Add files using upload-large-folder tool
Browse filesThis view is limited to 50 files because it contains too many changes. See raw diff
- diffs/pr_10047/155d63c/diff.json +0 -0
- diffs/pr_10047/6781231/diff.json +6 -0
- diffs/pr_10047/9053d0a/diff.json +24 -0
- diffs/pr_10047/92c3a69/diff.json +6 -0
- diffs/pr_10047/f05ee11/diff.json +0 -0
- diffs/pr_10234/a0e072e/diff.json +67 -0
- diffs/pr_10282/054cfa4/diff.json +33 -0
- diffs/pr_10282/3c255ac/diff.json +169 -0
- diffs/pr_10282/4d87cd9/diff.json +24 -0
- diffs/pr_10282/65e29ce/diff.json +0 -0
- diffs/pr_10282/6ea2fff/diff.json +0 -0
- diffs/pr_10282/8ef79f3/diff.json +169 -0
- diffs/pr_10282/b83667d/diff.json +24 -0
- diffs/pr_10282/bc6c392/diff.json +24 -0
- diffs/pr_10282/e13c8a0/diff.json +24 -0
- diffs/pr_10326/9e82c74/diff.json +24 -0
- diffs/pr_6687/ee37bb7/diff.json +0 -0
- diffs/pr_6734/0793d2b/diff.json +24 -0
- diffs/pr_6734/0a3d671/diff.json +0 -0
- diffs/pr_6734/4ead56c/diff.json +0 -0
- diffs/pr_6734/5199422/diff.json +0 -0
- diffs/pr_6734/5d6f6eb/diff.json +53 -0
- diffs/pr_6734/62b63b6/diff.json +0 -0
- diffs/pr_6734/7aef96e/diff.json +556 -0
- diffs/pr_6734/8d5c164/diff.json +151 -0
- diffs/pr_6734/998f990/diff.json +101 -0
- diffs/pr_6734/b830c16/diff.json +24 -0
- diffs/pr_6734/e565311/diff.json +57 -0
- diffs/pr_6734/f04391a/diff.json +85 -0
- diffs/pr_6734/f8980db/diff.json +0 -0
- diffs/pr_6752/b02793b/diff.json +6 -0
- diffs/pr_8219/07bbeba/diff.json +85 -0
- diffs/pr_8219/0e6e5e4/diff.json +6 -0
- diffs/pr_8219/254e79a/diff.json +6 -0
- diffs/pr_8219/2ab8927/diff.json +54 -0
- diffs/pr_8219/2efd31e/diff.json +0 -0
- diffs/pr_8219/394b229/diff.json +6 -0
- diffs/pr_8219/3f188d3/diff.json +57 -0
- diffs/pr_8219/42463c8/diff.json +6 -0
- diffs/pr_8219/4823363/diff.json +8 -0
- diffs/pr_8219/5acc8d2/diff.json +70 -0
- diffs/pr_8219/621fb90/diff.json +0 -0
- diffs/pr_8219/8b42528/diff.json +0 -0
- diffs/pr_8219/8d3dc9f/diff.json +6 -0
- diffs/pr_8219/a3db16f/diff.json +0 -0
- diffs/pr_8219/b59a3eb/diff.json +24 -0
- diffs/pr_8219/bd1ce27/diff.json +64 -0
- diffs/pr_8219/bdae9fc/diff.json +58 -0
- diffs/pr_8219/d277913/diff.json +59 -0
- diffs/pr_8219/daeff5d/diff.json +24 -0
diffs/pr_10047/155d63c/diff.json
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
diffs/pr_10047/6781231/diff.json
ADDED
|
@@ -0,0 +1,6 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "67812310188202b0adfe55e21f2984c67a796c06",
|
| 3 |
+
"pr_number": 10047,
|
| 4 |
+
"rust_files": [],
|
| 5 |
+
"diffs": []
|
| 6 |
+
}
|
diffs/pr_10047/9053d0a/diff.json
ADDED
|
@@ -0,0 +1,24 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "9053d0a8f9c7189cafd7106dd1a885d148587260",
|
| 3 |
+
"pr_number": 10047,
|
| 4 |
+
"rust_files": [
|
| 5 |
+
"crates/router/src/core/payments/access_token.rs"
|
| 6 |
+
],
|
| 7 |
+
"diffs": [
|
| 8 |
+
{
|
| 9 |
+
"id": "crates/router/src/core/payments/access_token.rs::function::add_access_token",
|
| 10 |
+
"file": "crates/router/src/core/payments/access_token.rs",
|
| 11 |
+
"kind": "function_item",
|
| 12 |
+
"status": "modified",
|
| 13 |
+
"code_changed": true,
|
| 14 |
+
"imports_changed": false,
|
| 15 |
+
"before_code": "pub async fn add_access_token<\n F: Clone + 'static,\n Req: Debug + Clone + 'static,\n Res: Debug + Clone + 'static,\n>(\n state: &SessionState,\n connector: &api_types::ConnectorData,\n router_data: &types::RouterData<F, Req, Res>,\n creds_identifier: Option<&str>,\n) -> RouterResult<types::AddAccessTokenResult> {\n if connector\n .connector_name\n .supports_access_token(router_data.payment_method)\n {\n let merchant_id = &router_data.merchant_id;\n let store = &*state.store;\n\n // `merchant_connector_id` may not be present in the below cases\n // - when straight through routing is used without passing the `merchant_connector_id`\n // - when creds identifier is passed\n //\n // In these cases fallback to `connector_name`.\n // We cannot use multiple merchant connector account in these cases\n let merchant_connector_id_or_connector_name = connector\n .merchant_connector_id\n .clone()\n .map(|mca_id| mca_id.get_string_repr().to_string())\n .or(creds_identifier.map(|id| id.to_string()))\n .unwrap_or(connector.connector_name.to_string());\n\n let old_access_token = if connector.connector.id() == \"santander\" {\n None\n } else {\n store\n .get_access_token(merchant_id, &merchant_connector_id_or_connector_name)\n .await\n .change_context(errors::ApiErrorResponse::InternalServerError)\n .attach_printable(\"DB error when accessing the access token\")?\n };\n\n let res = match old_access_token {\n Some(access_token) => {\n router_env::logger::debug!(\n \"Access token found in redis for merchant_id: {:?}, payment_id: {:?}, connector: {} which has expiry of: {} seconds\",\n merchant_id,\n router_data.payment_id,\n connector.connector_name,\n access_token.expires\n );\n metrics::ACCESS_TOKEN_CACHE_HIT.add(\n 1,\n router_env::metric_attributes!((\n \"connector\",\n connector.connector_name.to_string()\n )),\n );\n Ok(Some(access_token))\n }\n None => {\n metrics::ACCESS_TOKEN_CACHE_MISS.add(\n 1,\n router_env::metric_attributes!((\n \"connector\",\n connector.connector_name.to_string()\n )),\n );\n\n let authentication_token =\n execute_authentication_token(state, connector, router_data).await?;\n\n let cloned_router_data = router_data.clone();\n\n let refresh_token_request_data = types::AccessTokenRequestData::try_from((\n router_data.connector_auth_type.clone(),\n authentication_token,\n ))\n .attach_printable(\n \"Could not create access token request, invalid connector account credentials\",\n )?;\n\n let refresh_token_response_data: Result<types::AccessToken, types::ErrorResponse> =\n Err(types::ErrorResponse::default());\n let refresh_token_router_data = payments::helpers::router_data_type_conversion::<\n _,\n api_types::AccessTokenAuth,\n _,\n _,\n _,\n _,\n >(\n cloned_router_data,\n refresh_token_request_data,\n refresh_token_response_data,\n );\n refresh_connector_auth(state, connector, &refresh_token_router_data)\n .await?\n .async_map(|access_token| async move {\n let store = &*state.store;\n\n // The expiry should be adjusted for network delays from the connector\n // The access token might not have been expired when request is sent\n // But once it reaches the connector, it might expire because of the network delay\n // Subtract few seconds from the expiry in order to account for these network delays\n // This will reduce the expiry time by `REDUCE_ACCESS_TOKEN_EXPIRY_TIME` seconds\n let modified_access_token_with_expiry = types::AccessToken {\n expires: access_token\n .expires\n .saturating_sub(consts::REDUCE_ACCESS_TOKEN_EXPIRY_TIME.into()),\n ..access_token\n };\n\n logger::debug!(\n access_token_expiry_after_modification =\n modified_access_token_with_expiry.expires\n );\n\n if let Err(access_token_set_error) = store\n .set_access_token(\n merchant_id,\n &merchant_connector_id_or_connector_name,\n modified_access_token_with_expiry.clone(),\n )\n .await\n .change_context(errors::ApiErrorResponse::InternalServerError)\n .attach_printable(\"DB error when setting the access token\")\n {\n // If we are not able to set the access token in redis, the error should just be logged and proceed with the payment\n // Payments should not fail, once the access token is successfully created\n // The next request will create new access token, if required\n logger::error!(access_token_set_error=?access_token_set_error);\n }\n Some(modified_access_token_with_expiry)\n })\n .await\n }\n };\n\n Ok(types::AddAccessTokenResult {\n access_token_result: res,\n connector_supports_access_token: true,\n })\n } else {\n Ok(types::AddAccessTokenResult {\n access_token_result: Err(types::ErrorResponse::default()),\n connector_supports_access_token: false,\n })\n }\n}",
|
| 16 |
+
"after_code": "pub async fn add_access_token<\n F: Clone + 'static,\n Req: Debug + Clone + 'static,\n Res: Debug + Clone + 'static,\n>(\n state: &SessionState,\n connector: &api_types::ConnectorData,\n router_data: &types::RouterData<F, Req, Res>,\n creds_identifier: Option<&str>,\n) -> RouterResult<types::AddAccessTokenResult> {\n if connector\n .connector_name\n .supports_access_token(router_data.payment_method)\n {\n let merchant_id = &router_data.merchant_id;\n let store = &*state.store;\n\n // `merchant_connector_id` may not be present in the below cases\n // - when straight through routing is used without passing the `merchant_connector_id`\n // - when creds identifier is passed\n //\n // In these cases fallback to `connector_name`.\n // We cannot use multiple merchant connector account in these cases\n let merchant_connector_id_or_connector_name = connector\n .merchant_connector_id\n .clone()\n .map(|mca_id| mca_id.get_string_repr().to_string())\n .or(creds_identifier.map(|id| id.to_string()))\n .unwrap_or(connector.connector_name.to_string());\n\n let old_access_token = store\n .get_access_token(merchant_id, &merchant_connector_id_or_connector_name)\n .await\n .change_context(errors::ApiErrorResponse::InternalServerError)\n .attach_printable(\"DB error when accessing the access token\")?;\n\n let res = match old_access_token {\n Some(access_token) => {\n router_env::logger::debug!(\n \"Access token found in redis for merchant_id: {:?}, payment_id: {:?}, connector: {} which has expiry of: {} seconds\",\n merchant_id,\n router_data.payment_id,\n connector.connector_name,\n access_token.expires\n );\n metrics::ACCESS_TOKEN_CACHE_HIT.add(\n 1,\n router_env::metric_attributes!((\n \"connector\",\n connector.connector_name.to_string()\n )),\n );\n Ok(Some(access_token))\n }\n None => {\n metrics::ACCESS_TOKEN_CACHE_MISS.add(\n 1,\n router_env::metric_attributes!((\n \"connector\",\n connector.connector_name.to_string()\n )),\n );\n\n let authentication_token =\n execute_authentication_token(state, connector, router_data).await?;\n\n let cloned_router_data = router_data.clone();\n\n let refresh_token_request_data = types::AccessTokenRequestData::try_from((\n router_data.connector_auth_type.clone(),\n authentication_token,\n ))\n .attach_printable(\n \"Could not create access token request, invalid connector account credentials\",\n )?;\n\n let refresh_token_response_data: Result<types::AccessToken, types::ErrorResponse> =\n Err(types::ErrorResponse::default());\n let refresh_token_router_data = payments::helpers::router_data_type_conversion::<\n _,\n api_types::AccessTokenAuth,\n _,\n _,\n _,\n _,\n >(\n cloned_router_data,\n refresh_token_request_data,\n refresh_token_response_data,\n );\n refresh_connector_auth(state, connector, &refresh_token_router_data)\n .await?\n .async_map(|access_token| async move {\n let store = &*state.store;\n\n // The expiry should be adjusted for network delays from the connector\n // The access token might not have been expired when request is sent\n // But once it reaches the connector, it might expire because of the network delay\n // Subtract few seconds from the expiry in order to account for these network delays\n // This will reduce the expiry time by `REDUCE_ACCESS_TOKEN_EXPIRY_TIME` seconds\n let modified_access_token_with_expiry = types::AccessToken {\n expires: access_token\n .expires\n .saturating_sub(consts::REDUCE_ACCESS_TOKEN_EXPIRY_TIME.into()),\n ..access_token\n };\n\n logger::debug!(\n access_token_expiry_after_modification =\n modified_access_token_with_expiry.expires\n );\n\n if let Err(access_token_set_error) = store\n .set_access_token(\n merchant_id,\n &merchant_connector_id_or_connector_name,\n modified_access_token_with_expiry.clone(),\n )\n .await\n .change_context(errors::ApiErrorResponse::InternalServerError)\n .attach_printable(\"DB error when setting the access token\")\n {\n // If we are not able to set the access token in redis, the error should just be logged and proceed with the payment\n // Payments should not fail, once the access token is successfully created\n // The next request will create new access token, if required\n logger::error!(access_token_set_error=?access_token_set_error);\n }\n Some(modified_access_token_with_expiry)\n })\n .await\n }\n };\n\n Ok(types::AddAccessTokenResult {\n access_token_result: res,\n connector_supports_access_token: true,\n })\n } else {\n Ok(types::AddAccessTokenResult {\n access_token_result: Err(types::ErrorResponse::default()),\n connector_supports_access_token: false,\n })\n }\n}",
|
| 17 |
+
"diff_span": {
|
| 18 |
+
"before": " .unwrap_or(connector.connector_name.to_string());\n\n let old_access_token = if connector.connector.id() == \"santander\" {\n None\n } else {\n store\n .get_access_token(merchant_id, &merchant_connector_id_or_connector_name)\n .await\n .change_context(errors::ApiErrorResponse::InternalServerError)\n .attach_printable(\"DB error when accessing the access token\")?\n };\n\n let res = match old_access_token {",
|
| 19 |
+
"after": " .unwrap_or(connector.connector_name.to_string());\n\n let old_access_token = store\n .get_access_token(merchant_id, &merchant_connector_id_or_connector_name)\n .await\n .change_context(errors::ApiErrorResponse::InternalServerError)\n .attach_printable(\"DB error when accessing the access token\")?;\n\n let res = match old_access_token {"
|
| 20 |
+
},
|
| 21 |
+
"commit_sha": "9053d0a8f9c7189cafd7106dd1a885d148587260"
|
| 22 |
+
}
|
| 23 |
+
]
|
| 24 |
+
}
|
diffs/pr_10047/92c3a69/diff.json
ADDED
|
@@ -0,0 +1,6 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "92c3a6934298b6f56349d759b325531c6ba6918a",
|
| 3 |
+
"pr_number": 10047,
|
| 4 |
+
"rust_files": [],
|
| 5 |
+
"diffs": []
|
| 6 |
+
}
|
diffs/pr_10047/f05ee11/diff.json
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
diffs/pr_10234/a0e072e/diff.json
ADDED
|
@@ -0,0 +1,67 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "a0e072e2fe654a251c96ef0ca9eb7736dc02602c",
|
| 3 |
+
"pr_number": 10234,
|
| 4 |
+
"rust_files": [
|
| 5 |
+
"crates/router/src/core/unified_connector_service/transformers.rs"
|
| 6 |
+
],
|
| 7 |
+
"diffs": [
|
| 8 |
+
{
|
| 9 |
+
"id": "crates/router/src/core/unified_connector_service/transformers.rs::Result<(PaymentsResponseData, AttemptStatus), ErrorResponse>::function::foreign_try_from",
|
| 10 |
+
"file": "crates/router/src/core/unified_connector_service/transformers.rs",
|
| 11 |
+
"kind": "function_item",
|
| 12 |
+
"status": "modified",
|
| 13 |
+
"code_changed": true,
|
| 14 |
+
"imports_changed": true,
|
| 15 |
+
