{ consts::user::{REDIS_SSO_PREFIX, REDIS_SSO_TTL}, core::errors::{StorageError, UserErrors, UserResult}, routes::SessionState, services::{ authentication::{AuthToken, UserFromToken}, authorization::roles::RoleInfo, }, types::{ domain::{self, MerchantAccount, UserFromStorage}, transformers::ForeignFrom, }, }; pub async fn generate_jwt_auth_token_with_attributes( state: &SessionState, user_id: String, merchant_id: id_type::MerchantId, org_id: id_type::OrganizationId, role_id: String, profile_id: id_type::ProfileId, tenant_id: Option<id_type::TenantId>, ) -> UserResult<Secret<String>> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user.rs | crate: router use diesel_models::organization::{self, OrganizationBridge}; use crate::{ consts::user::{REDIS_SSO_PREFIX, REDIS_SSO_TTL}, core::errors::{StorageError, UserErrors, UserResult}, routes::SessionState, services::{ authentication::{AuthToken, UserFromToken}, authorization::roles::RoleInfo, }, types::{ domain::{self, MerchantAccount, UserFromStorage}, transformers::ForeignFrom, }, }; pub async fn get_role_info_from_db(&self, state: &SessionState) -> UserResult<RoleInfo> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
// file: hyperswitch/crates/router/src/utils/user.rs | crate: router use api_models::user as user_api; use diesel_models::organization::{self, OrganizationBridge}; use crate::{ consts::user::{REDIS_SSO_PREFIX, REDIS_SSO_TTL}, core::errors::{StorageError, UserErrors, UserResult}, routes::SessionState, services::{ authentication::{AuthToken, UserFromToken}, authorization::roles::RoleInfo, }, types::{ domain::{self, MerchantAccount, UserFromStorage}, transformers::ForeignFrom, }, }; pub async fn get_user_from_db(&self, state: &SessionState) -> UserResult<UserFromStorage> { let user = state .global_store .find_user_by_id(&self.user_id) .await .change_context(UserErrors::InternalServerError)?; Ok(user.into()) }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user_role.rs | crate: router use common_enums::{EntityType, PermissionGroup}; use common_utils::id_type; use diesel_models::{ enums::{UserRoleVersion, UserStatus}, role::ListRolesByEntityPayload, user_role::{UserRole, UserRoleUpdate}, }; use crate::{ consts, core::errors::{UserErrors, UserResult}, db::{ errors::StorageErrorExt, user_role::{ListUserRolesByOrgIdPayload, ListUserRolesByUserIdPayload}, }, routes::SessionState, services::authorization::{self as authz, roles}, types::domain, }; pub async fn get_single_profile_id( state: &SessionState, user_role: &UserRole, merchant_id: &id_type::MerchantId, ) -> UserResult<id_type::ProfileId> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
// file: hyperswitch/crates/router/src/utils/user_role.rs | crate: router use common_enums::{EntityType, PermissionGroup}; use common_utils::id_type; use diesel_models::{ enums::{UserRoleVersion, UserStatus}, role::ListRolesByEntityPayload, user_role::{UserRole, UserRoleUpdate}, }; use crate::{ consts, core::errors::{UserErrors, UserResult}, db::{ errors::StorageErrorExt, user_role::{ListUserRolesByOrgIdPayload, ListUserRolesByUserIdPayload}, }, routes::SessionState, services::authorization::{self as authz, roles}, types::domain, }; pub async fn get_single_merchant_id( state: &SessionState, user_role: &UserRole, org_id: &id_type::OrganizationId, ) -> UserResult<id_type::MerchantId> { let (_, entity_type) = user_role .get_entity_id_and_type() .ok_or(UserErrors::InternalServerError)?; match entity_type { EntityType::Tenant | EntityType::Organization => Ok(state .store .list_merchant_accounts_by_organization_id(&state.into(), org_id) .await .to_not_found_response(UserErrors::InvalidRoleOperationWithMessage( "Invalid Org Id".to_string(), ))? .first() .ok_or(UserErrors::InternalServerError) .attach_printable("No merchants found for org_id")? .get_id() .clone()), EntityType::Merchant | EntityType::Profile => user_role .merchant_id .clone() .ok_or(UserErrors::InternalServerError) .attach_printable("merchant_id not found"), } }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user_role.rs | crate: router use common_utils::id_type; use diesel_models::{ enums::{UserRoleVersion, UserStatus}, role::ListRolesByEntityPayload, user_role::{UserRole, UserRoleUpdate}, }; use error_stack::{report, Report, ResultExt}; use router_env::logger; use storage_impl::errors::StorageError; use crate::{ consts, core::errors::{UserErrors, UserResult}, db::{ errors::StorageErrorExt, user_role::{ListUserRolesByOrgIdPayload, ListUserRolesByUserIdPayload}, }, routes::SessionState, services::authorization::{self as authz, roles}, types::domain, }; pub async fn update_v1_and_v2_user_roles_in_db( state: &SessionState, user_id: &str, tenant_id: &id_type::TenantId, org_id: &id_type::OrganizationId, merchant_id: Option<&id_type::MerchantId>, profile_id: Option<&id_type::ProfileId>, update: UserRoleUpdate, ) -> ( Result<UserRole, Report<StorageError>>, Result<UserRole, Report<StorageError>>, ) { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user_role.rs | crate: router use common_utils::id_type; use crate::{ consts, core::errors::{UserErrors, UserResult}, db::{ errors::StorageErrorExt, user_role::{ListUserRolesByOrgIdPayload, ListUserRolesByUserIdPayload}, }, routes::SessionState, services::authorization::{self as authz, roles}, types::domain, }; pub async fn set_role_info_in_cache_if_required( state: &SessionState, role_id: &str, org_id: &id_type::OrganizationId, tenant_id: &id_type::TenantId, ) -> UserResult<()> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user_role.rs | crate: router use common_enums::{EntityType, PermissionGroup}; use common_utils::id_type; use diesel_models::{ enums::{UserRoleVersion, UserStatus}, role::ListRolesByEntityPayload, user_role::{UserRole, UserRoleUpdate}, }; use crate::{ consts, core::errors::{UserErrors, UserResult}, db::{ errors::StorageErrorExt, user_role::{ListUserRolesByOrgIdPayload, ListUserRolesByUserIdPayload}, }, routes::SessionState, services::authorization::{self as authz, roles}, types::domain, }; pub async fn validate_role_name( state: &SessionState, role_name: &domain::RoleName, merchant_id: &id_type::MerchantId, org_id: &id_type::OrganizationId, tenant_id: &id_type::TenantId, profile_id: &id_type::ProfileId, entity_type: &EntityType, ) -> UserResult<()> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user_role.rs | crate: router use common_enums::{EntityType, PermissionGroup}; use common_utils::id_type; use diesel_models::{ enums::{UserRoleVersion, UserStatus}, role::ListRolesByEntityPayload, user_role::{UserRole, UserRoleUpdate}, }; use crate::{ consts, core::errors::{UserErrors, UserResult}, db::{ errors::StorageErrorExt, user_role::{ListUserRolesByOrgIdPayload, ListUserRolesByUserIdPayload}, }, routes::SessionState, services::authorization::{self as authz, roles}, types::domain, }; pub async fn get_single_org_id( state: &SessionState, user_role: &UserRole, ) -> UserResult<id_type::OrganizationId> { { EntityType::Tenant => Ok(state .store .list_merchant_and_org_ids(&state.into(), 1, None) .await .change_context(UserErrors::InternalServerError) .attach_printable("Failed to get merchants list for org")? .pop() .ok_or(UserErrors::InternalServerError) .attach_printable("No merchants to get merchant or org id")? .1),<|fim_suffix|> <|fim_middle|> EntityType::Organization | EntityType::Merchant | EntityType::Profile => user_role .org_id .clone() .ok_or(UserErrors::InternalServerError) .attach_printable("Org_id not found"), } }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user_role.rs | crate: router use common_enums::{EntityType, PermissionGroup}; use common_utils::id_type; use diesel_models::{ enums::{UserRoleVersion, UserStatus}, role::ListRolesByEntityPayload, user_role::{UserRole, UserRoleUpdate}, }; use crate::{ consts, core::errors::{UserErrors, UserResult}, db::{ errors::StorageErrorExt, user_role::{ListUserRolesByOrgIdPayload, ListUserRolesByUserIdPayload}, }, routes::SessionState, services::authorization::{self as authz, roles}, types::domain, }; pub async fn validate_role_name( state: &SessionState, role_name: &domain::RoleName, merchant_id: &id_type::MerchantId, org_id: &id_type::OrganizationId, tenant_id: &id_type::TenantId, profile_id: &id_type::ProfileId, entity_type: &EntityType, ) -> UserResult<()> { { EntityType::Tenant | EntityType::Organization => ListRolesByEntityPayload::Organization,<|fim_suffix|> <|fim_middle|> EntityType::Profile => { ListRolesByEntityPayload::Profile(merchant_id.to_owned(), profile_id.to_owned()) } } }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user_role.rs | crate: router use std::{cmp, collections::HashSet}; use common_enums::{EntityType, PermissionGroup}; use error_stack::{report, Report, ResultExt}; use crate::{ consts, core::errors::{UserErrors, UserResult}, db::{ errors::StorageErrorExt, user_role::{ListUserRolesByOrgIdPayload, ListUserRolesByUserIdPayload}, }, routes::SessionState, services::authorization::{self as authz, roles}, types::domain, }; pub fn get_min_entity( user_entity: EntityType, filter_entity: Option<EntityType>, ) -> UserResult<EntityType> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user_role.rs | crate: router use std::{cmp, collections::HashSet}; use common_enums::{EntityType, PermissionGroup}; use diesel_models::{ enums::{UserRoleVersion, UserStatus}, role::ListRolesByEntityPayload, user_role::{UserRole, UserRoleUpdate}, }; use crate::{ consts, core::errors::{UserErrors, UserResult}, db::{ errors::StorageErrorExt, user_role::{ListUserRolesByOrgIdPayload, ListUserRolesByUserIdPayload}, }, routes::SessionState, services::authorization::{self as authz, roles}, types::domain, }; pub async fn fetch_user_roles_by_payload( state: &SessionState, payload: ListUserRolesByOrgIdPayload<'_>, request_entity_type: Option<EntityType>, ) -> UserResult<HashSet<UserRole>> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user_role.rs | crate: router use common_utils::id_type; use diesel_models::{ enums::{UserRoleVersion, UserStatus}, role::ListRolesByEntityPayload, user_role::{UserRole, UserRoleUpdate}, }; use crate::{ consts, core::errors::{UserErrors, UserResult}, db::{ errors::StorageErrorExt, user_role::{ListUserRolesByOrgIdPayload, ListUserRolesByUserIdPayload}, }, routes::SessionState, services::authorization::{self as authz, roles}, types::domain, }; pub async fn get_single_merchant_id_and_profile_id( state: &SessionState, user_role: &UserRole, ) -> UserResult<(id_type::MerchantId, id_type::ProfileId)> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user_role.rs | crate: router use common_enums::{EntityType, PermissionGroup}; use common_utils::id_type; use diesel_models::{ enums::{UserRoleVersion, UserStatus}, role::ListRolesByEntityPayload, user_role::{UserRole, UserRoleUpdate}, }; use crate::{ consts, core::errors::{UserErrors, UserResult}, db::{ errors::StorageErrorExt, user_role::{ListUserRolesByOrgIdPayload, ListUserRolesByUserIdPayload}, }, routes::SessionState, services::authorization::{self as authz, roles}, types::domain, }; pub async fn get_single_org_id( state: &SessionState, user_role: &UserRole, ) -> UserResult<id_type::OrganizationId> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user_role.rs | crate: router use common_utils::id_type; use router_env::logger; use crate::{ consts, core::errors::{UserErrors, UserResult}, db::{ errors::StorageErrorExt, user_role::{ListUserRolesByOrgIdPayload, ListUserRolesByUserIdPayload}, }, routes::SessionState, services::authorization::{self as authz, roles}, types::domain, }; pub async fn set_role_info_in_cache_by_role_id_org_id( state: &SessionState, role_id: &str, org_id: &id_type::OrganizationId, tenant_id: &id_type::TenantId, ) -> bool { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user_role.rs | crate: router use diesel_models::{ enums::{UserRoleVersion, UserStatus}, role::ListRolesByEntityPayload, user_role::{UserRole, UserRoleUpdate}, }; use router_env::logger; use crate::{ consts, core::errors::{UserErrors, UserResult}, db::{ errors::StorageErrorExt, user_role::{ListUserRolesByOrgIdPayload, ListUserRolesByUserIdPayload}, }, routes::SessionState, services::authorization::{self as authz, roles}, types::domain, }; pub async fn set_role_info_in_cache_by_user_role( state: &SessionState, user_role: &UserRole, ) -> bool { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user_role.rs | crate: router