"before_code": "fn foreign_try_from(\n response: payments_grpc::PaymentServiceVoidResponse,\n ) -> Result<Self, Self::Error> {\n let connector_response_reference_id =\n response.response_ref_id.as_ref().and_then(|identifier| {\n identifier\n .id_type\n .clone()\n .and_then(|id_type| match id_type {\n payments_grpc::identifier::IdType::Id(id) => Some(id),\n payments_grpc::identifier::IdType::EncodedData(encoded_data) => {\n Some(encoded_data)\n }\n payments_grpc::identifier::IdType::NoResponseIdMarker(_) => None,\n })\n });\n\n let status_code = convert_connector_service_status_code(response.status_code)?;\n\n let response = if response.error_code.is_some() {\n let attempt_status = match response.status() {\n payments_grpc::PaymentStatus::AttemptStatusUnspecified => None,\n _ => Some(AttemptStatus::foreign_try_from(response.status())?),\n };\n\n Err(ErrorResponse {\n code: response.error_code().to_owned(),\n message: response.error_message().to_owned(),\n reason: Some(response.error_message().to_owned()),\n status_code,\n attempt_status,\n connector_transaction_id: connector_response_reference_id,\n network_decline_code: None,\n network_advice_code: None,\n network_error_message: None,\n connector_metadata: None,\n })\n } else {\n let status = AttemptStatus::foreign_try_from(response.status())?;\n\n Ok((\n PaymentsResponseData::TransactionResponse {\n resource_id: response\n .transaction_id\n .as_ref()\n .and_then(|identifier| {\n identifier\n .id_type\n .clone()\n .and_then(|id_type| match id_type {\n payments_grpc::identifier::IdType::Id(id) => Some(\n router_request_types::ResponseId::ConnectorTransactionId(\n id,\n ),\n ),\n payments_grpc::identifier::IdType::EncodedData(\n encoded_data,\n ) => Some(\n router_request_types::ResponseId::ConnectorTransactionId(\n encoded_data,\n ),\n ),\n payments_grpc::identifier::IdType::NoResponseIdMarker(_) => {\n None\n }\n })\n })\n .unwrap_or(router_request_types::ResponseId::NoResponseId),\n redirection_data: Box::new(None),\n mandate_reference: Box::new(response.mandate_reference.map(|grpc_mandate| {\n hyperswitch_domain_models::router_response_types::MandateReference {\n connector_mandate_id: grpc_mandate.mandate_id,\n payment_method_id: grpc_mandate.payment_method_id,\n mandate_metadata: None,\n connector_mandate_request_reference_id: None,\n }\n })),\n connector_metadata: None,\n network_txn_id: None,\n connector_response_reference_id,\n incremental_authorization_allowed: response.incremental_authorization_allowed,\n charges: None,\n },\n status,\n ))\n };\n\n Ok(response)\n }",
|
| 16 |
+
"after_code": "fn foreign_try_from(\n response: payments_grpc::PaymentServiceVoidResponse,\n ) -> Result<Self, Self::Error> {\n let connector_response_reference_id =\n response.response_ref_id.as_ref().and_then(|identifier| {\n identifier\n .id_type\n .clone()\n .and_then(|id_type| match id_type {\n payments_grpc::identifier::IdType::Id(id) => Some(id),\n payments_grpc::identifier::IdType::EncodedData(encoded_data) => {\n Some(encoded_data)\n }\n payments_grpc::identifier::IdType::NoResponseIdMarker(_) => None,\n })\n });\n\n let status_code = convert_connector_service_status_code(response.status_code)?;\n\n // Extract connector_metadata from response if present\n let connector_metadata = (!response.connector_metadata.is_empty())\n .then(|| {\n serde_json::to_value(&response.connector_metadata)\n .map_err(|e| {\n tracing::warn!(\n serialization_error=?e,\n metadata=?response.connector_metadata,\n \"Failed to serialize connector_metadata from UCS void response\"\n );\n e\n })\n .ok()\n })\n .flatten();\n\n let response = if response.error_code.is_some() {\n let attempt_status = match response.status() {\n payments_grpc::PaymentStatus::AttemptStatusUnspecified => None,\n _ => Some(AttemptStatus::foreign_try_from(response.status())?),\n };\n\n Err(ErrorResponse {\n code: response.error_code().to_owned(),\n message: response.error_message().to_owned(),\n reason: Some(response.error_message().to_owned()),\n status_code,\n attempt_status,\n connector_transaction_id: connector_response_reference_id,\n network_decline_code: None,\n network_advice_code: None,\n network_error_message: None,\n connector_metadata: None,\n })\n } else {\n let status = AttemptStatus::foreign_try_from(response.status())?;\n\n Ok((\n PaymentsResponseData::TransactionResponse {\n resource_id: response\n .transaction_id\n .as_ref()\n .and_then(|identifier| {\n identifier\n .id_type\n .clone()\n .and_then(|id_type| match id_type {\n payments_grpc::identifier::IdType::Id(id) => Some(\n router_request_types::ResponseId::ConnectorTransactionId(\n id,\n ),\n ),\n payments_grpc::identifier::IdType::EncodedData(\n encoded_data,\n ) => Some(\n router_request_types::ResponseId::ConnectorTransactionId(\n encoded_data,\n ),\n ),\n payments_grpc::identifier::IdType::NoResponseIdMarker(_) => {\n None\n }\n })\n })\n .unwrap_or(router_request_types::ResponseId::NoResponseId),\n redirection_data: Box::new(None),\n mandate_reference: Box::new(response.mandate_reference.map(|grpc_mandate| {\n hyperswitch_domain_models::router_response_types::MandateReference {\n connector_mandate_id: grpc_mandate.mandate_id,\n payment_method_id: grpc_mandate.payment_method_id,\n mandate_metadata: None,\n connector_mandate_request_reference_id: None,\n }\n })),\n connector_metadata,\n network_txn_id: None,\n connector_response_reference_id,\n incremental_authorization_allowed: response.incremental_authorization_allowed,\n charges: None,\n },\n status,\n ))\n };\n\n Ok(response)\n }",
|
| 17 |
+
"diff_span": {
|
| 18 |
+
"before": " }\n })),\n connector_metadata: None,\n network_txn_id: None,\n connector_response_reference_id,",
|
| 19 |
+
"after": "\n let status_code = convert_connector_service_status_code(response.status_code)?;\n\n // Extract connector_metadata from response if present\n let connector_metadata = (!response.connector_metadata.is_empty())\n .then(|| {\n serde_json::to_value(&response.connector_metadata)\n .map_err(|e| {\n tracing::warn!(\n serialization_error=?e,\n metadata=?response.connector_metadata,\n \"Failed to serialize connector_metadata from UCS void response\"\n );\n e\n })\n .ok()\n })\n .flatten();\n\n let response = if response.error_code.is_some() {\n let attempt_status = match response.status() {\n payments_grpc::PaymentStatus::AttemptStatusUnspecified => None,\n _ => Some(AttemptStatus::foreign_try_from(response.status())?),\n };\n\n Err(ErrorResponse {\n code: response.error_code().to_owned(),\n message: response.error_message().to_owned(),\n reason: Some(response.error_message().to_owned()),\n status_code,\n attempt_status,\n connector_transaction_id: connector_response_reference_id,\n network_decline_code: None,\n network_advice_code: None,\n network_error_message: None,\n connector_metadata: None,\n })\n } else {\n let status = AttemptStatus::foreign_try_from(response.status())?;\n\n Ok((\n PaymentsResponseData::TransactionResponse {\n resource_id: response\n .transaction_id\n .as_ref()\n .and_then(|identifier| {\n identifier\n .id_type\n .clone()\n .and_then(|id_type| match id_type {\n payments_grpc::identifier::IdType::Id(id) => Some(\n router_request_types::ResponseId::ConnectorTransactionId(\n id,\n ),\n ),\n payments_grpc::identifier::IdType::EncodedData(\n encoded_data,\n ) => Some(\n router_request_types::ResponseId::ConnectorTransactionId(\n encoded_data,\n ),\n ),\n payments_grpc::identifier::IdType::NoResponseIdMarker(_) => {\n None\n }\n })\n })\n .unwrap_or(router_request_types::ResponseId::NoResponseId),\n redirection_data: Box::new(None),\n mandate_reference: Box::new(response.mandate_reference.map(|grpc_mandate| {\n hyperswitch_domain_models::router_response_types::MandateReference {\n connector_mandate_id: grpc_mandate.mandate_id,\n payment_method_id: grpc_mandate.payment_method_id,\n mandate_metadata: None,\n connector_mandate_request_reference_id: None,\n }\n })),\n connector_metadata,\n network_txn_id: None,\n connector_response_reference_id,"
|
| 20 |
+
},
|
| 21 |
+
"commit_sha": "a0e072e2fe654a251c96ef0ca9eb7736dc02602c",
|
| 22 |
+
"before_imports": [
|
| 23 |
+
"use unified_connector_service_client::payments::{\n self as payments_grpc, ConnectorState, Identifier, PaymentServiceTransformRequest,\n PaymentServiceTransformResponse,\n};",
|
| 24 |
+
"use common_enums::{AttemptStatus, AuthenticationType, RefundStatus};",
|
| 25 |
+
"use hyperswitch_domain_models::{\n router_data::{AccessToken, ErrorResponse, RouterData},\n router_flow_types::{\n payments::{Authorize, Capture, PSync, SetupMandate},\n refunds::{Execute, RSync},\n unified_authentication_service as uas_flows, ExternalVaultProxy,\n },\n router_request_types::{\n self, AuthenticationData, ExternalVaultProxyPaymentsData, PaymentsAuthorizeData,\n PaymentsCancelData, PaymentsCaptureData, PaymentsSyncData, RefundsData,\n SetupMandateRequestData,\n },\n router_response_types::{PaymentsResponseData, RedirectForm, RefundsResponseData},\n};",
|
| 26 |
+
"use crate::{\n core::{errors, unified_connector_service},\n types::{\n api,\n transformers::{self, ForeignFrom},\n },\n};"
|
| 27 |
+
],
|
| 28 |
+
"after_imports": [
|
| 29 |
+
"use unified_connector_service_client::payments::{\n self as payments_grpc, ConnectorState, Identifier, PaymentServiceTransformRequest,\n PaymentServiceTransformResponse,\n};",
|
| 30 |
+
"use router_env::tracing;",
|
| 31 |
+
"use common_enums::{AttemptStatus, AuthenticationType, RefundStatus};",
|
| 32 |
+
"use hyperswitch_domain_models::{\n router_data::{AccessToken, ErrorResponse, RouterData},\n router_flow_types::{\n payments::{Authorize, Capture, PSync, SetupMandate},\n refunds::{Execute, RSync},\n unified_authentication_service as uas_flows, ExternalVaultProxy,\n },\n router_request_types::{\n self, AuthenticationData, ExternalVaultProxyPaymentsData, PaymentsAuthorizeData,\n PaymentsCancelData, PaymentsCaptureData, PaymentsSyncData, RefundsData,\n SetupMandateRequestData,\n },\n router_response_types::{PaymentsResponseData, RedirectForm, RefundsResponseData},\n};",
|
| 33 |
+
"use crate::{\n core::{errors, unified_connector_service},\n types::{\n api,\n transformers::{self, ForeignFrom},\n },\n};"
|
| 34 |
+
]
|
| 35 |
+
},
|
| 36 |
+
{
|
| 37 |
+
"id": "crates/router/src/core/unified_connector_service/transformers.rs::impl::Result<(PaymentsResponseData, AttemptStatus), ErrorResponse>",
|
| 38 |
+
"file": "crates/router/src/core/unified_connector_service/transformers.rs",
|
| 39 |
+
"kind": "impl_item",
|
| 40 |
+
"status": "modified",
|
| 41 |
+
"code_changed": true,
|
| 42 |
+
"imports_changed": true,
|
| 43 |
+
"before_code": "impl transformers::ForeignTryFrom<payments_grpc::PaymentServiceVoidResponse>\n for Result<(PaymentsResponseData, AttemptStatus), ErrorResponse>\n{\n type Error = error_stack::Report<UnifiedConnectorServiceError>;\n\n fn foreign_try_from(\n response: payments_grpc::PaymentServiceVoidResponse,\n ) -> Result<Self, Self::Error> {\n let connector_response_reference_id =\n response.response_ref_id.as_ref().and_then(|identifier| {\n identifier\n .id_type\n .clone()\n .and_then(|id_type| match id_type {\n payments_grpc::identifier::IdType::Id(id) => Some(id),\n payments_grpc::identifier::IdType::EncodedData(encoded_data) => {\n Some(encoded_data)\n }\n payments_grpc::identifier::IdType::NoResponseIdMarker(_) => None,\n })\n });\n\n let status_code = convert_connector_service_status_code(response.status_code)?;\n\n let response = if response.error_code.is_some() {\n let attempt_status = match response.status() {\n payments_grpc::PaymentStatus::AttemptStatusUnspecified => None,\n _ => Some(AttemptStatus::foreign_try_from(response.status())?),\n };\n\n Err(ErrorResponse {\n code: response.error_code().to_owned(),\n message: response.error_message().to_owned(),\n reason: Some(response.error_message().to_owned()),\n status_code,\n attempt_status,\n connector_transaction_id: connector_response_reference_id,\n network_decline_code: None,\n network_advice_code: None,\n network_error_message: None,\n connector_metadata: None,\n })\n } else {\n let status = AttemptStatus::foreign_try_from(response.status())?;\n\n Ok((\n PaymentsResponseData::TransactionResponse {\n resource_id: response\n .transaction_id\n .as_ref()\n .and_then(|identifier| {\n identifier\n .id_type\n .clone()\n .and_then(|id_type| match id_type {\n payments_grpc::identifier::IdType::Id(id) => Some(\n router_request_types::ResponseId::ConnectorTransactionId(\n id,\n ),\n ),\n payments_grpc::identifier::IdType::EncodedData(\n encoded_data,\n ) => Some(\n router_request_types::ResponseId::ConnectorTransactionId(\n encoded_data,\n ),\n ),\n payments_grpc::identifier::IdType::NoResponseIdMarker(_) => {\n None\n }\n })\n })\n .unwrap_or(router_request_types::ResponseId::NoResponseId),\n redirection_data: Box::new(None),\n mandate_reference: Box::new(response.mandate_reference.map(|grpc_mandate| {\n hyperswitch_domain_models::router_response_types::MandateReference {\n connector_mandate_id: grpc_mandate.mandate_id,\n payment_method_id: grpc_mandate.payment_method_id,\n mandate_metadata: None,\n connector_mandate_request_reference_id: None,\n }\n })),\n connector_metadata: None,\n network_txn_id: None,\n connector_response_reference_id,\n incremental_authorization_allowed: response.incremental_authorization_allowed,\n charges: None,\n },\n status,\n ))\n };\n\n Ok(response)\n }\n}",
|
| 44 |
+
"after_code": "impl transformers::ForeignTryFrom<payments_grpc::PaymentServiceVoidResponse>\n for Result<(PaymentsResponseData, AttemptStatus), ErrorResponse>\n{\n type Error = error_stack::Report<UnifiedConnectorServiceError>;\n\n fn foreign_try_from(\n response: payments_grpc::PaymentServiceVoidResponse,\n ) -> Result<Self, Self::Error> {\n let connector_response_reference_id =\n response.response_ref_id.as_ref().and_then(|identifier| {\n identifier\n .id_type\n .clone()\n .and_then(|id_type| match id_type {\n payments_grpc::identifier::IdType::Id(id) => Some(id),\n payments_grpc::identifier::IdType::EncodedData(encoded_data) => {\n Some(encoded_data)\n }\n payments_grpc::identifier::IdType::NoResponseIdMarker(_) => None,\n })\n });\n\n let status_code = convert_connector_service_status_code(response.status_code)?;\n\n // Extract connector_metadata from response if present\n let connector_metadata = (!response.connector_metadata.is_empty())\n .then(|| {\n serde_json::to_value(&response.connector_metadata)\n .map_err(|e| {\n tracing::warn!(\n serialization_error=?e,\n metadata=?response.connector_metadata,\n \"Failed to serialize connector_metadata from UCS void response\"\n );\n e\n })\n .ok()\n })\n .flatten();\n\n let response = if response.error_code.is_some() {\n let attempt_status = match response.status() {\n payments_grpc::PaymentStatus::AttemptStatusUnspecified => None,\n _ => Some(AttemptStatus::foreign_try_from(response.status())?),\n };\n\n Err(ErrorResponse {\n code: response.error_code().to_owned(),\n message: response.error_message().to_owned(),\n reason: Some(response.error_message().to_owned()),\n status_code,\n attempt_status,\n connector_transaction_id: connector_response_reference_id,\n network_decline_code: None,\n network_advice_code: None,\n network_error_message: None,\n connector_metadata: None,\n })\n } else {\n let status = AttemptStatus::foreign_try_from(response.status())?;\n\n Ok((\n PaymentsResponseData::TransactionResponse {\n resource_id: response\n .transaction_id\n .as_ref()\n .and_then(|identifier| {\n identifier\n .id_type\n .clone()\n .and_then(|id_type| match id_type {\n payments_grpc::identifier::IdType::Id(id) => Some(\n router_request_types::ResponseId::ConnectorTransactionId(\n id,\n ),\n ),\n payments_grpc::identifier::IdType::EncodedData(\n encoded_data,\n ) => Some(\n router_request_types::ResponseId::ConnectorTransactionId(\n encoded_data,\n ),\n ),\n payments_grpc::identifier::IdType::NoResponseIdMarker(_) => {\n None\n }\n })\n })\n .unwrap_or(router_request_types::ResponseId::NoResponseId),\n redirection_data: Box::new(None),\n mandate_reference: Box::new(response.mandate_reference.map(|grpc_mandate| {\n hyperswitch_domain_models::router_response_types::MandateReference {\n connector_mandate_id: grpc_mandate.mandate_id,\n payment_method_id: grpc_mandate.payment_method_id,\n mandate_metadata: None,\n connector_mandate_request_reference_id: None,\n }\n })),\n connector_metadata,\n network_txn_id: None,\n connector_response_reference_id,\n incremental_authorization_allowed: response.incremental_authorization_allowed,\n charges: None,\n },\n status,\n ))\n };\n\n Ok(response)\n }\n}",
|
| 45 |
+
"diff_span": {
|
| 46 |
+
"before": " }\n })),\n connector_metadata: None,\n network_txn_id: None,\n connector_response_reference_id,",
|
| 47 |
+
"after": "\n let status_code = convert_connector_service_status_code(response.status_code)?;\n\n // Extract connector_metadata from response if present\n let connector_metadata = (!response.connector_metadata.is_empty())\n .then(|| {\n serde_json::to_value(&response.connector_metadata)\n .map_err(|e| {\n tracing::warn!(\n serialization_error=?e,\n metadata=?response.connector_metadata,\n \"Failed to serialize connector_metadata from UCS void response\"\n );\n e\n })\n .ok()\n })\n .flatten();\n\n let response = if response.error_code.is_some() {\n let attempt_status = match response.status() {\n payments_grpc::PaymentStatus::AttemptStatusUnspecified => None,\n _ => Some(AttemptStatus::foreign_try_from(response.status())?),\n };\n\n Err(ErrorResponse {\n code: response.error_code().to_owned(),\n message: response.error_message().to_owned(),\n reason: Some(response.error_message().to_owned()),\n status_code,\n attempt_status,\n connector_transaction_id: connector_response_reference_id,\n network_decline_code: None,\n network_advice_code: None,\n network_error_message: None,\n connector_metadata: None,\n })\n } else {\n let status = AttemptStatus::foreign_try_from(response.status())?;\n\n Ok((\n PaymentsResponseData::TransactionResponse {\n resource_id: response\n .transaction_id\n .as_ref()\n .and_then(|identifier| {\n identifier\n .id_type\n .clone()\n .and_then(|id_type| match id_type {\n payments_grpc::identifier::IdType::Id(id) => Some(\n router_request_types::ResponseId::ConnectorTransactionId(\n id,\n ),\n ),\n payments_grpc::identifier::IdType::EncodedData(\n encoded_data,\n ) => Some(\n router_request_types::ResponseId::ConnectorTransactionId(\n encoded_data,\n ),\n ),\n payments_grpc::identifier::IdType::NoResponseIdMarker(_) => {\n None\n }\n })\n })\n .unwrap_or(router_request_types::ResponseId::NoResponseId),\n redirection_data: Box::new(None),\n mandate_reference: Box::new(response.mandate_reference.map(|grpc_mandate| {\n hyperswitch_domain_models::router_response_types::MandateReference {\n connector_mandate_id: grpc_mandate.mandate_id,\n payment_method_id: grpc_mandate.payment_method_id,\n mandate_metadata: None,\n connector_mandate_request_reference_id: None,\n }\n })),\n connector_metadata,\n network_txn_id: None,\n connector_response_reference_id,"
|
| 48 |
+
},
|
| 49 |
+
"commit_sha": "a0e072e2fe654a251c96ef0ca9eb7736dc02602c",
|
| 50 |
+
"before_imports": [
|
| 51 |
+
"use external_services::grpc_client::unified_connector_service::UnifiedConnectorServiceError;",
|
| 52 |
+
"use unified_connector_service_client::payments::{\n self as payments_grpc, ConnectorState, Identifier, PaymentServiceTransformRequest,\n PaymentServiceTransformResponse,\n};",
|
| 53 |
+
"use common_enums::{AttemptStatus, AuthenticationType, RefundStatus};",
|
| 54 |
+
"use hyperswitch_domain_models::{\n router_data::{AccessToken, ErrorResponse, RouterData},\n router_flow_types::{\n payments::{Authorize, Capture, PSync, SetupMandate},\n refunds::{Execute, RSync},\n unified_authentication_service as uas_flows, ExternalVaultProxy,\n },\n router_request_types::{\n self, AuthenticationData, ExternalVaultProxyPaymentsData, PaymentsAuthorizeData,\n PaymentsCancelData, PaymentsCaptureData, PaymentsSyncData, RefundsData,\n SetupMandateRequestData,\n },\n router_response_types::{PaymentsResponseData, RedirectForm, RefundsResponseData},\n};",
|
| 55 |
+
"use crate::{\n core::{errors, unified_connector_service},\n types::{\n api,\n transformers::{self, ForeignFrom},\n },\n};"
|
| 56 |
+
],
|
| 57 |
+
"after_imports": [
|
| 58 |
+
"use external_services::grpc_client::unified_connector_service::UnifiedConnectorServiceError;",
|
| 59 |
+
"use unified_connector_service_client::payments::{\n self as payments_grpc, ConnectorState, Identifier, PaymentServiceTransformRequest,\n PaymentServiceTransformResponse,\n};",
|
| 60 |
+
"use router_env::tracing;",
|
| 61 |
+
"use common_enums::{AttemptStatus, AuthenticationType, RefundStatus};",
|
| 62 |
+
"use hyperswitch_domain_models::{\n router_data::{AccessToken, ErrorResponse, RouterData},\n router_flow_types::{\n payments::{Authorize, Capture, PSync, SetupMandate},\n refunds::{Execute, RSync},\n unified_authentication_service as uas_flows, ExternalVaultProxy,\n },\n router_request_types::{\n self, AuthenticationData, ExternalVaultProxyPaymentsData, PaymentsAuthorizeData,\n PaymentsCancelData, PaymentsCaptureData, PaymentsSyncData, RefundsData,\n SetupMandateRequestData,\n },\n router_response_types::{PaymentsResponseData, RedirectForm, RefundsResponseData},\n};",
|
| 63 |
+
"use crate::{\n core::{errors, unified_connector_service},\n types::{\n api,\n transformers::{self, ForeignFrom},\n },\n};"
|
| 64 |
+
]
|
| 65 |
+
}
|
| 66 |
+
]
|
| 67 |
+
}
|
diffs/pr_10282/054cfa4/diff.json
ADDED
|
@@ -0,0 +1,33 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "054cfa461a43a88e5c24455e62d7928868cfa7d3",
|
| 3 |
+
"pr_number": 10282,
|
| 4 |
+
"rust_files": [
|
| 5 |
+
"crates/router/src/core/payments/routing.rs"
|
| 6 |
+
],
|
| 7 |
+
"diffs": [
|
| 8 |
+
{
|
| 9 |
+
"id": "crates/router/src/core/payments/routing.rs::function::perform_cgraph_filtering",
|
| 10 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 11 |
+
"kind": "function_item",
|
| 12 |
+
"status": "modified",
|
| 13 |
+
"code_changed": true,
|
| 14 |
+
"imports_changed": true,
|
| 15 |
+
"before_code": "pub async fn perform_cgraph_filtering(\n state: &SessionState,\n key_store: &domain::MerchantKeyStore,\n chosen: Vec<routing_types::RoutableConnectorChoice>,\n backend_input: dsl_inputs::BackendInput,\n eligible_connectors: Option<&Vec<api_enums::RoutableConnectors>>,\n profile_id: &common_utils::id_type::ProfileId,\n transaction_type: &api_enums::TransactionType,\n) -> RoutingResult<Vec<routing_types::RoutableConnectorChoice>> {\n let context = euclid_graph::AnalysisContext::from_dir_values(\n backend_input\n .into_context()\n .change_context(errors::RoutingError::KgraphAnalysisError)?,\n );\n let cached_cgraph = get_merchant_cgraph(state, key_store, profile_id, transaction_type).await?;\n\n let mut final_selection = Vec::<routing_types::RoutableConnectorChoice>::new();\n for choice in chosen {\n let routable_connector = choice.connector;\n let euclid_choice: ast::ConnectorChoice = choice.clone().foreign_into();\n let dir_val = euclid_choice\n .into_dir_value()\n .change_context(errors::RoutingError::KgraphAnalysisError)?;\n let cgraph_eligible = cached_cgraph\n .check_value_validity(\n dir_val,\n &context,\n &mut hyperswitch_constraint_graph::Memoization::new(),\n &mut hyperswitch_constraint_graph::CycleCheck::new(),\n None,\n )\n .change_context(errors::RoutingError::KgraphAnalysisError)?;\n\n let filter_eligible =\n eligible_connectors.is_none_or(|list| list.contains(&routable_connector));\n\n let db_mcas = state\n .store\n .find_merchant_connector_account_by_merchant_id_and_disabled_list(\n &state.into(),\n &key_store.merchant_id,\n false,\n key_store,\n )\n .await\n .unwrap_or_else(|_| std::iter::empty().collect());\n\n let mca_active = choice\n .merchant_connector_id\n .as_ref()\n .map(|id| db_mcas.iter().any(|mca| &mca.get_id() == id))\n .unwrap_or(true);\n\n if cgraph_eligible && filter_eligible && mca_active {\n final_selection.push(choice);\n }\n }\n\n Ok(final_selection)\n}",
|
| 16 |
+
"after_code": "pub async fn perform_cgraph_filtering(\n state: &SessionState,\n key_store: &domain::MerchantKeyStore,\n chosen: Vec<routing_types::RoutableConnectorChoice>,\n backend_input: dsl_inputs::BackendInput,\n eligible_connectors: Option<&Vec<api_enums::RoutableConnectors>>,\n profile_id: &common_utils::id_type::ProfileId,\n transaction_type: &api_enums::TransactionType,\n) -> RoutingResult<Vec<routing_types::RoutableConnectorChoice>> {\n let context = euclid_graph::AnalysisContext::from_dir_values(\n backend_input\n .into_context()\n .change_context(errors::RoutingError::KgraphAnalysisError)?,\n );\n let cached_cgraph = get_merchant_cgraph(state, key_store, profile_id, transaction_type).await?;\n let db_mcas = state\n .store\n .find_merchant_connector_account_by_merchant_id_and_disabled_list(\n &state.into(),\n &key_store.merchant_id,\n false,\n key_store,\n )\n .await\n .unwrap_or_else(|_| std::iter::empty().collect::<Vec<_>>());\n\n let active_mca_ids: std::collections::HashSet<_> = db_mcas\n .iter()\n .map(|mca| mca.get_id().to_string())\n .collect();\n\n let mut final_selection = Vec::<routing_types::RoutableConnectorChoice>::new();\n\n for choice in chosen {\n let routable_connector = choice.connector;\n\n let euclid_choice: ast::ConnectorChoice = choice.clone().foreign_into();\n let dir_val = euclid_choice\n .into_dir_value()\n .change_context(errors::RoutingError::KgraphAnalysisError)?;\n\n let cgraph_eligible = cached_cgraph\n .check_value_validity(\n dir_val,\n &context,\n &mut hyperswitch_constraint_graph::Memoization::new(),\n &mut hyperswitch_constraint_graph::CycleCheck::new(),\n None,\n )\n .change_context(errors::RoutingError::KgraphAnalysisError)?;\n\n let filter_eligible =\n eligible_connectors.is_none_or(|list| list.contains(&routable_connector));\n\n let mca_active = choice\n .merchant_connector_id\n .as_ref()\n .map(|id| active_mca_ids.contains(id))\n .unwrap_or(true);\n\n if cgraph_eligible && filter_eligible && mca_active {\n final_selection.push(choice);\n }\n }\n\n Ok(final_selection)\n}",
|
| 17 |
+
"diff_span": {
|
| 18 |
+
"before": " eligible_connectors.is_none_or(|list| list.contains(&routable_connector));\n\n let db_mcas = state\n .store\n .find_merchant_connector_account_by_merchant_id_and_disabled_list(\n &state.into(),\n &key_store.merchant_id,\n false,\n key_store,\n )\n .await\n .unwrap_or_else(|_| std::iter::empty().collect());\n\n let mca_active = choice\n .merchant_connector_id\n .as_ref()\n .map(|id| db_mcas.iter().any(|mca| &mca.get_id() == id))\n .unwrap_or(true);\n",
|
| 19 |
+
"after": " );\n let cached_cgraph = get_merchant_cgraph(state, key_store, profile_id, transaction_type).await?;\n let db_mcas = state\n .store\n .find_merchant_connector_account_by_merchant_id_and_disabled_list(\n &state.into(),\n &key_store.merchant_id,\n false,\n key_store,\n )\n .await\n .unwrap_or_else(|_| std::iter::empty().collect::<Vec<_>>());\n\n let active_mca_ids: std::collections::HashSet<_> = db_mcas\n .iter()\n .map(|mca| mca.get_id().to_string())\n .collect();\n\n let mut final_selection = Vec::<routing_types::RoutableConnectorChoice>::new();\n\n for choice in chosen {\n let routable_connector = choice.connector;\n\n let euclid_choice: ast::ConnectorChoice = choice.clone().foreign_into();\n let dir_val = euclid_choice\n .into_dir_value()\n .change_context(errors::RoutingError::KgraphAnalysisError)?;\n\n let cgraph_eligible = cached_cgraph\n .check_value_validity(\n dir_val,\n &context,\n &mut hyperswitch_constraint_graph::Memoization::new(),\n &mut hyperswitch_constraint_graph::CycleCheck::new(),\n None,\n )\n .change_context(errors::RoutingError::KgraphAnalysisError)?;\n\n let filter_eligible =\n eligible_connectors.is_none_or(|list| list.contains(&routable_connector));\n\n let mca_active = choice\n .merchant_connector_id\n .as_ref()\n .map(|id| active_mca_ids.contains(id))\n .unwrap_or(true);\n"
|
| 20 |
+
},
|
| 21 |
+
"commit_sha": "054cfa461a43a88e5c24455e62d7928868cfa7d3",
|
| 22 |
+
"before_imports": [
|
| 23 |
+
"use crate::{\n core::{\n errors, errors as oss_errors,\n payments::{\n routing::utils::DecisionEngineApiHandler, OperationSessionGetters,\n OperationSessionSetters,\n },\n routing,\n },\n logger, services,\n types::{\n api::{self, routing as routing_types},\n domain, storage as oss_storage,\n transformers::{ForeignFrom, ForeignInto, ForeignTryFrom},\n },\n utils::{OptionExt, ValueExt},\n SessionState,\n};",
|
| 24 |
+
"use euclid::{\n backend::{self, inputs as dsl_inputs, EuclidBackend},\n dssa::graph::{self as euclid_graph, CgraphExt},\n enums as euclid_enums,\n frontend::{ast, dir as euclid_dir},\n};"
|
| 25 |
+
],
|
| 26 |
+
"after_imports": [
|
| 27 |
+
"use std::hash::{Hash, Hasher};",
|
| 28 |
+
"use crate::{\n core::{\n errors, errors as oss_errors,\n payments::{\n routing::utils::DecisionEngineApiHandler, OperationSessionGetters,\n OperationSessionSetters,\n },\n routing,\n },\n logger, services,\n types::{\n api::{self, routing as routing_types},\n domain, storage as oss_storage,\n transformers::{ForeignFrom, ForeignInto, ForeignTryFrom},\n },\n utils::{OptionExt, ValueExt},\n SessionState,\n};",