use std::{cmp, collections::HashSet}; use common_enums::{EntityType, PermissionGroup}; use diesel_models::{ enums::{UserRoleVersion, UserStatus}, role::ListRolesByEntityPayload, user_role::{UserRole, UserRoleUpdate}, }; use error_stack::{report, Report, ResultExt}; use crate::{ consts, core::errors::{UserErrors, UserResult}, db::{ errors::StorageErrorExt, user_role::{ListUserRolesByOrgIdPayload, ListUserRolesByUserIdPayload}, }, routes::SessionState, services::authorization::{self as authz, roles}, types::domain, }; pub fn validate_role_groups(groups: &[PermissionGroup]) -> UserResult<()> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user_role.rs | crate: router use std::{cmp, collections::HashSet}; use common_enums::{EntityType, PermissionGroup}; use common_utils::id_type; use diesel_models::{ enums::{UserRoleVersion, UserStatus}, role::ListRolesByEntityPayload, user_role::{UserRole, UserRoleUpdate}, }; use crate::{ consts, core::errors::{UserErrors, UserResult}, db::{ errors::StorageErrorExt, user_role::{ListUserRolesByOrgIdPayload, ListUserRolesByUserIdPayload}, }, routes::SessionState, services::authorization::{self as authz, roles}, types::domain, }; pub async fn get_lineage_for_user_id_and_entity_for_accepting_invite( state: &SessionState, user_id: &str, tenant_id: &id_type::TenantId, entity_id: String, entity_type: EntityType, ) -> UserResult< Option<( id_type::OrganizationId, Option<id_type::MerchantId>, Option<id_type::ProfileId>, )>, > { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/verify_connector.rs | crate: router use api_models::enums::Connector; use crate::{core::errors, types::domain}; pub fn get_test_card_details( connector_name: Connector, ) -> errors::RouterResult<Option<domain::Card>> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
// file: hyperswitch/crates/router/src/utils/verify_connector.rs | crate: router use api_models::enums::Connector; use crate::{core::errors, types::domain}; pub fn get_test_card_details( connector_name: Connector, ) -> errors::RouterResult<Option<domain::Card>> { match connector_name { Connector::Stripe => Some(generate_card_from_details( "4242424242424242".to_string(), "2025".to_string(), "12".to_string(), "100".to_string(), )) .transpose(), Connector::Paypal => Some(generate_card_from_details( "4111111111111111".to_string(), "2025".to_string(), "02".to_string(), "123".to_string(), )) .transpose(), _ => Ok(None), } }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/verify_connector.rs | crate: router use crate::{core::errors, types::domain}; pub fn generate_card_from_details( card_number: String, card_exp_year: String, card_exp_month: String, card_cvv: String, ) -> errors::RouterResult<domain::Card> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/currency.rs | crate: router use api_models::enums; use common_utils::{date_time, errors::CustomResult, events::ApiEventMetric, ext_traits::AsyncExt}; use currency_conversion::types::{CurrencyFactors, ExchangeRates}; use crate::{ logger, routes::app::settings::{Conversion, DefaultExchangeRates}, services, SessionState, }; pub async fn convert_currency( state: SessionState, amount: i64, to_currency: String, from_currency: String, ) -> CustomResult<api_models::currency::CurrencyConversionResponse, ForexError> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/currency.rs | crate: router use std::{collections::HashMap, ops::Deref, str::FromStr, sync::Arc}; use api_models::enums; use currency_conversion::types::{CurrencyFactors, ExchangeRates}; use error_stack::ResultExt; use rust_decimal::Decimal; use crate::{ logger, routes::app::settings::{Conversion, DefaultExchangeRates}, services, SessionState, }; async fn fetch_forex_rates_from_primary_api( state: &SessionState, ) -> Result<FxExchangeRatesCacheEntry, error_stack::Report<ForexError>> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/currency.rs | crate: router use common_utils::{date_time, errors::CustomResult, events::ApiEventMetric, ext_traits::AsyncExt}; use crate::{ logger, routes::app::settings::{Conversion, DefaultExchangeRates}, services, SessionState, }; async fn acquire_redis_lock_and_call_forex_api( state: &SessionState, ) -> CustomResult<(), ForexError> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/currency.rs | crate: router use std::{collections::HashMap, ops::Deref, str::FromStr, sync::Arc}; use api_models::enums; use common_utils::{date_time, errors::CustomResult, events::ApiEventMetric, ext_traits::AsyncExt}; use currency_conversion::types::{CurrencyFactors, ExchangeRates}; use rust_decimal::Decimal; use crate::{ logger, routes::app::settings::{Conversion, DefaultExchangeRates}, services, SessionState, }; pub async fn fetch_forex_rates_from_fallback_api( state: &SessionState, ) -> CustomResult<FxExchangeRatesCacheEntry, ForexError> { { Ok(_) => { save_forex_data_to_cache_and_redis(state, rates.clone()).await?; Ok(rates) }<|fim_suffix|> <|fim_middle|> Err(e) => Err(e), } }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/currency.rs | crate: router use common_utils::{date_time, errors::CustomResult, events::ApiEventMetric, ext_traits::AsyncExt}; use crate::{ logger, routes::app::settings::{Conversion, DefaultExchangeRates}, services, SessionState, }; async fn call_forex_api_if_redis_data_expired( state: &SessionState, redis_data: FxExchangeRatesCacheEntry, data_expiration_delay: u32, ) -> CustomResult<FxExchangeRatesCacheEntry, ForexError> { { Some(redis_forex) => { // Valid data present in redis let exchange_rates = FxExchangeRatesCacheEntry::new(redis_forex.as_ref().clone()); logger::debug!