|
| 29 |
+
"use euclid::{\n backend::{self, inputs as dsl_inputs, EuclidBackend},\n dssa::graph::{self as euclid_graph, CgraphExt},\n enums as euclid_enums,\n frontend::{ast, dir as euclid_dir},\n};"
|
| 30 |
+
]
|
| 31 |
+
}
|
| 32 |
+
]
|
| 33 |
+
}
|
diffs/pr_10282/3c255ac/diff.json
ADDED
|
@@ -0,0 +1,169 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "3c255ac1e592c9cdd0b13b13f3a52e2883a1e5be",
|
| 3 |
+
"pr_number": 10282,
|
| 4 |
+
"rust_files": [
|
| 5 |
+
"crates/router/src/core/payments/routing.rs"
|
| 6 |
+
],
|
| 7 |
+
"diffs": [
|
| 8 |
+
{
|
| 9 |
+
"id": "crates/router/src/core/payments/routing.rs::function::perform_cgraph_filtering",
|
| 10 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 11 |
+
"kind": "function_item",
|
| 12 |
+
"status": "removed",
|
| 13 |
+
"before_code": "pub async fn perform_cgraph_filtering(\n state: &SessionState,\n key_store: &domain::MerchantKeyStore,\n chosen: Vec<routing_types::RoutableConnectorChoice>,\n backend_input: dsl_inputs::BackendInput,\n eligible_connectors: Option<&Vec<api_enums::RoutableConnectors>>,\n profile_id: &common_utils::id_type::ProfileId,\n transaction_type: &api_enums::TransactionType,\n) -> RoutingResult<Vec<routing_types::RoutableConnectorChoice>> {\n let context = euclid_graph::AnalysisContext::from_dir_values(\n backend_input\n .into_context()\n .change_context(errors::RoutingError::KgraphAnalysisError)?,\n );\n\n let cached_cgraph =\n get_merchant_cgraph(state, key_store, profile_id, transaction_type).await?;\n\n let db_mcas = state\n .store\n .find_merchant_connector_account_by_merchant_id_and_disabled_list(\n &state.into(),\n &key_store.merchant_id,\n false,\n key_store,\n )\n .await\n .unwrap_or_else(|_| hyperswitch_domain_models::merchant_connector_account::MerchantConnectorAccounts::new(vec![]));\n\n\n let active_mca_ids: std::collections::HashSet<_> = db_mcas\n .iter()\n .map(|mca| mca.get_id().clone())\n .collect();\n\n let mut final_selection = Vec::new();\n\n for choice in chosen {\n let routable_connector = choice.connector;\n\n let euclid_choice: ast::ConnectorChoice = choice.clone().foreign_into();\n let dir_val = euclid_choice\n .into_dir_value()\n .change_context(errors::RoutingError::KgraphAnalysisError)?;\n\n let cgraph_eligible = cached_cgraph\n .check_value_validity(\n dir_val,\n &context,\n &mut hyperswitch_constraint_graph::Memoization::new(),\n &mut hyperswitch_constraint_graph::CycleCheck::new(),\n None,\n )\n .change_context(errors::RoutingError::KgraphAnalysisError)?;\n\n let filter_eligible =\n eligible_connectors.is_none_or(|list| list.contains(&routable_connector));\n\n let mca_active = choice\n .merchant_connector_id\n .as_ref()\n .map(|id| active_mca_ids.contains(id))\n .unwrap_or(true);\n\n if cgraph_eligible && filter_eligible && mca_active {\n final_selection.push(choice);\n }\n }\n\n Ok(final_selection)\n}",
|
| 14 |
+
"after_code": null,
|
| 15 |
+
"diff_span": null,
|
| 16 |
+
"commit_sha": "3c255ac1e592c9cdd0b13b13f3a52e2883a1e5be"
|
| 17 |
+
},
|
| 18 |
+
{
|
| 19 |
+
"id": "crates/router/src/core/payments/routing.rs::function::make_dsl_input_for_surcharge",
|
| 20 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 21 |
+
"kind": "function_item",
|
| 22 |
+
"status": "removed",
|
| 23 |
+
"before_code": "pub fn make_dsl_input_for_surcharge(\n payment_attempt: &oss_storage::PaymentAttempt,\n payment_intent: &oss_storage::PaymentIntent,\n billing_address: Option<Address>,\n) -> RoutingResult<dsl_inputs::BackendInput> {\n let mandate_data = dsl_inputs::MandateData {\n mandate_acceptance_type: None,\n mandate_type: None,\n payment_type: None,\n };\n\n let payment_input = dsl_inputs::PaymentInput {\n amount: payment_attempt.get_total_amount(),\n // currency is always populated in payment_attempt during payment create\n currency: payment_attempt\n .currency\n .get_required_value(\"currency\")\n .change_context(errors::RoutingError::DslMissingRequiredField {\n field_name: \"currency\".to_string(),\n })?,\n authentication_type: payment_attempt.authentication_type,\n card_bin: None,\n capture_method: payment_attempt.capture_method,\n business_country: payment_intent\n .business_country\n .map(api_enums::Country::from_alpha2),\n billing_country: billing_address\n .and_then(|bic| bic.address)\n .and_then(|add| add.country)\n .map(api_enums::Country::from_alpha2),\n business_label: payment_intent.business_label.clone(),\n setup_future_usage: payment_intent.setup_future_usage,\n };\n\n let metadata = payment_intent\n .parse_and_get_metadata(\"routing_parameters\")\n .change_context(errors::RoutingError::MetadataParsingError)\n .attach_printable(\"Unable to parse routing_parameters from metadata of payment_intent\")\n .unwrap_or(None);\n let payment_method_input = dsl_inputs::PaymentMethodInput {\n payment_method: None,\n payment_method_type: None,\n card_network: None,\n };\n let backend_input = dsl_inputs::BackendInput {\n metadata,\n payment: payment_input,\n payment_method: payment_method_input,\n mandate: mandate_data,\n acquirer_data: None,\n customer_device_data: None,\n issuer_data: None,\n };\n Ok(backend_input)\n}",
|
| 24 |
+
"after_code": null,
|
| 25 |
+
"diff_span": null,
|
| 26 |
+
"commit_sha": "3c255ac1e592c9cdd0b13b13f3a52e2883a1e5be"
|
| 27 |
+
},
|
| 28 |
+
{
|
| 29 |
+
"id": "crates/router/src/core/payments/routing.rs::function::perform_session_flow_routing",
|
| 30 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 31 |
+
"kind": "function_item",
|
| 32 |
+
"status": "removed",
|
| 33 |
+
"before_code": "pub async fn perform_session_flow_routing(\n session_input: SessionFlowRoutingInput<'_>,\n business_profile: &domain::Profile,\n transaction_type: &api_enums::TransactionType,\n) -> RoutingResult<(\n FxHashMap<api_enums::PaymentMethodType, Vec<routing_types::SessionRoutingChoice>>,\n Option<common_enums::RoutingApproach>,\n)> {\n let mut pm_type_map: FxHashMap<api_enums::PaymentMethodType, FxHashMap<String, api::GetToken>> =\n FxHashMap::default();\n\n let profile_id = session_input\n .payment_intent\n .profile_id\n .clone()\n .get_required_value(\"profile_id\")\n .change_context(errors::RoutingError::ProfileIdMissing)?;\n\n let routing_algorithm: MerchantAccountRoutingAlgorithm = {\n business_profile\n .routing_algorithm\n .clone()\n .map(|val| val.parse_value(\"MerchantAccountRoutingAlgorithm\"))\n .transpose()\n .change_context(errors::RoutingError::InvalidRoutingAlgorithmStructure)?\n .unwrap_or_default()\n };\n\n let payment_method_input = dsl_inputs::PaymentMethodInput {\n payment_method: None,\n payment_method_type: None,\n card_network: None,\n };\n\n let payment_input = dsl_inputs::PaymentInput {\n amount: session_input.payment_attempt.get_total_amount(),\n currency: session_input\n .payment_intent\n .currency\n .get_required_value(\"Currency\")\n .change_context(errors::RoutingError::DslMissingRequiredField {\n field_name: \"currency\".to_string(),\n })?,\n authentication_type: session_input.payment_attempt.authentication_type,\n card_bin: None,\n capture_method: session_input\n .payment_attempt\n .capture_method\n .and_then(Option::<euclid_enums::CaptureMethod>::foreign_from),\n business_country: session_input\n .payment_intent\n .business_country\n .map(api_enums::Country::from_alpha2),\n billing_country: session_input\n .country\n .map(storage_enums::Country::from_alpha2),\n business_label: session_input.payment_intent.business_label.clone(),\n setup_future_usage: session_input.payment_intent.setup_future_usage,\n };\n\n let metadata = session_input\n .payment_intent\n .parse_and_get_metadata(\"routing_parameters\")\n .change_context(errors::RoutingError::MetadataParsingError)\n .attach_printable(\"Unable to parse routing_parameters from metadata of payment_intent\")\n .unwrap_or(None);\n\n let mut backend_input = dsl_inputs::BackendInput {\n metadata,\n payment: payment_input,\n payment_method: payment_method_input,\n mandate: dsl_inputs::MandateData {\n mandate_acceptance_type: None,\n mandate_type: None,\n payment_type: None,\n },\n acquirer_data: None,\n customer_device_data: None,\n issuer_data: None,\n };\n\n for connector_data in session_input.chosen.iter() {\n pm_type_map\n .entry(connector_data.payment_method_sub_type)\n .or_default()\n .insert(\n connector_data.connector.connector_name.to_string(),\n connector_data.connector.get_token.clone(),\n );\n }\n\n let mut result: FxHashMap<\n api_enums::PaymentMethodType,\n Vec<routing_types::SessionRoutingChoice>,\n > = FxHashMap::default();\n let mut final_routing_approach = None;\n\n for (pm_type, allowed_connectors) in pm_type_map {\n let euclid_pmt: euclid_enums::PaymentMethodType = pm_type;\n let euclid_pm: euclid_enums::PaymentMethod = euclid_pmt.into();\n\n backend_input.payment_method.payment_method = Some(euclid_pm);\n backend_input.payment_method.payment_method_type = Some(euclid_pmt);\n\n let session_pm_input = SessionRoutingPmTypeInput {\n state: session_input.state,\n key_store: session_input.key_store,\n attempt_id: session_input.payment_attempt.get_id(),\n routing_algorithm: &routing_algorithm,\n backend_input: backend_input.clone(),\n allowed_connectors,\n profile_id: &profile_id,\n };\n\n let (routable_connector_choice_option, routing_approach) =\n perform_session_routing_for_pm_type(\n &session_pm_input,\n transaction_type,\n business_profile,\n )\n .await?;\n\n final_routing_approach = routing_approach;\n\n if let Some(routable_connector_choice) = routable_connector_choice_option {\n let mut session_routing_choice: Vec<routing_types::SessionRoutingChoice> = Vec::new();\n\n for selection in routable_connector_choice {\n let connector_name = selection.connector.to_string();\n if let Some(get_token) = session_pm_input.allowed_connectors.get(&connector_name) {\n let connector_data = api::ConnectorData::get_connector_by_name(\n &session_pm_input.state.clone().conf.connectors,\n &connector_name,\n get_token.clone(),\n selection.merchant_connector_id,\n )\n .change_context(errors::RoutingError::InvalidConnectorName(connector_name))?;\n\n session_routing_choice.push(routing_types::SessionRoutingChoice {\n connector: connector_data,\n payment_method_type: pm_type,\n });\n }\n }\n if !session_routing_choice.is_empty() {\n result.insert(pm_type, session_routing_choice);\n }\n }\n }\n\n Ok((result, final_routing_approach))\n}",
|
| 34 |
+
"after_code": null,
|
| 35 |
+
"diff_span": null,
|
| 36 |
+
"commit_sha": "3c255ac1e592c9cdd0b13b13f3a52e2883a1e5be"
|
| 37 |
+
},
|
| 38 |
+
{
|
| 39 |
+
"id": "crates/router/src/core/payments/routing.rs::function::perform_dynamic_routing_with_open_router",
|
| 40 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 41 |
+
"kind": "function_item",
|
| 42 |
+
"status": "removed",
|
| 43 |
+
"before_code": "pub async fn perform_dynamic_routing_with_open_router<F, D>(\n state: &SessionState,\n routable_connectors: Vec<api_routing::RoutableConnectorChoice>,\n profile: &domain::Profile,\n payment_data: oss_storage::PaymentAttempt,\n old_payment_data: &mut D,\n) -> RoutingResult<Vec<api_routing::RoutableConnectorChoice>>\nwhere\n F: Send + Clone,\n D: OperationSessionGetters<F> + OperationSessionSetters<F> + Send + Sync + Clone,\n{\n let dynamic_routing_algo_ref: api_routing::DynamicRoutingAlgorithmRef = profile\n .dynamic_routing_algorithm\n .clone()\n .map(|val| val.parse_value(\"DynamicRoutingAlgorithmRef\"))\n .transpose()\n .change_context(errors::RoutingError::DeserializationError {\n from: \"JSON\".to_string(),\n to: \"DynamicRoutingAlgorithmRef\".to_string(),\n })\n .attach_printable(\"unable to deserialize DynamicRoutingAlgorithmRef from JSON\")?\n .ok_or(errors::RoutingError::GenericNotFoundError {\n field: \"dynamic_routing_algorithm\".to_string(),\n })?;\n\n logger::debug!(\n \"performing dynamic_routing with open_router for profile {}\",\n profile.get_id().get_string_repr()\n );\n\n let is_success_rate_routing_enabled =\n dynamic_routing_algo_ref.is_success_rate_routing_enabled();\n let is_elimination_enabled = dynamic_routing_algo_ref.is_elimination_enabled();\n\n // Since success_based and elimination routing is being done in 1 api call, we call decide_gateway when either of it enabled\n let connectors = if is_success_rate_routing_enabled || is_elimination_enabled {\n let connectors = perform_decide_gateway_call_with_open_router(\n state,\n routable_connectors.clone(),\n profile.get_id(),\n &payment_data,\n is_elimination_enabled,\n old_payment_data,\n )\n .await?;\n\n if is_elimination_enabled {\n // This will initiate the elimination process for the connector.\n // Penalize the elimination score of the connector before making a payment.\n // Once the payment is made, we will update the score based on the payment status\n if let Some(connector) = connectors.first() {\n logger::debug!(\n \"penalizing the elimination score of the gateway with id {} in open_router for profile {}\",\n connector, profile.get_id().get_string_repr()\n );\n update_gateway_score_with_open_router(\n state,\n connector.clone(),\n profile.get_id(),\n &payment_data.merchant_id,\n &payment_data.payment_id,\n common_enums::AttemptStatus::AuthenticationPending,\n )\n .await?\n }\n }\n connectors\n } else {\n routable_connectors\n };\n\n Ok(connectors)\n}",
|
| 44 |
+
"after_code": null,
|
| 45 |
+
"diff_span": null,
|
| 46 |
+
"commit_sha": "3c255ac1e592c9cdd0b13b13f3a52e2883a1e5be"
|
| 47 |
+
},
|
| 48 |
+
{
|
| 49 |
+
"id": "crates/router/src/core/payments/routing.rs::function::perform_eligibility_analysis",
|
| 50 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 51 |
+
"kind": "function_item",
|
| 52 |
+
"status": "removed",
|
| 53 |
+
"before_code": "pub async fn perform_eligibility_analysis(\n state: &SessionState,\n key_store: &domain::MerchantKeyStore,\n chosen: Vec<routing_types::RoutableConnectorChoice>,\n transaction_data: &routing::TransactionData<'_>,\n eligible_connectors: Option<&Vec<api_enums::RoutableConnectors>>,\n profile_id: &common_utils::id_type::ProfileId,\n) -> RoutingResult<Vec<routing_types::RoutableConnectorChoice>> {\n let backend_input = match transaction_data {\n routing::TransactionData::Payment(payment_data) => make_dsl_input(payment_data)?,\n #[cfg(feature = \"payouts\")]\n routing::TransactionData::Payout(payout_data) => make_dsl_input_for_payouts(payout_data)?,\n };\n\n perform_cgraph_filtering(\n state,\n key_store,\n chosen,\n backend_input,\n eligible_connectors,\n profile_id,\n &api_enums::TransactionType::from(transaction_data),\n )\n .await\n}",
|
| 54 |
+
"after_code": null,
|
| 55 |
+
"diff_span": null,
|
| 56 |
+
"commit_sha": "3c255ac1e592c9cdd0b13b13f3a52e2883a1e5be"
|
| 57 |
+
},
|
| 58 |
+
{
|
| 59 |
+
"id": "crates/router/src/core/payments/routing.rs::function::perform_decide_gateway_call_with_open_router",
|
| 60 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 61 |
+
"kind": "function_item",
|
| 62 |
+
"status": "removed",
|
| 63 |
+
"before_code": "pub async fn perform_decide_gateway_call_with_open_router<F, D>(\n state: &SessionState,\n mut routable_connectors: Vec<api_routing::RoutableConnectorChoice>,\n profile_id: &common_utils::id_type::ProfileId,\n payment_attempt: &oss_storage::PaymentAttempt,\n is_elimination_enabled: bool,\n old_payment_data: &mut D,\n) -> RoutingResult<Vec<api_routing::RoutableConnectorChoice>>\nwhere\n F: Send + Clone,\n D: OperationSessionGetters<F> + OperationSessionSetters<F> + Send + Sync + Clone,\n{\n logger::debug!(\n \"performing decide_gateway call with open_router for profile {}\",\n profile_id.get_string_repr()\n );\n\n let open_router_req_body = OpenRouterDecideGatewayRequest::construct_sr_request(\n payment_attempt,\n routable_connectors.clone(),\n Some(or_types::RankingAlgorithm::SrBasedRouting),\n is_elimination_enabled,\n );\n\n let routing_events_wrapper = utils::RoutingEventsWrapper::new(\n state.tenant.tenant_id.clone(),\n state.request_id.clone(),\n payment_attempt.payment_id.get_string_repr().to_string(),\n payment_attempt.profile_id.to_owned(),\n payment_attempt.merchant_id.to_owned(),\n \"DecisionEngine: SuccessRate decide_gateway\".to_string(),\n Some(open_router_req_body.clone()),\n true,\n false,\n );\n\n let response: RoutingResult<utils::RoutingEventsResponse<DecidedGateway>> =\n utils::SRApiClient::send_decision_engine_request(\n state,\n services::Method::Post,\n \"decide-gateway\",\n Some(open_router_req_body),\n None,\n Some(routing_events_wrapper),\n )\n .await;\n\n let sr_sorted_connectors = match response {\n Ok(resp) => {\n let decided_gateway: DecidedGateway =\n resp.response.ok_or(errors::RoutingError::OpenRouterError(\n \"Empty response received from open_router\".into(),\n ))?;\n\n let mut routing_event = resp.event.ok_or(errors::RoutingError::RoutingEventsError {\n message: \"Decision-Engine: RoutingEvent not found in RoutingEventsResponse\"\n .to_string(),\n status_code: 500,\n })?;\n\n routing_event.set_response_body(&decided_gateway);\n routing_event.set_routing_approach(\n utils::RoutingApproach::from_decision_engine_approach(\n &decided_gateway.routing_approach,\n )\n .to_string(),\n );\n\n old_payment_data.set_routing_approach_in_attempt(Some(\n common_enums::RoutingApproach::from_decision_engine_approach(\n &decided_gateway.routing_approach,\n ),\n ));\n\n if let Some(gateway_priority_map) = decided_gateway.gateway_priority_map {\n logger::debug!(gateway_priority_map=?gateway_priority_map, routing_approach=decided_gateway.routing_approach, \"open_router decide_gateway call response\");\n routable_connectors.sort_by(|connector_choice_a, connector_choice_b| {\n let connector_choice_a_score = gateway_priority_map\n .get(&connector_choice_a.to_string())\n .copied()\n .unwrap_or(0.0);\n let connector_choice_b_score = gateway_priority_map\n .get(&connector_choice_b.to_string())\n .copied()\n .unwrap_or(0.0);\n connector_choice_b_score\n .partial_cmp(&connector_choice_a_score)\n .unwrap_or(std::cmp::Ordering::Equal)\n });\n }\n\n routing_event.set_routable_connectors(routable_connectors.clone());\n state.event_handler().log_event(&routing_event);\n\n Ok(routable_connectors)\n }\n Err(err) => {\n logger::error!(\"open_router_error_response: {:?}\", err);\n\n Err(errors::RoutingError::OpenRouterError(\n \"Failed to perform decide_gateway call in open_router\".into(),\n ))\n }\n }?;\n\n Ok(sr_sorted_connectors)\n}",
|
| 64 |
+
"after_code": null,
|
| 65 |
+
"diff_span": null,
|
| 66 |
+
"commit_sha": "3c255ac1e592c9cdd0b13b13f3a52e2883a1e5be"
|
| 67 |
+
},
|
| 68 |
+
{
|
| 69 |
+
"id": "crates/router/src/core/payments/routing.rs::function::perform_eligibility_analysis_with_fallback",
|
| 70 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 71 |
+
"kind": "function_item",
|
| 72 |
+
"status": "removed",
|
| 73 |
+
"before_code": "pub async fn perform_eligibility_analysis_with_fallback(\n state: &SessionState,\n key_store: &domain::MerchantKeyStore,\n chosen: Vec<routing_types::RoutableConnectorChoice>,\n transaction_data: &routing::TransactionData<'_>,\n eligible_connectors: Option<Vec<api_enums::RoutableConnectors>>,\n business_profile: &domain::Profile,\n) -> RoutingResult<Vec<routing_types::RoutableConnectorChoice>> {\n logger::debug!(\"euclid_routing: performing eligibility\");\n let mut final_selection = perform_eligibility_analysis(\n state,\n key_store,\n chosen,\n transaction_data,\n eligible_connectors.as_ref(),\n business_profile.get_id(),\n )\n .await?;\n\n let fallback_selection = perform_fallback_routing(\n state,\n key_store,\n transaction_data,\n eligible_connectors.as_ref(),\n business_profile,\n )\n .await;\n\n final_selection.append(\n &mut fallback_selection\n .unwrap_or_default()\n .iter()\n .filter(|&routable_connector_choice| {\n !final_selection.contains(routable_connector_choice)\n })\n .cloned()\n .collect::<Vec<_>>(),\n );\n\n let final_selected_connectors = final_selection\n .iter()\n .map(|item| item.connector)\n .collect::<Vec<_>>();\n logger::debug!(final_selected_connectors_for_routing=?final_selected_connectors, \"euclid_routing: List of final selected connectors for routing\");\n\n Ok(final_selection)\n}",
|
| 74 |
+
"after_code": null,
|
| 75 |
+
"diff_span": null,
|
| 76 |
+
"commit_sha": "3c255ac1e592c9cdd0b13b13f3a52e2883a1e5be"
|
| 77 |
+
},
|
| 78 |
+
{
|
| 79 |
+
"id": "crates/router/src/core/payments/routing.rs::function::perform_dynamic_routing_with_intelligent_router",
|
| 80 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 81 |
+
"kind": "function_item",
|
| 82 |
+
"status": "removed",
|
| 83 |
+
"before_code": "pub async fn perform_dynamic_routing_with_intelligent_router<F, D>(\n state: &SessionState,\n routable_connectors: Vec<api_routing::RoutableConnectorChoice>,\n profile: &domain::Profile,\n dynamic_routing_config_params_interpolator: routing::helpers::DynamicRoutingConfigParamsInterpolator,\n payment_data: &mut D,\n) -> RoutingResult<Vec<api_routing::RoutableConnectorChoice>>\nwhere\n F: Send + Clone,\n D: OperationSessionGetters<F> + OperationSessionSetters<F> + Send + Sync + Clone,\n{\n let dynamic_routing_algo_ref: api_routing::DynamicRoutingAlgorithmRef = profile\n .dynamic_routing_algorithm\n .clone()\n .map(|val| val.parse_value(\"DynamicRoutingAlgorithmRef\"))\n .transpose()\n .change_context(errors::RoutingError::DeserializationError {\n from: \"JSON\".to_string(),\n to: \"DynamicRoutingAlgorithmRef\".to_string(),\n })\n .attach_printable(\"unable to deserialize DynamicRoutingAlgorithmRef from JSON\")?\n .ok_or(errors::RoutingError::GenericNotFoundError {\n field: \"dynamic_routing_algorithm\".to_string(),\n })?;\n\n logger::debug!(\n \"performing dynamic_routing for profile {}\",\n profile.get_id().get_string_repr()\n );\n\n let payment_attempt = payment_data.get_payment_attempt().clone();\n\n let mut connector_list = match dynamic_routing_algo_ref\n .success_based_algorithm\n .as_ref()\n .async_map(|algorithm| {\n perform_success_based_routing(\n state,\n routable_connectors.clone(),\n profile.get_id(),\n &payment_attempt.merchant_id,\n &payment_attempt.payment_id,\n dynamic_routing_config_params_interpolator.clone(),\n algorithm.clone(),\n payment_data,\n )\n })\n .await\n .transpose()\n .inspect_err(|e| logger::error!(dynamic_routing_error=?e))\n .ok()\n .flatten()\n {\n Some(success_based_list) => success_based_list,\n None => {\n // Only run contract based if success based returns None\n dynamic_routing_algo_ref\n .contract_based_routing\n .as_ref()\n .async_map(|algorithm| {\n perform_contract_based_routing(\n state,\n routable_connectors.clone(),\n profile.get_id(),\n &payment_attempt.merchant_id,\n &payment_attempt.payment_id,\n dynamic_routing_config_params_interpolator.clone(),\n algorithm.clone(),\n payment_data,\n )\n })\n .await\n .transpose()\n .inspect_err(|e| logger::error!(dynamic_routing_error=?e))\n .ok()\n .flatten()\n .unwrap_or(routable_connectors.clone())\n }\n };\n\n connector_list = dynamic_routing_algo_ref\n .elimination_routing_algorithm\n .as_ref()\n .async_map(|algorithm| {\n perform_elimination_routing(\n state,\n connector_list.clone(),\n profile.get_id(),\n &payment_attempt.merchant_id,\n &payment_attempt.payment_id,\n dynamic_routing_config_params_interpolator.clone(),\n algorithm.clone(),\n )\n })\n .await\n .transpose()\n .inspect_err(|e| logger::error!(dynamic_routing_error=?e))\n .ok()\n .flatten()\n .unwrap_or(connector_list);\n\n Ok(connector_list)\n}",
|
| 84 |
+
"after_code": null,
|
| 85 |
+
"diff_span": null,
|
| 86 |
+
"commit_sha": "3c255ac1e592c9cdd0b13b13f3a52e2883a1e5be"
|
| 87 |
+
},
|
| 88 |
+
{
|
| 89 |
+
"id": "crates/router/src/core/payments/routing.rs::function::update_gateway_score_with_open_router",
|
| 90 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 91 |
+
"kind": "function_item",
|
| 92 |
+
"status": "removed",
|
| 93 |
+
"before_code": "pub async fn update_gateway_score_with_open_router(\n state: &SessionState,\n payment_connector: api_routing::RoutableConnectorChoice,\n profile_id: &common_utils::id_type::ProfileId,\n merchant_id: &common_utils::id_type::MerchantId,\n payment_id: &common_utils::id_type::PaymentId,\n payment_status: common_enums::AttemptStatus,\n) -> RoutingResult<()> {\n let open_router_req_body = or_types::UpdateScorePayload {\n merchant_id: profile_id.clone(),\n gateway: payment_connector.to_string(),\n status: payment_status.foreign_into(),\n payment_id: payment_id.clone(),\n };\n\n let routing_events_wrapper = utils::RoutingEventsWrapper::new(\n state.tenant.tenant_id.clone(),\n state.request_id.clone(),\n payment_id.get_string_repr().to_string(),\n profile_id.to_owned(),\n merchant_id.to_owned(),\n \"DecisionEngine: SuccessRate update_gateway_score\".to_string(),\n Some(open_router_req_body.clone()),\n true,\n false,\n );\n\n let response: RoutingResult<utils::RoutingEventsResponse<or_types::UpdateScoreResponse>> =\n utils::SRApiClient::send_decision_engine_request(\n state,\n services::Method::Post,\n \"update-gateway-score\",\n Some(open_router_req_body),\n None,\n Some(routing_events_wrapper),\n )\n .await;\n\n match response {\n Ok(resp) => {\n let update_score_resp = resp.response.ok_or(errors::RoutingError::OpenRouterError(\n \"Failed to parse the response from open_router\".into(),\n ))?;\n\n let mut routing_event = resp.event.ok_or(errors::RoutingError::RoutingEventsError {\n message: \"Decision-Engine: RoutingEvent not found in RoutingEventsResponse\"\n .to_string(),\n status_code: 500,\n })?;\n\n logger::debug!(\n \"open_router update_gateway_score response for gateway with id {}: {:?}\",\n payment_connector,\n update_score_resp.message\n );\n\n routing_event.set_response_body(&update_score_resp);\n routing_event.set_payment_connector(payment_connector.clone()); // check this in review\n state.event_handler().log_event(&routing_event);\n\n Ok(())\n }\n Err(err) => {\n logger::error!(\"open_router_update_gateway_score_error: {:?}\", err);\n\n Err(errors::RoutingError::OpenRouterError(\n \"Failed to update gateway score in open_router\".into(),\n ))\n }\n }?;\n\n Ok(())\n}",
|
| 94 |
+
"after_code": null,
|
| 95 |
+
"diff_span": null,
|
| 96 |
+
"commit_sha": "3c255ac1e592c9cdd0b13b13f3a52e2883a1e5be"
|
| 97 |
+
},
|
| 98 |
+
{
|
| 99 |
+
"id": "crates/router/src/core/payments/routing.rs::function::perform_session_routing_for_pm_type",
|
| 100 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 101 |
+
"kind": "function_item",
|
| 102 |
+
"status": "removed",
|
| 103 |
+
"before_code": "async fn perform_session_routing_for_pm_type<'a>(\n state: &'a SessionState,\n key_store: &'a domain::MerchantKeyStore,\n session_pm_input: &SessionRoutingPmTypeInput<'_>,\n transaction_type: &api_enums::TransactionType,\n business_profile: &domain::Profile,\n) -> RoutingResult<Option<Vec<api_models::routing::RoutableConnectorChoice>>> {\n let profile_wrapper = admin::ProfileWrapper::new(business_profile.clone());\n let chosen_connectors = get_chosen_connectors(\n state,\n key_store,\n session_pm_input,\n transaction_type,\n &profile_wrapper,\n )\n .await?;\n\n let mut final_selection = perform_cgraph_filtering(\n state,\n key_store,\n chosen_connectors,\n session_pm_input.backend_input.clone(),\n None,\n session_pm_input.profile_id,\n transaction_type,\n )\n .await?;\n\n if final_selection.is_empty() {\n let fallback = profile_wrapper\n .get_default_fallback_list_of_connector_under_profile()\n .change_context(errors::RoutingError::FallbackConfigFetchFailed)?;\n\n final_selection = perform_cgraph_filtering(\n state,\n key_store,\n fallback,\n session_pm_input.backend_input.clone(),\n None,\n session_pm_input.profile_id,\n transaction_type,\n )\n .await?;\n }\n\n if final_selection.is_empty() {\n Ok(None)\n } else {\n Ok(Some(final_selection))\n }\n}",
|
| 104 |
+
"after_code": null,
|
| 105 |
+
"diff_span": null,
|
| 106 |
+
"commit_sha": "3c255ac1e592c9cdd0b13b13f3a52e2883a1e5be"
|
| 107 |
+
},
|
| 108 |
+
{
|
| 109 |
+
"id": "crates/router/src/core/payments/routing.rs::function::perform_fallback_routing",
|
| 110 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 111 |
+
"kind": "function_item",
|
| 112 |
+
"status": "removed",
|
| 113 |
+