("forex_log: forex response found in redis"); save_forex_data_to_local_cache(exchange_rates.clone()).await?; Ok(exchange_rates) }<|fim_suffix|> <|fim_middle|> None => { // redis expired call_forex_api_and_save_data_to_cache_and_redis(state, Some(redis_data)).await } } }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/currency.rs | crate: router use std::{collections::HashMap, ops::Deref, str::FromStr, sync::Arc}; use common_utils::{date_time, errors::CustomResult, events::ApiEventMetric, ext_traits::AsyncExt}; use currency_conversion::types::{CurrencyFactors, ExchangeRates}; use crate::{ logger, routes::app::settings::{Conversion, DefaultExchangeRates}, services, SessionState, }; async fn is_redis_expired( redis_cache: Option<&FxExchangeRatesCacheEntry>, data_expiration_delay: u32, ) -> Option<Arc<ExchangeRates>> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/currency.rs | crate: router use common_utils::{date_time, errors::CustomResult, events::ApiEventMetric, ext_traits::AsyncExt}; use crate::{ logger, routes::app::settings::{Conversion, DefaultExchangeRates}, services, SessionState, }; async fn retrieve_forex_data_from_redis( app_state: &SessionState, ) -> CustomResult<Option<FxExchangeRatesCacheEntry>, ForexError> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/currency.rs | crate: router use common_utils::{date_time, errors::CustomResult, events::ApiEventMetric, ext_traits::AsyncExt}; use crate::{ logger, routes::app::settings::{Conversion, DefaultExchangeRates}, services, SessionState, }; async fn save_forex_data_to_redis( app_state: &SessionState, forex_exchange_cache_entry: &FxExchangeRatesCacheEntry, ) -> CustomResult<(), ForexError> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/currency.rs | crate: router use common_utils::{date_time, errors::CustomResult, events::ApiEventMetric, ext_traits::AsyncExt}; use redis_interface::DelReply; use crate::{ logger, routes::app::settings::{Conversion, DefaultExchangeRates}, services, SessionState, }; async fn acquire_redis_lock(state: &SessionState) -> CustomResult<bool, ForexError> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/currency.rs | crate: router use error_stack::ResultExt; use redis_interface::DelReply; use crate::{ logger, routes::app::settings::{Conversion, DefaultExchangeRates}, services, SessionState, }; async fn release_redis_lock( state: &SessionState, ) -> Result<DelReply, error_stack::Report<ForexError>> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/currency.rs | crate: router use common_utils::{date_time, errors::CustomResult, events::ApiEventMetric, ext_traits::AsyncExt}; use crate::{ logger, routes::app::settings::{Conversion, DefaultExchangeRates}, services, SessionState, }; async fn call_forex_api_if_redis_data_expired( state: &SessionState, redis_data: FxExchangeRatesCacheEntry, data_expiration_delay: u32, ) -> CustomResult<FxExchangeRatesCacheEntry, ForexError> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/currency.rs | crate: router use common_utils::{date_time, errors::CustomResult, events::ApiEventMetric, ext_traits::AsyncExt}; use crate::{ logger, routes::app::settings::{Conversion, DefaultExchangeRates}, services, SessionState, }; async fn save_forex_data_to_cache_and_redis( state: &SessionState, forex: FxExchangeRatesCacheEntry, ) -> CustomResult<(), ForexError> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/currency.rs | crate: router use common_utils::{date_time, errors::CustomResult, events::ApiEventMetric, ext_traits::AsyncExt}; use tokio::sync::RwLock; use crate::{ logger, routes::app::settings::{Conversion, DefaultExchangeRates}, services, SessionState, }; async fn call_forex_api_and_save_data_to_cache_and_redis( state: &SessionState, stale_redis_data: Option<FxExchangeRatesCacheEntry>, ) -> CustomResult<FxExchangeRatesCacheEntry, ForexError> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/currency.rs | crate: router use common_utils::{date_time, errors::CustomResult, events::ApiEventMetric, ext_traits::AsyncExt}; use crate::{ logger, routes::app::settings::{Conversion, DefaultExchangeRates}, services, SessionState, }; async fn call_api_if_redis_forex_data_expired( state: &SessionState, data_expiration_delay: u32, ) -> CustomResult<FxExchangeRatesCacheEntry, ForexError> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/currency.rs | crate: router use common_utils::{date_time, errors::CustomResult, events::ApiEventMetric, ext_traits::AsyncExt}; use crate::{ logger, routes::app::settings::{Conversion, DefaultExchangeRates}, services, SessionState, }; pub async fn get_forex_rates( state: &SessionState, data_expiration_delay: u32, ) -> CustomResult<FxExchangeRatesCacheEntry, ForexError> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/currency.rs | crate: router use crate::{ logger, routes::app::settings::{Conversion, DefaultExchangeRates}, services, SessionState, }; fn from(value: Conversion) -> Self { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/currency.rs | crate: router use std::{collections::HashMap, ops::Deref, str::FromStr, sync::Arc}; use api_models::enums; use currency_conversion::types::{CurrencyFactors, ExchangeRates}; use crate::{ logger, routes::app::settings::{Conversion, DefaultExchangeRates}, services, SessionState, }; fn try_from(value: DefaultExchangeRates) -> Result<Self, Self::Error> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/currency.rs | crate: router use common_utils::{date_time, errors::CustomResult, events::ApiEventMetric, ext_traits::AsyncExt}; use crate::{ logger, routes::app::settings::{Conversion, DefaultExchangeRates}, services, SessionState, }; async fn save_forex_data_to_local_cache( exchange_rates_cache_entry: FxExchangeRatesCacheEntry, ) -> CustomResult<(), ForexError> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/currency.rs | crate: router async fn retrieve_forex_from_local_cache() -> Option<FxExchangeRatesCacheEntry> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/currency.rs | crate: router use common_utils::{date_time, errors::CustomResult, events::ApiEventMetric, ext_traits::AsyncExt}; fn is_expired(&self, data_expiration_delay: u32) -> bool { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/currency.rs | crate: router use std::{collections::HashMap, ops::Deref, str::FromStr, sync::Arc}; use common_utils::{date_time, errors::CustomResult, events::ApiEventMetric, ext_traits::AsyncExt}; use currency_conversion::types::{CurrencyFactors, ExchangeRates}; fn new(exchange_rate: ExchangeRates) -> Self { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/currency.rs | crate: router use std::{collections::HashMap, ops::Deref, str::FromStr, sync::Arc}; use api_models::enums; use common_utils::{date_time, errors::CustomResult, events::ApiEventMetric, ext_traits::AsyncExt}; use