"before_code": "pub async fn perform_fallback_routing(\n state: &SessionState,\n key_store: &domain::MerchantKeyStore,\n transaction_data: &routing::TransactionData<'_>,\n eligible_connectors: Option<&Vec<api_enums::RoutableConnectors>>,\n business_profile: &domain::Profile,\n) -> RoutingResult<Vec<routing_types::RoutableConnectorChoice>> {\n #[cfg(feature = \"v1\")]\n let fallback_config = routing::helpers::get_merchant_default_config(\n &*state.store,\n match transaction_data {\n routing::TransactionData::Payment(payment_data) => payment_data\n .payment_intent\n .profile_id\n .as_ref()\n .get_required_value(\"profile_id\")\n .change_context(errors::RoutingError::ProfileIdMissing)?\n .get_string_repr(),\n #[cfg(feature = \"payouts\")]\n routing::TransactionData::Payout(payout_data) => {\n payout_data.payout_attempt.profile_id.get_string_repr()\n }\n },\n &api_enums::TransactionType::from(transaction_data),\n )\n .await\n .change_context(errors::RoutingError::FallbackConfigFetchFailed)?;\n #[cfg(feature = \"v2\")]\n let fallback_config = admin::ProfileWrapper::new(business_profile.clone())\n .get_default_fallback_list_of_connector_under_profile()\n .change_context(errors::RoutingError::FallbackConfigFetchFailed)?;\n let backend_input = match transaction_data {\n routing::TransactionData::Payment(payment_data) => make_dsl_input(payment_data)?,\n #[cfg(feature = \"payouts\")]\n routing::TransactionData::Payout(payout_data) => make_dsl_input_for_payouts(payout_data)?,\n };\n\n perform_cgraph_filtering(\n state,\n key_store,\n fallback_config,\n backend_input,\n eligible_connectors,\n business_profile.get_id(),\n &api_enums::TransactionType::from(transaction_data),\n )\n .await\n}",
|
| 114 |
+
"after_code": null,
|
| 115 |
+
"diff_span": null,
|
| 116 |
+
"commit_sha": "3c255ac1e592c9cdd0b13b13f3a52e2883a1e5be"
|
| 117 |
+
},
|
| 118 |
+
{
|
| 119 |
+
"id": "crates/router/src/core/payments/routing.rs::function::perform_success_based_routing",
|
| 120 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 121 |
+
"kind": "function_item",
|
| 122 |
+
"status": "removed",
|
| 123 |
+
"before_code": "pub async fn perform_success_based_routing<F, D>(\n state: &SessionState,\n routable_connectors: Vec<api_routing::RoutableConnectorChoice>,\n profile_id: &common_utils::id_type::ProfileId,\n merchant_id: &common_utils::id_type::MerchantId,\n payment_id: &common_utils::id_type::PaymentId,\n success_based_routing_config_params_interpolator: routing::helpers::DynamicRoutingConfigParamsInterpolator,\n success_based_algo_ref: api_routing::SuccessBasedAlgorithm,\n payment_data: &mut D,\n) -> RoutingResult<Vec<api_routing::RoutableConnectorChoice>>\nwhere\n F: Send + Clone,\n D: OperationSessionGetters<F> + OperationSessionSetters<F> + Send + Sync + Clone,\n{\n if success_based_algo_ref.enabled_feature\n == api_routing::DynamicRoutingFeatures::DynamicConnectorSelection\n {\n logger::debug!(\n \"performing success_based_routing for profile {}\",\n profile_id.get_string_repr()\n );\n let client = &state\n .grpc_client\n .dynamic_routing\n .as_ref()\n .ok_or(errors::RoutingError::SuccessRateClientInitializationError)\n .attach_printable(\"dynamic routing gRPC client not found\")?\n .success_rate_client;\n\n let success_based_routing_configs = routing::helpers::fetch_dynamic_routing_configs::<\n api_routing::SuccessBasedRoutingConfig,\n >(\n state,\n profile_id,\n success_based_algo_ref\n .algorithm_id_with_timestamp\n .algorithm_id\n .ok_or(errors::RoutingError::GenericNotFoundError {\n field: \"success_based_routing_algorithm_id\".to_string(),\n })\n .attach_printable(\"success_based_routing_algorithm_id not found in profile_id\")?,\n )\n .await\n .change_context(errors::RoutingError::SuccessBasedRoutingConfigError)\n .attach_printable(\"unable to fetch success_rate based dynamic routing configs\")?;\n\n let success_based_routing_config_params = success_based_routing_config_params_interpolator\n .get_string_val(\n success_based_routing_configs\n .params\n .as_ref()\n .ok_or(errors::RoutingError::SuccessBasedRoutingParamsNotFoundError)?,\n );\n\n let event_request = utils::CalSuccessRateEventRequest {\n id: profile_id.get_string_repr().to_string(),\n params: success_based_routing_config_params.clone(),\n labels: routable_connectors\n .iter()\n .map(|conn_choice| conn_choice.to_string())\n .collect::<Vec<_>>(),\n config: success_based_routing_configs\n .config\n .as_ref()\n .map(utils::CalSuccessRateConfigEventRequest::from),\n };\n\n let routing_events_wrapper = utils::RoutingEventsWrapper::new(\n state.tenant.tenant_id.clone(),\n state.request_id.clone(),\n payment_id.get_string_repr().to_string(),\n profile_id.to_owned(),\n merchant_id.to_owned(),\n \"IntelligentRouter: CalculateSuccessRate\".to_string(),\n Some(event_request.clone()),\n true,\n false,\n );\n\n let closure = || async {\n let success_based_connectors_result = client\n .calculate_success_rate(\n profile_id.get_string_repr().into(),\n success_based_routing_configs,\n success_based_routing_config_params,\n routable_connectors,\n state.get_grpc_headers(),\n )\n .await\n .change_context(errors::RoutingError::SuccessRateCalculationError)\n .attach_printable(\n \"unable to calculate/fetch success rate from dynamic routing service\",\n );\n\n match success_based_connectors_result {\n Ok(success_response) => {\n let updated_resp = utils::CalSuccessRateEventResponse::try_from(\n &success_response,\n )\n .change_context(errors::RoutingError::RoutingEventsError { message: \"unable to convert SuccessBasedConnectors to CalSuccessRateEventResponse\".to_string(), status_code: 500 })\n .attach_printable(\n \"unable to convert SuccessBasedConnectors to CalSuccessRateEventResponse\",\n )?;\n\n Ok(Some(updated_resp))\n }\n Err(e) => {\n logger::error!(\n \"unable to calculate/fetch success rate from dynamic routing service: {:?}\",\n e.current_context()\n );\n\n Err(error_stack::report!(\n errors::RoutingError::SuccessRateCalculationError\n ))\n }\n }\n };\n\n let events_response = routing_events_wrapper\n .construct_event_builder(\n \"SuccessRateCalculator.FetchSuccessRate\".to_string(),\n RoutingEngine::IntelligentRouter,\n ApiMethod::Grpc,\n )?\n .trigger_event(state, closure)\n .await?;\n\n let success_based_connectors: utils::CalSuccessRateEventResponse = events_response\n .response\n .ok_or(errors::RoutingError::SuccessRateCalculationError)?;\n\n // Need to log error case\n let mut routing_event =\n events_response\n .event\n .ok_or(errors::RoutingError::RoutingEventsError {\n message:\n \"SR-Intelligent-Router: RoutingEvent not found in RoutingEventsResponse\"\n .to_string(),\n status_code: 500,\n })?;\n\n routing_event.set_routing_approach(success_based_connectors.routing_approach.to_string());\n payment_data.set_routing_approach_in_attempt(Some(common_enums::RoutingApproach::from(\n success_based_connectors.routing_approach,\n )));\n\n let mut connectors = Vec::with_capacity(success_based_connectors.labels_with_score.len());\n for label_with_score in success_based_connectors.labels_with_score {\n let (connector, merchant_connector_id) = label_with_score.label\n .split_once(':')\n .ok_or(errors::RoutingError::InvalidSuccessBasedConnectorLabel(label_with_score.label.to_string()))\n .attach_printable(\n \"unable to split connector_name and mca_id from the label obtained by the dynamic routing service\",\n )?;\n connectors.push(api_routing::RoutableConnectorChoice {\n choice_kind: api_routing::RoutableChoiceKind::FullStruct,\n connector: common_enums::RoutableConnectors::from_str(connector)\n .change_context(errors::RoutingError::GenericConversionError {\n from: \"String\".to_string(),\n to: \"RoutableConnectors\".to_string(),\n })\n .attach_printable(\"unable to convert String to RoutableConnectors\")?,\n merchant_connector_id: Some(\n common_utils::id_type::MerchantConnectorAccountId::wrap(\n merchant_connector_id.to_string(),\n )\n .change_context(errors::RoutingError::GenericConversionError {\n from: \"String\".to_string(),\n to: \"MerchantConnectorAccountId\".to_string(),\n })\n .attach_printable(\"unable to convert MerchantConnectorAccountId from string\")?,\n ),\n });\n }\n logger::debug!(success_based_routing_connectors=?connectors);\n\n routing_event.set_status_code(200);\n routing_event.set_routable_connectors(connectors.clone());\n state.event_handler().log_event(&routing_event);\n Ok(connectors)\n } else {\n Ok(routable_connectors)\n }\n}",
|
| 124 |
+
"after_code": null,
|
| 125 |
+
"diff_span": null,
|
| 126 |
+
"commit_sha": "3c255ac1e592c9cdd0b13b13f3a52e2883a1e5be"
|
| 127 |
+
},
|
| 128 |
+
{
|
| 129 |
+
"id": "crates/router/src/core/payments/routing.rs::function::perform_contract_based_routing",
|
| 130 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 131 |
+
"kind": "function_item",
|
| 132 |
+
"status": "removed",
|
| 133 |
+
"before_code": "pub async fn perform_contract_based_routing<F, D>(\n state: &SessionState,\n routable_connectors: Vec<api_routing::RoutableConnectorChoice>,\n profile_id: &common_utils::id_type::ProfileId,\n merchant_id: &common_utils::id_type::MerchantId,\n payment_id: &common_utils::id_type::PaymentId,\n _dynamic_routing_config_params_interpolator: routing::helpers::DynamicRoutingConfigParamsInterpolator,\n contract_based_algo_ref: api_routing::ContractRoutingAlgorithm,\n payment_data: &mut D,\n) -> RoutingResult<Vec<api_routing::RoutableConnectorChoice>>\nwhere\n F: Send + Clone,\n D: OperationSessionGetters<F> + OperationSessionSetters<F> + Send + Sync + Clone,\n{\n if contract_based_algo_ref.enabled_feature\n == api_routing::DynamicRoutingFeatures::DynamicConnectorSelection\n {\n logger::debug!(\n \"performing contract_based_routing for profile {}\",\n profile_id.get_string_repr()\n );\n let client = &state\n .grpc_client\n .dynamic_routing\n .as_ref()\n .ok_or(errors::RoutingError::ContractRoutingClientInitializationError)\n .attach_printable(\"dynamic routing gRPC client not found\")?\n .contract_based_client;\n\n let contract_based_routing_configs = routing::helpers::fetch_dynamic_routing_configs::<\n api_routing::ContractBasedRoutingConfig,\n >(\n state,\n profile_id,\n contract_based_algo_ref\n .algorithm_id_with_timestamp\n .algorithm_id\n .ok_or(errors::RoutingError::GenericNotFoundError {\n field: \"contract_based_routing_algorithm_id\".to_string(),\n })\n .attach_printable(\"contract_based_routing_algorithm_id not found in profile_id\")?,\n )\n .await\n .change_context(errors::RoutingError::ContractBasedRoutingConfigError)\n .attach_printable(\"unable to fetch contract based dynamic routing configs\")?;\n\n let label_info = contract_based_routing_configs\n .label_info\n .clone()\n .ok_or(errors::RoutingError::ContractBasedRoutingConfigError)\n .attach_printable(\"Label information not found in contract routing configs\")?;\n\n let contract_based_connectors = routable_connectors\n .clone()\n .into_iter()\n .filter(|conn| {\n label_info\n .iter()\n .any(|info| Some(info.mca_id.clone()) == conn.merchant_connector_id.clone())\n })\n .collect::<Vec<_>>();\n\n let mut other_connectors = routable_connectors\n .into_iter()\n .filter(|conn| {\n label_info\n .iter()\n .all(|info| Some(info.mca_id.clone()) != conn.merchant_connector_id.clone())\n })\n .collect::<Vec<_>>();\n\n let event_request = utils::CalContractScoreEventRequest {\n id: profile_id.get_string_repr().to_string(),\n params: \"\".to_string(),\n labels: contract_based_connectors\n .iter()\n .map(|conn_choice| conn_choice.to_string())\n .collect::<Vec<_>>(),\n config: Some(contract_based_routing_configs.clone()),\n };\n\n let routing_events_wrapper = utils::RoutingEventsWrapper::new(\n state.tenant.tenant_id.clone(),\n state.request_id.clone(),\n payment_id.get_string_repr().to_string(),\n profile_id.to_owned(),\n merchant_id.to_owned(),\n \"IntelligentRouter: PerformContractRouting\".to_string(),\n Some(event_request.clone()),\n true,\n false,\n );\n\n let closure = || async {\n let contract_based_connectors_result = client\n .calculate_contract_score(\n profile_id.get_string_repr().into(),\n contract_based_routing_configs.clone(),\n \"\".to_string(),\n contract_based_connectors,\n state.get_grpc_headers(),\n )\n .await\n .attach_printable(\n \"unable to calculate/fetch contract score from dynamic routing service\",\n );\n\n let contract_based_connectors = match contract_based_connectors_result {\n Ok(resp) => Some(utils::CalContractScoreEventResponse::from(&resp)),\n Err(err) => match err.current_context() {\n DynamicRoutingError::ContractNotFound => {\n client\n .update_contracts(\n profile_id.get_string_repr().into(),\n label_info,\n \"\".to_string(),\n vec![],\n u64::default(),\n state.get_grpc_headers(),\n )\n .await\n .change_context(errors::RoutingError::ContractScoreUpdationError)\n .attach_printable(\n \"unable to update contract based routing window in dynamic routing service\",\n )?;\n return Err((errors::RoutingError::ContractScoreCalculationError {\n err: err.to_string(),\n })\n .into());\n }\n _ => {\n return Err((errors::RoutingError::ContractScoreCalculationError {\n err: err.to_string(),\n })\n .into())\n }\n },\n };\n\n Ok(contract_based_connectors)\n };\n\n let events_response = routing_events_wrapper\n .construct_event_builder(\n \"ContractScoreCalculator.FetchContractScore\".to_string(),\n RoutingEngine::IntelligentRouter,\n ApiMethod::Grpc,\n )?\n .trigger_event(state, closure)\n .await?;\n\n let contract_based_connectors: utils::CalContractScoreEventResponse = events_response\n .response\n .ok_or(errors::RoutingError::ContractScoreCalculationError {\n err: \"CalContractScoreEventResponse not found\".to_string(),\n })?;\n\n let mut routing_event = events_response\n .event\n .ok_or(errors::RoutingError::RoutingEventsError {\n message:\n \"ContractRouting-Intelligent-Router: RoutingEvent not found in RoutingEventsResponse\"\n .to_string(),\n status_code: 500,\n })?;\n\n payment_data.set_routing_approach_in_attempt(Some(\n common_enums::RoutingApproach::ContractBasedRouting,\n ));\n\n let mut connectors = Vec::with_capacity(contract_based_connectors.labels_with_score.len());\n\n for label_with_score in contract_based_connectors.labels_with_score {\n let (connector, merchant_connector_id) = label_with_score.label\n .split_once(':')\n .ok_or(errors::RoutingError::InvalidContractBasedConnectorLabel(label_with_score.label.to_string()))\n .attach_printable(\n \"unable to split connector_name and mca_id from the label obtained by the dynamic routing service\",\n )?;\n\n connectors.push(api_routing::RoutableConnectorChoice {\n choice_kind: api_routing::RoutableChoiceKind::FullStruct,\n connector: common_enums::RoutableConnectors::from_str(connector)\n .change_context(errors::RoutingError::GenericConversionError {\n from: \"String\".to_string(),\n to: \"RoutableConnectors\".to_string(),\n })\n .attach_printable(\"unable to convert String to RoutableConnectors\")?,\n merchant_connector_id: Some(\n common_utils::id_type::MerchantConnectorAccountId::wrap(\n merchant_connector_id.to_string(),\n )\n .change_context(errors::RoutingError::GenericConversionError {\n from: \"String\".to_string(),\n to: \"MerchantConnectorAccountId\".to_string(),\n })\n .attach_printable(\"unable to convert MerchantConnectorAccountId from string\")?,\n ),\n });\n }\n\n connectors.append(&mut other_connectors);\n\n logger::debug!(contract_based_routing_connectors=?connectors);\n\n routing_event.set_status_code(200);\n routing_event.set_routable_connectors(connectors.clone());\n routing_event.set_routing_approach(api_routing::RoutingApproach::ContractBased.to_string());\n state.event_handler().log_event(&routing_event);\n Ok(connectors)\n } else {\n Ok(routable_connectors)\n }\n}",
|
| 134 |
+
"after_code": null,
|
| 135 |
+
"diff_span": null,
|
| 136 |
+
"commit_sha": "3c255ac1e592c9cdd0b13b13f3a52e2883a1e5be"
|
| 137 |
+
},
|
| 138 |
+
{
|
| 139 |
+
"id": "crates/router/src/core/payments/routing.rs::function::perform_open_routing_for_debit_routing",
|
| 140 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 141 |
+
"kind": "function_item",
|
| 142 |
+
"status": "removed",
|
| 143 |
+
"before_code": "pub async fn perform_open_routing_for_debit_routing<F, D>(\n state: &SessionState,\n co_badged_card_request: or_types::CoBadgedCardRequest,\n card_isin: Option<Secret<String>>,\n old_payment_data: &mut D,\n) -> RoutingResult<or_types::DebitRoutingOutput>\nwhere\n F: Send + Clone,\n D: OperationSessionGetters<F> + OperationSessionSetters<F> + Send + Sync + Clone,\n{\n let payment_attempt = old_payment_data.get_payment_attempt().clone();\n\n logger::debug!(\n \"performing debit routing with open_router for profile {}\",\n payment_attempt.profile_id.get_string_repr()\n );\n\n let metadata = Some(\n serde_json::to_string(&co_badged_card_request)\n .change_context(errors::ApiErrorResponse::InternalServerError)\n .attach_printable(\"Failed to encode Vaulting data to string\")\n .change_context(errors::RoutingError::MetadataParsingError)?,\n );\n\n let open_router_req_body = OpenRouterDecideGatewayRequest::construct_debit_request(\n &payment_attempt,\n metadata,\n card_isin,\n Some(or_types::RankingAlgorithm::NtwBasedRouting),\n );\n\n let routing_events_wrapper = utils::RoutingEventsWrapper::new(\n state.tenant.tenant_id.clone(),\n state.request_id.clone(),\n payment_attempt.payment_id.get_string_repr().to_string(),\n payment_attempt.profile_id.to_owned(),\n payment_attempt.merchant_id.to_owned(),\n \"DecisionEngine: Debit Routing\".to_string(),\n Some(open_router_req_body.clone()),\n true,\n true,\n );\n\n let response: RoutingResult<utils::RoutingEventsResponse<DecidedGateway>> =\n utils::EuclidApiClient::send_decision_engine_request(\n state,\n services::Method::Post,\n \"decide-gateway\",\n Some(open_router_req_body),\n None,\n Some(routing_events_wrapper),\n )\n .await;\n\n let output = match response {\n Ok(events_response) => {\n let response =\n events_response\n .response\n .ok_or(errors::RoutingError::OpenRouterError(\n \"Response from decision engine API is empty\".to_string(),\n ))?;\n\n let debit_routing_output = response\n .debit_routing_output\n .get_required_value(\"debit_routing_output\")\n .change_context(errors::RoutingError::OpenRouterError(\n \"Failed to parse the response from open_router\".into(),\n ))\n .attach_printable(\"debit_routing_output is missing in the open routing response\")?;\n\n old_payment_data.set_routing_approach_in_attempt(Some(\n common_enums::RoutingApproach::from_decision_engine_approach(\n &response.routing_approach,\n ),\n ));\n\n Ok(debit_routing_output)\n }\n Err(error_response) => {\n logger::error!(\"open_router_error_response: {:?}\", error_response);\n Err(errors::RoutingError::OpenRouterError(\n \"Failed to perform debit routing in open router\".into(),\n ))\n }\n }?;\n\n Ok(output)\n}",
|
| 144 |
+
"after_code": null,
|
| 145 |
+
"diff_span": null,
|
| 146 |
+
"commit_sha": "3c255ac1e592c9cdd0b13b13f3a52e2883a1e5be"
|
| 147 |
+
},
|
| 148 |
+
{
|
| 149 |
+
"id": "crates/router/src/core/payments/routing.rs::function::get_chosen_connectors",
|
| 150 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 151 |
+
"kind": "function_item",
|
| 152 |
+
"status": "removed",
|
| 153 |
+
"before_code": "async fn get_chosen_connectors<'a>(\n state: &'a SessionState,\n key_store: &'a domain::MerchantKeyStore,\n session_pm_input: &SessionRoutingPmTypeInput<'_>,\n transaction_type: &api_enums::TransactionType,\n profile_wrapper: &admin::ProfileWrapper,\n) -> RoutingResult<Vec<api_models::routing::RoutableConnectorChoice>> {\n let merchant_id = &key_store.merchant_id;\n\n let MerchantAccountRoutingAlgorithm::V1(algorithm_id) = session_pm_input.routing_algorithm;\n\n let chosen_connectors = if let Some(ref algorithm_id) = algorithm_id {\n let cached_algorithm = ensure_algorithm_cached_v1(\n state,\n merchant_id,\n algorithm_id,\n session_pm_input.profile_id,\n transaction_type,\n )\n .await?;\n\n match cached_algorithm.as_ref() {\n CachedAlgorithm::Single(conn) => vec![(**conn).clone()],\n CachedAlgorithm::Priority(plist) => plist.clone(),\n CachedAlgorithm::VolumeSplit(splits) => perform_volume_split(splits.to_vec())\n .change_context(errors::RoutingError::ConnectorSelectionFailed)?,\n CachedAlgorithm::Advanced(interpreter) => execute_dsl_and_get_connector_v1(\n session_pm_input.backend_input.clone(),\n interpreter,\n )?,\n }\n } else {\n profile_wrapper\n .get_default_fallback_list_of_connector_under_profile()\n .change_context(errors::RoutingError::FallbackConfigFetchFailed)?\n };\n Ok(chosen_connectors)\n}",
|
| 154 |
+
"after_code": null,
|
| 155 |
+
"diff_span": null,
|
| 156 |
+
"commit_sha": "3c255ac1e592c9cdd0b13b13f3a52e2883a1e5be"
|
| 157 |
+
},
|
| 158 |
+
{
|
| 159 |
+
"id": "crates/router/src/core/payments/routing.rs::function::perform_elimination_routing",
|
| 160 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 161 |
+
"kind": "function_item",
|
| 162 |
+
"status": "removed",
|
| 163 |
+
"before_code": "pub async fn perform_elimination_routing(\n state: &SessionState,\n routable_connectors: Vec<api_routing::RoutableConnectorChoice>,\n profile_id: &common_utils::id_type::ProfileId,\n merchant_id: &common_utils::id_type::MerchantId,\n payment_id: &common_utils::id_type::PaymentId,\n elimination_routing_configs_params_interpolator: routing::helpers::DynamicRoutingConfigParamsInterpolator,\n elimination_algo_ref: api_routing::EliminationRoutingAlgorithm,\n) -> RoutingResult<Vec<api_routing::RoutableConnectorChoice>> {\n if elimination_algo_ref.enabled_feature\n == api_routing::DynamicRoutingFeatures::DynamicConnectorSelection\n {\n logger::debug!(\n \"performing elimination_routing for profile {}\",\n profile_id.get_string_repr()\n );\n let client = &state\n .grpc_client\n .dynamic_routing\n .as_ref()\n .ok_or(errors::RoutingError::EliminationClientInitializationError)\n .attach_printable(\"dynamic routing gRPC client not found\")?\n .elimination_based_client;\n\n let elimination_routing_config = routing::helpers::fetch_dynamic_routing_configs::<\n api_routing::EliminationRoutingConfig,\n >(\n state,\n profile_id,\n elimination_algo_ref\n .algorithm_id_with_timestamp\n .algorithm_id\n .ok_or(errors::RoutingError::GenericNotFoundError {\n field: \"elimination_routing_algorithm_id\".to_string(),\n })\n .attach_printable(\n \"elimination_routing_algorithm_id not found in business_profile\",\n )?,\n )\n .await\n .change_context(errors::RoutingError::EliminationRoutingConfigError)\n .attach_printable(\"unable to fetch elimination dynamic routing configs\")?;\n\n let elimination_routing_config_params = elimination_routing_configs_params_interpolator\n .get_string_val(\n elimination_routing_config\n .params\n .as_ref()\n .ok_or(errors::RoutingError::EliminationBasedRoutingParamsNotFoundError)?,\n );\n\n let event_request = utils::EliminationRoutingEventRequest {\n id: profile_id.get_string_repr().to_string(),\n params: elimination_routing_config_params.clone(),\n labels: routable_connectors\n .iter()\n .map(|conn_choice| conn_choice.to_string())\n .collect::<Vec<_>>(),\n config: elimination_routing_config\n .elimination_analyser_config\n .as_ref()\n .map(utils::EliminationRoutingEventBucketConfig::from),\n };\n\n let routing_events_wrapper = utils::RoutingEventsWrapper::new(\n state.tenant.tenant_id.clone(),\n state.request_id.clone(),\n payment_id.get_string_repr().to_string(),\n profile_id.to_owned(),\n merchant_id.to_owned(),\n \"IntelligentRouter: PerformEliminationRouting\".to_string(),\n Some(event_request.clone()),\n true,\n false,\n );\n\n let closure = || async {\n let elimination_based_connectors_result = client\n .perform_elimination_routing(\n profile_id.get_string_repr().to_string(),\n elimination_routing_config_params,\n routable_connectors.clone(),\n elimination_routing_config.elimination_analyser_config,\n state.get_grpc_headers(),\n )\n .await\n .change_context(errors::RoutingError::EliminationRoutingCalculationError)\n .attach_printable(\n \"unable to analyze/fetch elimination routing from dynamic routing service\",\n );\n\n match elimination_based_connectors_result {\n Ok(elimination_response) => Ok(Some(utils::EliminationEventResponse::from(\n &elimination_response,\n ))),\n Err(e) => {\n logger::error!(\n \"unable to analyze/fetch elimination routing from dynamic routing service: {:?}\",\n e.current_context()\n );\n\n Err(error_stack::report!(\n errors::RoutingError::EliminationRoutingCalculationError\n ))\n }\n }\n };\n\n let events_response = routing_events_wrapper\n .construct_event_builder(\n \"EliminationAnalyser.GetEliminationStatus\".to_string(),\n RoutingEngine::IntelligentRouter,\n ApiMethod::Grpc,\n )?\n .trigger_event(state, closure)\n .await?;\n\n let elimination_based_connectors: utils::EliminationEventResponse = events_response\n .response\n .ok_or(errors::RoutingError::EliminationRoutingCalculationError)?;\n\n let mut routing_event = events_response\n .event\n .ok_or(errors::RoutingError::RoutingEventsError {\n message:\n \"Elimination-Intelligent-Router: RoutingEvent not found in RoutingEventsResponse\"\n .to_string(),\n status_code: 500,\n })?;\n\n routing_event.set_routing_approach(utils::RoutingApproach::Elimination.to_string());\n\n let mut connectors =\n Vec::with_capacity(elimination_based_connectors.labels_with_status.len());\n let mut eliminated_connectors =\n Vec::with_capacity(elimination_based_connectors.labels_with_status.len());\n let mut non_eliminated_connectors =\n Vec::with_capacity(elimination_based_connectors.labels_with_status.len());\n for labels_with_status in elimination_based_connectors.labels_with_status {\n let (connector, merchant_connector_id) = labels_with_status.label\n .split_once(':')\n .ok_or(errors::RoutingError::InvalidEliminationBasedConnectorLabel(labels_with_status.label.to_string()))\n .attach_printable(\n \"unable to split connector_name and mca_id from the label obtained by the elimination based dynamic routing service\",\n )?;\n\n let routable_connector = api_routing::RoutableConnectorChoice {\n choice_kind: api_routing::RoutableChoiceKind::FullStruct,\n connector: common_enums::RoutableConnectors::from_str(connector)\n .change_context(errors::RoutingError::GenericConversionError {\n from: \"String\".to_string(),\n to: \"RoutableConnectors\".to_string(),\n })\n .attach_printable(\"unable to convert String to RoutableConnectors\")?,\n merchant_connector_id: Some(\n common_utils::id_type::MerchantConnectorAccountId::wrap(\n merchant_connector_id.to_string(),\n )\n .change_context(errors::RoutingError::GenericConversionError {\n from: \"String\".to_string(),\n to: \"MerchantConnectorAccountId\".to_string(),\n })\n .attach_printable(\"unable to convert MerchantConnectorAccountId from string\")?,\n ),\n };\n\n if labels_with_status\n .elimination_information\n .is_some_and(|elimination_info| {\n elimination_info\n .entity\n .is_some_and(|entity_info| entity_info.is_eliminated)\n })\n {\n eliminated_connectors.push(routable_connector);\n } else {\n non_eliminated_connectors.push(routable_connector);\n }\n connectors.extend(non_eliminated_connectors.clone());\n connectors.extend(eliminated_connectors.clone());\n }\n logger::debug!(dynamic_eliminated_connectors=?eliminated_connectors);\n logger::debug!(dynamic_elimination_based_routing_connectors=?connectors);\n\n routing_event.set_status_code(200);\n routing_event.set_routable_connectors(connectors.clone());\n state.event_handler().log_event(&routing_event);\n Ok(connectors)\n } else {\n Ok(routable_connectors)\n }\n}",
|
| 164 |
+
"after_code": null,
|
| 165 |
+
"diff_span": null,
|
| 166 |
+
"commit_sha": "3c255ac1e592c9cdd0b13b13f3a52e2883a1e5be"
|
| 167 |
+
}
|
| 168 |
+
]
|
| 169 |
+
}
|
diffs/pr_10282/4d87cd9/diff.json
ADDED
|
@@ -0,0 +1,24 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "4d87cd9f4de7d3b43ac90c0774f35bcdd66898d5",
|
| 3 |
+
"pr_number": 10282,
|
| 4 |
+
"rust_files": [
|
| 5 |
+
"crates/router/src/core/payments/routing.rs"
|
| 6 |
+
],
|
| 7 |
+
"diffs": [
|
| 8 |
+
{
|
| 9 |
+
"id": "crates/router/src/core/payments/routing.rs::function::perform_cgraph_filtering",
|
| 10 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 11 |
+
"kind": "function_item",
|
| 12 |
+
"status": "modified",
|
| 13 |
+
"code_changed": true,
|
| 14 |
+
"imports_changed": false,
|
| 15 |
+
"before_code": "pub async fn perform_cgraph_filtering(\n state: &SessionState,\n key_store: &domain::MerchantKeyStore,\n chosen: Vec<routing_types::RoutableConnectorChoice>,\n backend_input: dsl_inputs::BackendInput,\n eligible_connectors: Option<&Vec<api_enums::RoutableConnectors>>,\n profile_id: &common_utils::id_type::ProfileId,\n transaction_type: &api_enums::TransactionType,\n) -> RoutingResult<Vec<routing_types::RoutableConnectorChoice>> {\n let context = euclid_graph::AnalysisContext::from_dir_values(\n backend_input\n .into_context()\n .change_context(errors::RoutingError::KgraphAnalysisError)?,\n );\n let cached_cgraph = get_merchant_cgraph(state, key_store, profile_id, transaction_type).await?;\n let db_mcas = state\n .store\n .find_merchant_connector_account_by_merchant_id_and_disabled_list(\n &state.into(),\n &key_store.merchant_id,\n false,\n key_store,\n )\n .await\n .unwrap_or_else(|_| std::iter::empty().collect::<Vec<_>>());\n\n let active_mca_ids: std::collections::HashSet<_> = db_mcas\n .iter()\n .map(|mca| mca.get_id().to_string())\n .collect();\n\n let mut final_selection = Vec::<routing_types::RoutableConnectorChoice>::new();\n\n for choice in chosen {\n let routable_connector = choice.connector;\n\n let euclid_choice: ast::ConnectorChoice = choice.clone().foreign_into();\n let dir_val = euclid_choice\n .into_dir_value()\n .change_context(errors::RoutingError::KgraphAnalysisError)?;\n\n let cgraph_eligible = cached_cgraph\n .check_value_validity(\n dir_val,\n &context,\n &mut hyperswitch_constraint_graph::Memoization::new(),\n &mut hyperswitch_constraint_graph::CycleCheck::new(),\n None,\n )\n .change_context(errors::RoutingError::KgraphAnalysisError)?;\n\n let filter_eligible =\n eligible_connectors.is_none_or(|list| list.contains(&routable_connector));\n\n let mca_active = choice\n .merchant_connector_id\n .as_ref()\n .map(|id| active_mca_ids.contains(id))\n .unwrap_or(true);\n\n if cgraph_eligible && filter_eligible && mca_active {\n final_selection.push(choice);\n }\n }\n\n Ok(final_selection)\n}",