currency_conversion::types::{CurrencyFactors, ExchangeRates}; use rust_decimal::Decimal; use crate::{ logger, routes::app::settings::{Conversion, DefaultExchangeRates}, services, SessionState, }; pub async fn fetch_forex_rates_from_fallback_api( state: &SessionState, ) -> CustomResult<FxExchangeRatesCacheEntry, ForexError> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/db_utils.rs | crate: router use crate::{ core::errors::{self, utils::RedisErrorExt}, routes::metrics, }; pub async fn try_redis_get_else_try_database_get<F, RFut, DFut, T>( redis_fut: RFut, database_call_closure: F, ) -> error_stack::Result<T, errors::StorageError> where F: FnOnce() -> DFut, RFut: futures::Future<Output = error_stack::Result<T, redis_interface::errors::RedisError>>, DFut: futures::Future<Output = error_stack::Result<T, errors::StorageError>>, { { redis_interface::errors::RedisError::NotFound => { metrics::KV_MISS.add(1, &[]); database_call_closure().await }<|fim_suffix|> <|fim_middle|> _ => Err(redis_error.to_redis_failed_response("")), } }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/db_utils.rs | crate: router use crate::{ core::errors::{self, utils::RedisErrorExt}, routes::metrics, }; pub async fn try_redis_get_else_try_database_get<F, RFut, DFut, T>( redis_fut: RFut, database_call_closure: F, ) -> error_stack::Result<T, errors::StorageError> where F: FnOnce() -> DFut, RFut: futures::Future<Output = error_stack::Result<T, redis_interface::errors::RedisError>>, DFut: futures::Future<Output = error_stack::Result<T, errors::StorageError>>, { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/db_utils.rs | crate: router /// Generates hscan field pattern. Suppose the field is pa_1234_ref_1211 it will generate /// pa_1234_ref_* pub fn generate_hscan_pattern_for_refund(sk: &str) -> String { <|fim_suffix|> <|fim_middle|> }
ast_fragments
// file: hyperswitch/crates/router/src/utils/user/theme.rs | crate: router use common_utils::{ext_traits::AsyncExt, id_type, types::theme::ThemeLineage}; use hyperswitch_domain_models::merchant_key_store::MerchantKeyStore; use crate::{ core::errors::{StorageErrorExt, UserErrors, UserResult}, routes::SessionState, services::authentication::UserFromToken, }; async fn validate_merchant_and_get_key_store( state: &SessionState, org_id: &id_type::OrganizationId, merchant_id: &id_type::MerchantId, ) -> UserResult<MerchantKeyStore> { let key_store = state .store .get_merchant_key_store_by_merchant_id( &state.into(), merchant_id, &state.store.get_master_key().to_vec().into(), ) .await .to_not_found_response(UserErrors::InvalidThemeLineage("merchant_id".to_string()))?; let merchant_account = state .store .find_merchant_account_by_merchant_id(&state.into(), merchant_id, &key_store) .await .to_not_found_response(UserErrors::InvalidThemeLineage("merchant_id".to_string()))?; if &merchant_account.organization_id != org_id { return Err(UserErrors::InvalidThemeLineage("merchant_id".to_string()).into()); } Ok(key_store) }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/theme.rs | crate: router use common_utils::{ext_traits::AsyncExt, id_type, types::theme::ThemeLineage}; use crate::{ core::errors::{StorageErrorExt, UserErrors, UserResult}, routes::SessionState, services::authentication::UserFromToken, }; pub async fn validate_lineage(state: &SessionState, lineage: &ThemeLineage) -> UserResult<()> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/theme.rs | crate: router use common_utils::{ext_traits::AsyncExt, id_type, types::theme::ThemeLineage}; use diesel_models::user::theme::Theme; use crate::{ core::errors::{StorageErrorExt, UserErrors, UserResult}, routes::SessionState, services::authentication::UserFromToken, }; pub async fn get_most_specific_theme_using_lineage( state: &SessionState, lineage: ThemeLineage, ) -> UserResult<Option<Theme>> { { Ok(theme) => Ok(Some(theme)),<|fim_suffix|> <|fim_middle|> Err(e) => { if e.current_context().is_db_not_found() { Ok(None) } else { Err(e.change_context(UserErrors::InternalServerError)) } } } }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/theme.rs | crate: router use common_utils::{ext_traits::AsyncExt, id_type, types::theme::ThemeLineage}; use hyperswitch_domain_models::merchant_key_store::MerchantKeyStore; use crate::{ core::errors::{StorageErrorExt, UserErrors, UserResult}, routes::SessionState, services::authentication::UserFromToken, }; async fn validate_merchant_and_get_key_store( state: &SessionState, org_id: &id_type::OrganizationId, merchant_id: &id_type::MerchantId, ) -> UserResult<MerchantKeyStore> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/theme.rs | crate: router use common_utils::{ext_traits::AsyncExt, id_type, types::theme::ThemeLineage}; use diesel_models::user::theme::Theme; use crate::{ core::errors::{StorageErrorExt, UserErrors, UserResult}, routes::SessionState, services::authentication::UserFromToken, }; pub async fn get_theme_using_optional_theme_id( state: &SessionState, theme_id: Option<String>, ) -> UserResult<Option<Theme>> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/theme.rs | crate: router use common_utils::{ext_traits::AsyncExt, id_type, types::theme::ThemeLineage}; use diesel_models::user::theme::Theme; use crate::{ core::errors::{StorageErrorExt, UserErrors, UserResult}, routes::SessionState, services::authentication::UserFromToken, }; pub async fn get_most_specific_theme_using_lineage( state: &SessionState, lineage: ThemeLineage, ) -> UserResult<Option<Theme>> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/theme.rs | crate: router use common_enums::EntityType; use common_utils::{ext_traits::AsyncExt, id_type, types::theme::ThemeLineage}; use diesel_models::user::theme::Theme; use crate::{ core::errors::{StorageErrorExt, UserErrors, UserResult}, routes::SessionState, services::authentication::UserFromToken, }; pub async fn get_most_specific_theme_using_token_and_min_entity( state: &SessionState, user_from_token: &UserFromToken, min_entity: EntityType, ) -> UserResult<Option<Theme>> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/theme.rs | crate: router use common_utils::{ext_traits::AsyncExt, id_type, types::theme::ThemeLineage}; use hyperswitch_domain_models::merchant_key_store::MerchantKeyStore; use crate::{ core::errors::{StorageErrorExt, UserErrors, UserResult}, routes::SessionState, services::authentication::UserFromToken, }; async fn validate_profile( state: &SessionState, profile_id: &id_type::ProfileId, merchant_id: &id_type::MerchantId, key_store: &MerchantKeyStore, ) -> UserResult<()> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/theme.rs | crate: router use common_utils::{ext_traits::AsyncExt, id_type, types::theme::ThemeLineage}; use crate::{ core::errors::{StorageErrorExt, UserErrors, UserResult}, routes::SessionState, services::authentication::UserFromToken, }; async fn validate_merchant( state: &SessionState, org_id: &id_type::OrganizationId, merchant_id: &id_type::MerchantId, ) -> UserResult<()> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/theme.rs | crate: router use common_utils::{ext_traits::AsyncExt, id_type, types::theme::ThemeLineage}; use crate::{ core::errors::{StorageErrorExt, UserErrors, UserResult}, routes::SessionState, services::authentication::UserFromToken, }; async fn validate_org(state: &SessionState, org_id: &id_type::OrganizationId) -> UserResult<()> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/theme.rs | crate: router use common_utils::{ext_traits::AsyncExt, id_type, types::theme::ThemeLineage}; use crate::{ core::errors::{StorageErrorExt, UserErrors, UserResult}, routes::SessionState, services::authentication::UserFromToken, }; fn validate_tenant(state: &SessionState, tenant_id: &id_type::TenantId) -> UserResult<()> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/theme.rs | crate: router use std::path::PathBuf; use crate::{ core::errors::{StorageErrorExt, UserErrors, UserResult}, routes::SessionState, services::authentication::UserFromToken, }; pub async fn upload_file_to_theme_bucket( state: &SessionState, path: &PathBuf, data: Vec<u8>, ) -> UserResult<()> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/theme.rs | crate: router use std::path::PathBuf; use crate::{ core::errors::{StorageErrorExt, UserErrors, UserResult}, routes::SessionState, services::authentication::UserFromToken, }; pub async fn retrieve_file_from_theme_bucket( state: &SessionState, path: &PathBuf, ) -> UserResult<Vec<u8>> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/theme.rs | crate: router use std::path::PathBuf; use crate::{ core::errors::{StorageErrorExt, UserErrors, UserResult}, routes::SessionState, services::authentication::UserFromToken, }; fn path_buf_to_str(path: &PathBuf) -> UserResult<&str> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/theme.rs | crate: router use std::path::PathBuf; use common_utils::{ext_traits::AsyncExt, id_type, types::theme::ThemeLineage}; use diesel_models::user::theme::Theme; pub fn get_theme_file_key(theme_id: &str) -> PathBuf { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/theme.rs | crate: router use std::path::PathBuf; pub fn get_specific_file_key(theme_id: &str, file_name: &str) -> PathBuf { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/theme.rs | crate: router use std::path::PathBuf; fn get_theme_dir_key(theme_id: &str) -> PathBuf { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/dashboard_metadata.rs | crate: router use std::{net::IpAddr, ops::Not, str::FromStr}; use actix_web::http::header::HeaderMap; use api_models::user::dashboard_metadata::{ GetMetaDataRequest, GetMultipleMetaDataPayload, ProdIntent, SetMetaDataRequest, }; use common_utils::id_type; use error_stack::{report, ResultExt}; use masking::{ExposeInterface, PeekInterface, Secret}; use crate::{ core::errors::{UserErrors, UserResult}, headers, SessionState, }; pub fn set_ip_address_if_required( request: &mut SetMetaDataRequest, headers: &HeaderMap, ) -> UserResult<()> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/dashboard_metadata.rs | crate: router use api_models::user::dashboard_metadata::{ GetMetaDataRequest, GetMultipleMetaDataPayload, ProdIntent, SetMetaDataRequest, }; use diesel_models::{ enums::DashboardMetadata as DBEnum, user::dashboard_metadata::{DashboardMetadata, DashboardMetadataNew, DashboardMetadataUpdate}, }; pub fn separate_metadata_type_based_on_scope( metadata_keys: Vec<DBEnum>, ) -> (Vec<DBEnum>, Vec<DBEnum>) { <|fim_suffix|> <|fim_middle|> }
ast_fragments
// file: hyperswitch/crates/router/src/utils/user/dashboard_metadata.rs | crate: router use common_utils::id_type; use diesel_models::{ enums::DashboardMetadata as DBEnum, user::dashboard_metadata::{DashboardMetadata, DashboardMetadataNew, DashboardMetadataUpdate}, }; use masking::{ExposeInterface, PeekInterface, Secret}; use crate::{ core::errors::{UserErrors, UserResult}, headers, SessionState, }; pub async fn update_user_scoped_metadata( state: &SessionState, user_id: String, merchant_id: id_type::MerchantId, org_id: id_type::OrganizationId, metadata_key: DBEnum, metadata_value: impl serde::Serialize, ) -> UserResult<DashboardMetadata> { let data_value = serde_json::to_value(metadata_value) .change_context(UserErrors::InternalServerError) .attach_printable("Error Converting Struct To Serde Value")?; state .store .update_metadata( Some(user_id.clone()), merchant_id, org_id, metadata_key, DashboardMetadataUpdate::UpdateData { data_key: metadata_key, data_value: Secret::from(data_value), last_modified_by: user_id, }, ) .await .change_context(UserErrors::InternalServerError) }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/dashboard_metadata.rs | crate: router use common_utils::id_type; use diesel_models::{ enums::DashboardMetadata as DBEnum, user::dashboard_metadata::{DashboardMetadata, DashboardMetadataNew, DashboardMetadataUpdate}, }; use masking::{ExposeInterface, PeekInterface, Secret}; use crate::{ core::errors::{UserErrors, UserResult}, headers, SessionState, }; pub async fn update_merchant_scoped_metadata( state: &SessionState, user_id: String, merchant_id: id_type::MerchantId, org_id: id_type::OrganizationId, metadata_key: DBEnum, metadata_value: impl serde::Serialize, ) -> UserResult<DashboardMetadata> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/dashboard_metadata.rs | crate: router use common_utils::id_type; use diesel_models::{ enums::DashboardMetadata as DBEnum, user::dashboard_metadata::{DashboardMetadata, DashboardMetadataNew, DashboardMetadataUpdate}, }; use masking::{ExposeInterface, PeekInterface, Secret}; use crate::{ core::errors::{UserErrors, UserResult}, headers, SessionState, }; pub async fn insert_user_scoped_metadata_to_db( state: &SessionState, user_id: String, merchant_id: id_type::MerchantId, org_id: id_type::OrganizationId, metadata_key: DBEnum, metadata_value: impl serde::Serialize, ) -> UserResult<DashboardMetadata> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/dashboard_metadata.rs | crate: router use common_utils::id_type; use diesel_models::{ enums::DashboardMetadata as DBEnum, user::dashboard_metadata::{DashboardMetadata, DashboardMetadataNew, DashboardMetadataUpdate}, }; use masking::{ExposeInterface, PeekInterface, Secret}; use crate::{ core::errors::{UserErrors, UserResult}, headers, SessionState, }; pub async fn insert_merchant_scoped_metadata_to_db( state: &SessionState, user_id: String, merchant_id: id_type::MerchantId, org_id: id_type::OrganizationId, metadata_key: DBEnum, metadata_value: impl serde::Serialize, ) -> UserResult<DashboardMetadata> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/dashboard_metadata.rs | crate: router use std::{net::IpAddr, ops::Not, str::FromStr}; fn not_contains_string(value: Option<&str>, value_to_be_checked: &str) -> bool { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/dashboard_metadata.rs | crate: router use diesel_models::{ enums::DashboardMetadata as DBEnum, user::dashboard_metadata::{DashboardMetadata, DashboardMetadataNew, DashboardMetadataUpdate}, }; use crate::{ core::errors::{UserErrors, UserResult}, headers, SessionState, }; pub fn is_update_required(metadata: &UserResult<DashboardMetadata>) -> bool { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/dashboard_metadata.rs | crate: router use api_models::user::dashboard_metadata::{ GetMetaDataRequest, GetMultipleMetaDataPayload, ProdIntent, SetMetaDataRequest, }; use router_env::logger; pub fn is_prod_email_required(data: &ProdIntent, user_email: String) -> bool { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
// file: hyperswitch/crates/router/src/utils/user/dashboard_metadata.rs | crate: router use std::{net::IpAddr, ops::Not, str::FromStr}; fn not_contains_string(value: Option<&str>, value_to_be_checked: &str) -> bool { value.is_some_and(|mail| !mail.contains(value_to_be_checked)) }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/dashboard_metadata.rs | crate: router use api_models::user::dashboard_metadata::{ GetMetaDataRequest, GetMultipleMetaDataPayload, ProdIntent, SetMetaDataRequest, }; use diesel_models::{ enums::DashboardMetadata as DBEnum, user::dashboard_metadata::{DashboardMetadata, DashboardMetadataNew, DashboardMetadataUpdate}, }; use crate::{ core::errors::{UserErrors, UserResult}, headers, SessionState, }; pub fn parse_string_to_enums(query: String) -> UserResult<GetMultipleMetaDataPayload> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/dashboard_metadata.rs | crate: router use diesel_models::{ enums::DashboardMetadata as DBEnum, user::dashboard_metadata::{DashboardMetadata, DashboardMetadataNew, DashboardMetadataUpdate}, }; pub fn is_backfill_required(metadata_key: DBEnum) -> bool { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/dashboard_metadata.rs | crate: router use diesel_models::{ enums::DashboardMetadata as DBEnum, user::dashboard_metadata::{DashboardMetadata, DashboardMetadataNew, DashboardMetadataUpdate}, }; use crate::{ core::errors::{UserErrors, UserResult}, headers, SessionState, }; pub fn is_update_required(metadata: &UserResult<DashboardMetadata>) -> bool { { Ok(_) => false,<|fim_suffix|> <|fim_middle|> Err(e) => matches!(e.current_context(), UserErrors::MetadataAlreadySet), } }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/dashboard_metadata.rs | crate: router use diesel_models::{ enums::DashboardMetadata as DBEnum, user::dashboard_metadata::{DashboardMetadata, DashboardMetadataNew, DashboardMetadataUpdate}, }; use crate::{ core::errors::{UserErrors, UserResult}, headers, SessionState, }; pub fn deserialize_to_response<T>(data: Option<&DashboardMetadata>) -> UserResult<Option<T>> where T: serde::de::DeserializeOwned, { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/dashboard_metadata.rs | crate: router use common_utils::id_type; use diesel_models::{ enums::DashboardMetadata as DBEnum, user::dashboard_metadata::{DashboardMetadata, DashboardMetadataNew, DashboardMetadataUpdate}, }; use crate::{ core::errors::{UserErrors, UserResult}, headers, SessionState, }; pub async fn get_user_scoped_metadata_from_db( state: &SessionState, user_id: String, merchant_id: id_type::MerchantId, org_id: id_type::OrganizationId, metadata_keys: Vec<DBEnum>, ) -> UserResult<Vec<DashboardMetadata>> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/dashboard_metadata.rs | crate: router use common_utils::id_type; use diesel_models::{ enums::DashboardMetadata as DBEnum, user::dashboard_metadata::{DashboardMetadata, DashboardMetadataNew, DashboardMetadataUpdate}, }; use crate::{ core::errors::{UserErrors, UserResult}, headers, SessionState, }; pub async fn get_merchant_scoped_metadata_from_db( state: &SessionState, merchant_id: id_type::MerchantId, org_id: id_type::OrganizationId, metadata_keys: Vec<DBEnum>, ) -> UserResult<Vec<DashboardMetadata>> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/password.rs | crate: router use argon2::{ password_hash::{ rand_core::OsRng, Error as argon2Err, PasswordHash, PasswordHasher, PasswordVerifier, SaltString, }, Argon2, }; use common_utils::errors::CustomResult; use masking::{ExposeInterface, PeekInterface, Secret}; use crate::core::errors::UserErrors; pub fn is_correct_password( candidate: &Secret<String>, password: &Secret<String>, ) -> CustomResult<bool, UserErrors> { { Ok(_) => Ok(true),<|fim_suffix|> <|fim_middle|> Err(e) => Err(e), } }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/password.rs | crate: router use masking::{ExposeInterface, PeekInterface, Secret}; use rand::{seq::SliceRandom, Rng}; pub fn get_temp_password() -> Secret<String> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/password.rs | crate: router use common_utils::errors::CustomResult; use masking::{ExposeInterface, PeekInterface, Secret}; use crate::core::errors::UserErrors; pub fn get_index_for_correct_recovery_code( candidate: &Secret<String>, recovery_codes: &[Secret<String>], ) -> CustomResult<Option<usize>, UserErrors> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/password.rs | crate: router use argon2::{ password_hash::{ rand_core::OsRng, Error as argon2Err, PasswordHash, PasswordHasher, PasswordVerifier, SaltString, }, Argon2, }; use common_utils::errors::CustomResult; use masking::{ExposeInterface, PeekInterface, Secret}; use crate::core::errors::UserErrors; pub fn is_correct_password( candidate: &Secret<String>, password: &Secret<String>, ) -> CustomResult<bool, UserErrors> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/password.rs | crate: router use argon2::{ password_hash::{ rand_core::OsRng, Error as argon2Err, PasswordHash, PasswordHasher, PasswordVerifier, SaltString, }, Argon2, }; use common_utils::errors::CustomResult; use masking::{ExposeInterface, PeekInterface, Secret}; use crate::core::errors::UserErrors; pub fn generate_password_hash( password: Secret<String>, ) -> CustomResult<Secret<String>, UserErrors> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/two_factor_auth.rs | crate: router use crate::{ consts, core::errors::{UserErrors, UserResult}, routes::SessionState, }; pub async fn insert_totp_attempts_in_redis( state: &SessionState, user_id: &str, user_totp_attempts: u8, ) -> UserResult<()> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/two_factor_auth.rs | crate: router use crate::{ consts, core::errors::{UserErrors, UserResult}, routes::SessionState, }; pub async fn delete_recovery_code_attempts_from_redis( state: &SessionState, user_id: &str, ) -> UserResult<()> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/two_factor_auth.rs | crate: router use crate::{ consts, core::errors::{UserErrors, UserResult}, routes::SessionState, }; pub async fn delete_totp_attempts_from_redis( state: &SessionState, user_id: &str, ) -> UserResult<()> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/two_factor_auth.rs | crate: router use crate::{ consts, core::errors::{UserErrors, UserResult}, routes::SessionState, }; pub async fn get_recovery_code_attempts_from_redis( state: &SessionState, user_id: &str, ) -> UserResult<u8> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/two_factor_auth.rs | crate: router use crate::{ consts, core::errors::{UserErrors, UserResult}, routes::SessionState, }; pub async fn insert_recovery_code_attempts_in_redis( state: &SessionState, user_id: &str, user_recovery_code_attempts: u8, ) -> UserResult<()> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/two_factor_auth.rs | crate: router use crate::{ consts, core::errors::{UserErrors, UserResult}, routes::SessionState, }; pub async fn get_totp_attempts_from_redis(state: &SessionState, user_id: &str) -> UserResult<u8> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
// file: hyperswitch/crates/router/src/utils/user/two_factor_auth.rs | crate: router use crate::{ consts, core::errors::{UserErrors, UserResult}, routes::SessionState, }; pub async fn insert_totp_attempts_in_redis( state: &SessionState, user_id: &str, user_totp_attempts: u8, ) -> UserResult<()> { let redis_conn = super::get_redis_connection(state)?; redis_conn .set_key_with_expiry( &get_totp_attempts_key(user_id).into(), user_totp_attempts, consts::user::REDIS_TOTP_ATTEMPTS_TTL_IN_SECS, ) .await .change_context(UserErrors::InternalServerError) }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/two_factor_auth.rs | crate: router use crate::{ consts, core::errors::{UserErrors, UserResult}, routes::SessionState, }; fn get_recovery_code_attempts_key(user_id: &str) -> String { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/two_factor_auth.rs | crate: router use crate::{ consts, core::errors::{UserErrors, UserResult}, routes::SessionState, }; fn get_totp_attempts_key(user_id: &str) -> String { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/two_factor_auth.rs | crate: router use crate::{ consts, core::errors::{UserErrors, UserResult}, routes::SessionState, }; pub async fn delete_recovery_code_from_redis( state: &SessionState, user_id: &str, ) -> UserResult<()> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/two_factor_auth.rs | crate: router use crate::{ consts, core::errors::{UserErrors, UserResult}, routes::SessionState, }; pub async fn delete_totp_from_redis(state: &SessionState, user_id: &str) -> UserResult<()> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/two_factor_auth.rs | crate: router use common_utils::pii; use crate::{ consts, core::errors::{UserErrors, UserResult}, routes::SessionState, }; pub async fn insert_recovery_code_in_redis(state: &SessionState, user_id: &str) -> UserResult<()> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/two_factor_auth.rs | crate: router use crate::{ consts, core::errors::{UserErrors, UserResult}, routes::SessionState, }; fn get_totp_secret_key(user_id: &str) -> String { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/two_factor_auth.rs | crate: router use crate::{ consts, core::errors::{UserErrors, UserResult}, routes::SessionState, }; pub async fn delete_totp_secret_from_redis(state: &SessionState, user_id: &str) -> UserResult<()> { <|fim_suffix|> <|fim_middle|> }
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/two_factor_auth.rs | crate: router use masking::{ExposeInterface, PeekInterface}; use crate::{ consts, core::errors::{UserErrors, UserResult}, routes::SessionState, }; pub async fn get_totp_secret_from_redis( state: &SessionState, user_id: &str, ) -> UserResult<Option<masking::Secret<String>>> { {<|fim_suffix|> <|fim_middle|> }}
ast_fragments
<|fim_prefix|> // file: hyperswitch/crates/router/src/utils/user/two_factor_auth.rs | crate: router use masking::{ExposeInterface, PeekInterface}; use crate::{ consts, core::errors::{UserErrors, UserResult}, routes::SessionState, }; pub async fn insert_totp_secret_in_redis( state: &SessionState, user_id: &str, secret: &masking::Secret<String>, ) -> UserResult<()> { <|fim_suffix|> <|fim_middle|> }
ast_fragments