|
| 16 |
+
"after_code": "pub async fn perform_cgraph_filtering(\n state: &SessionState,\n key_store: &domain::MerchantKeyStore,\n chosen: Vec<routing_types::RoutableConnectorChoice>,\n backend_input: dsl_inputs::BackendInput,\n eligible_connectors: Option<&Vec<api_enums::RoutableConnectors>>,\n profile_id: &common_utils::id_type::ProfileId,\n transaction_type: &api_enums::TransactionType,\n) -> RoutingResult<Vec<routing_types::RoutableConnectorChoice>> {\n let context = euclid_graph::AnalysisContext::from_dir_values(\n backend_input\n .into_context()\n .change_context(errors::RoutingError::KgraphAnalysisError)?,\n );\n\n let cached_cgraph =\n get_merchant_cgraph(state, key_store, profile_id, transaction_type).await?;\n\n let db_mcas = state\n .store\n .find_merchant_connector_account_by_merchant_id_and_disabled_list(\n &state.into(),\n &key_store.merchant_id,\n false,\n key_store,\n )\n .await\n .unwrap_or_else(|_| hyperswitch_domain_models::merchant_connector_account::MerchantConnectorAccounts::new(vec![]));\n\n\n let active_mca_ids: std::collections::HashSet<_> = db_mcas\n .iter()\n .map(|mca| mca.get_id().clone())\n .collect();\n\n let mut final_selection = Vec::new();\n\n for choice in chosen {\n let routable_connector = choice.connector;\n\n let euclid_choice: ast::ConnectorChoice = choice.clone().foreign_into();\n let dir_val = euclid_choice\n .into_dir_value()\n .change_context(errors::RoutingError::KgraphAnalysisError)?;\n\n let cgraph_eligible = cached_cgraph\n .check_value_validity(\n dir_val,\n &context,\n &mut hyperswitch_constraint_graph::Memoization::new(),\n &mut hyperswitch_constraint_graph::CycleCheck::new(),\n None,\n )\n .change_context(errors::RoutingError::KgraphAnalysisError)?;\n\n let filter_eligible =\n eligible_connectors.is_none_or(|list| list.contains(&routable_connector));\n\n let mca_active = choice\n .merchant_connector_id\n .as_ref()\n .map(|id| active_mca_ids.contains(id))\n .unwrap_or(true);\n\n if cgraph_eligible && filter_eligible && mca_active {\n final_selection.push(choice);\n }\n }\n\n Ok(final_selection)\n}",
|
| 17 |
+
"diff_span": {
|
| 18 |
+
"before": " .change_context(errors::RoutingError::KgraphAnalysisError)?,\n );\n let cached_cgraph = get_merchant_cgraph(state, key_store, profile_id, transaction_type).await?;\n let db_mcas = state\n .store\n .find_merchant_connector_account_by_merchant_id_and_disabled_list(\n &state.into(),\n &key_store.merchant_id,\n false,\n key_store,\n )\n .await\n .unwrap_or_else(|_| std::iter::empty().collect::<Vec<_>>());\n\n let active_mca_ids: std::collections::HashSet<_> = db_mcas\n .iter()\n .map(|mca| mca.get_id().to_string())\n .collect();\n\n let mut final_selection = Vec::<routing_types::RoutableConnectorChoice>::new();\n\n for choice in chosen {",
|
| 19 |
+
"after": " .change_context(errors::RoutingError::KgraphAnalysisError)?,\n );\n\n let cached_cgraph =\n get_merchant_cgraph(state, key_store, profile_id, transaction_type).await?;\n\n let db_mcas = state\n .store\n .find_merchant_connector_account_by_merchant_id_and_disabled_list(\n &state.into(),\n &key_store.merchant_id,\n false,\n key_store,\n )\n .await\n .unwrap_or_else(|_| hyperswitch_domain_models::merchant_connector_account::MerchantConnectorAccounts::new(vec![]));\n\n\n let active_mca_ids: std::collections::HashSet<_> = db_mcas\n .iter()\n .map(|mca| mca.get_id().clone())\n .collect();\n\n let mut final_selection = Vec::new();\n\n for choice in chosen {"
|
| 20 |
+
},
|
| 21 |
+
"commit_sha": "4d87cd9f4de7d3b43ac90c0774f35bcdd66898d5"
|
| 22 |
+
}
|
| 23 |
+
]
|
| 24 |
+
}
|
diffs/pr_10282/65e29ce/diff.json
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
diffs/pr_10282/6ea2fff/diff.json
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
diffs/pr_10282/8ef79f3/diff.json
ADDED
|
@@ -0,0 +1,169 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "8ef79f3dfe5969e37899f07d5814ca02a116db97",
|
| 3 |
+
"pr_number": 10282,
|
| 4 |
+
"rust_files": [
|
| 5 |
+
"crates/router/src/core/payments/routing.rs"
|
| 6 |
+
],
|
| 7 |
+
"diffs": [
|
| 8 |
+
{
|
| 9 |
+
"id": "crates/router/src/core/payments/routing.rs::function::perform_cgraph_filtering",
|
| 10 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 11 |
+
"kind": "function_item",
|
| 12 |
+
"status": "added",
|
| 13 |
+
"before_code": null,
|
| 14 |
+
"after_code": "pub async fn perform_cgraph_filtering(\n state: &SessionState,\n key_store: &domain::MerchantKeyStore,\n chosen: Vec<routing_types::RoutableConnectorChoice>,\n backend_input: dsl_inputs::BackendInput,\n eligible_connectors: Option<&Vec<api_enums::RoutableConnectors>>,\n profile_id: &common_utils::id_type::ProfileId,\n transaction_type: &api_enums::TransactionType,\n) -> RoutingResult<Vec<routing_types::RoutableConnectorChoice>> {\n let context = euclid_graph::AnalysisContext::from_dir_values(\n backend_input\n .into_context()\n .change_context(errors::RoutingError::KgraphAnalysisError)?,\n );\n\n let cached_cgraph = get_merchant_cgraph(state, key_store, profile_id, transaction_type).await?;\n\n let db_mcas = state\n .store\n .find_merchant_connector_account_by_merchant_id_and_disabled_list(\n &state.into(),\n &key_store.merchant_id,\n false,\n key_store,\n )\n .await\n .unwrap_or_else(|_| {\n hyperswitch_domain_models::merchant_connector_account::MerchantConnectorAccounts::new(\n vec![],\n )\n });\n\n let active_mca_ids: std::collections::HashSet<_> =\n db_mcas.iter().map(|mca| mca.get_id().clone()).collect();\n\n let mut final_selection = Vec::new();\n\n for choice in chosen {\n let routable_connector = choice.connector;\n\n let euclid_choice: ast::ConnectorChoice = choice.clone().foreign_into();\n let dir_val = euclid_choice\n .into_dir_value()\n .change_context(errors::RoutingError::KgraphAnalysisError)?;\n\n let cgraph_eligible = cached_cgraph\n .check_value_validity(\n dir_val,\n &context,\n &mut hyperswitch_constraint_graph::Memoization::new(),\n &mut hyperswitch_constraint_graph::CycleCheck::new(),\n None,\n )\n .change_context(errors::RoutingError::KgraphAnalysisError)?;\n\n let filter_eligible =\n eligible_connectors.is_none_or(|list| list.contains(&routable_connector));\n\n let mca_active = choice\n .merchant_connector_id\n .as_ref()\n .map(|id| active_mca_ids.contains(id))\n .unwrap_or(true);\n\n if cgraph_eligible && filter_eligible && mca_active {\n final_selection.push(choice);\n }\n }\n\n Ok(final_selection)\n}",
|
| 15 |
+
"diff_span": null,
|
| 16 |
+
"commit_sha": "8ef79f3dfe5969e37899f07d5814ca02a116db97"
|
| 17 |
+
},
|
| 18 |
+
{
|
| 19 |
+
"id": "crates/router/src/core/payments/routing.rs::function::make_dsl_input_for_surcharge",
|
| 20 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 21 |
+
"kind": "function_item",
|
| 22 |
+
"status": "added",
|
| 23 |
+
"before_code": null,
|
| 24 |
+
"after_code": "pub fn make_dsl_input_for_surcharge(\n payment_attempt: &oss_storage::PaymentAttempt,\n payment_intent: &oss_storage::PaymentIntent,\n billing_address: Option<Address>,\n) -> RoutingResult<dsl_inputs::BackendInput> {\n let mandate_data = dsl_inputs::MandateData {\n mandate_acceptance_type: None,\n mandate_type: None,\n payment_type: None,\n };\n\n let payment_input = dsl_inputs::PaymentInput {\n amount: payment_attempt.get_total_amount(),\n // currency is always populated in payment_attempt during payment create\n currency: payment_attempt\n .currency\n .get_required_value(\"currency\")\n .change_context(errors::RoutingError::DslMissingRequiredField {\n field_name: \"currency\".to_string(),\n })?,\n authentication_type: payment_attempt.authentication_type,\n card_bin: None,\n capture_method: payment_attempt.capture_method,\n business_country: payment_intent\n .business_country\n .map(api_enums::Country::from_alpha2),\n billing_country: billing_address\n .and_then(|bic| bic.address)\n .and_then(|add| add.country)\n .map(api_enums::Country::from_alpha2),\n business_label: payment_intent.business_label.clone(),\n setup_future_usage: payment_intent.setup_future_usage,\n };\n\n let metadata = payment_intent\n .parse_and_get_metadata(\"routing_parameters\")\n .change_context(errors::RoutingError::MetadataParsingError)\n .attach_printable(\"Unable to parse routing_parameters from metadata of payment_intent\")\n .unwrap_or(None);\n let payment_method_input = dsl_inputs::PaymentMethodInput {\n payment_method: None,\n payment_method_type: None,\n card_network: None,\n };\n let backend_input = dsl_inputs::BackendInput {\n metadata,\n payment: payment_input,\n payment_method: payment_method_input,\n mandate: mandate_data,\n acquirer_data: None,\n customer_device_data: None,\n issuer_data: None,\n };\n Ok(backend_input)\n}",
|
| 25 |
+
"diff_span": null,
|
| 26 |
+
"commit_sha": "8ef79f3dfe5969e37899f07d5814ca02a116db97"
|
| 27 |
+
},
|
| 28 |
+
{
|
| 29 |
+
"id": "crates/router/src/core/payments/routing.rs::function::perform_session_flow_routing",
|
| 30 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 31 |
+
"kind": "function_item",
|
| 32 |
+
"status": "added",
|
| 33 |
+
"before_code": null,
|
| 34 |
+
"after_code": "pub async fn perform_session_flow_routing(\n session_input: SessionFlowRoutingInput<'_>,\n business_profile: &domain::Profile,\n transaction_type: &api_enums::TransactionType,\n) -> RoutingResult<(\n FxHashMap<api_enums::PaymentMethodType, Vec<routing_types::SessionRoutingChoice>>,\n Option<common_enums::RoutingApproach>,\n)> {\n let mut pm_type_map: FxHashMap<api_enums::PaymentMethodType, FxHashMap<String, api::GetToken>> =\n FxHashMap::default();\n\n let profile_id = session_input\n .payment_intent\n .profile_id\n .clone()\n .get_required_value(\"profile_id\")\n .change_context(errors::RoutingError::ProfileIdMissing)?;\n\n let routing_algorithm: MerchantAccountRoutingAlgorithm = {\n business_profile\n .routing_algorithm\n .clone()\n .map(|val| val.parse_value(\"MerchantAccountRoutingAlgorithm\"))\n .transpose()\n .change_context(errors::RoutingError::InvalidRoutingAlgorithmStructure)?\n .unwrap_or_default()\n };\n\n let payment_method_input = dsl_inputs::PaymentMethodInput {\n payment_method: None,\n payment_method_type: None,\n card_network: None,\n };\n\n let payment_input = dsl_inputs::PaymentInput {\n amount: session_input.payment_attempt.get_total_amount(),\n currency: session_input\n .payment_intent\n .currency\n .get_required_value(\"Currency\")\n .change_context(errors::RoutingError::DslMissingRequiredField {\n field_name: \"currency\".to_string(),\n })?,\n authentication_type: session_input.payment_attempt.authentication_type,\n card_bin: None,\n capture_method: session_input\n .payment_attempt\n .capture_method\n .and_then(Option::<euclid_enums::CaptureMethod>::foreign_from),\n business_country: session_input\n .payment_intent\n .business_country\n .map(api_enums::Country::from_alpha2),\n billing_country: session_input\n .country\n .map(storage_enums::Country::from_alpha2),\n business_label: session_input.payment_intent.business_label.clone(),\n setup_future_usage: session_input.payment_intent.setup_future_usage,\n };\n\n let metadata = session_input\n .payment_intent\n .parse_and_get_metadata(\"routing_parameters\")\n .change_context(errors::RoutingError::MetadataParsingError)\n .attach_printable(\"Unable to parse routing_parameters from metadata of payment_intent\")\n .unwrap_or(None);\n\n let mut backend_input = dsl_inputs::BackendInput {\n metadata,\n payment: payment_input,\n payment_method: payment_method_input,\n mandate: dsl_inputs::MandateData {\n mandate_acceptance_type: None,\n mandate_type: None,\n payment_type: None,\n },\n acquirer_data: None,\n customer_device_data: None,\n issuer_data: None,\n };\n\n for connector_data in session_input.chosen.iter() {\n pm_type_map\n .entry(connector_data.payment_method_sub_type)\n .or_default()\n .insert(\n connector_data.connector.connector_name.to_string(),\n connector_data.connector.get_token.clone(),\n );\n }\n\n let mut result: FxHashMap<\n api_enums::PaymentMethodType,\n Vec<routing_types::SessionRoutingChoice>,\n > = FxHashMap::default();\n let mut final_routing_approach = None;\n\n for (pm_type, allowed_connectors) in pm_type_map {\n let euclid_pmt: euclid_enums::PaymentMethodType = pm_type;\n let euclid_pm: euclid_enums::PaymentMethod = euclid_pmt.into();\n\n backend_input.payment_method.payment_method = Some(euclid_pm);\n backend_input.payment_method.payment_method_type = Some(euclid_pmt);\n\n let session_pm_input = SessionRoutingPmTypeInput {\n state: session_input.state,\n key_store: session_input.key_store,\n attempt_id: session_input.payment_attempt.get_id(),\n routing_algorithm: &routing_algorithm,\n backend_input: backend_input.clone(),\n allowed_connectors,\n profile_id: &profile_id,\n };\n\n let (routable_connector_choice_option, routing_approach) =\n perform_session_routing_for_pm_type(\n &session_pm_input,\n transaction_type,\n business_profile,\n )\n .await?;\n\n final_routing_approach = routing_approach;\n\n if let Some(routable_connector_choice) = routable_connector_choice_option {\n let mut session_routing_choice: Vec<routing_types::SessionRoutingChoice> = Vec::new();\n\n for selection in routable_connector_choice {\n let connector_name = selection.connector.to_string();\n if let Some(get_token) = session_pm_input.allowed_connectors.get(&connector_name) {\n let connector_data = api::ConnectorData::get_connector_by_name(\n &session_pm_input.state.clone().conf.connectors,\n &connector_name,\n get_token.clone(),\n selection.merchant_connector_id,\n )\n .change_context(errors::RoutingError::InvalidConnectorName(connector_name))?;\n\n session_routing_choice.push(routing_types::SessionRoutingChoice {\n connector: connector_data,\n payment_method_type: pm_type,\n });\n }\n }\n if !session_routing_choice.is_empty() {\n result.insert(pm_type, session_routing_choice);\n }\n }\n }\n\n Ok((result, final_routing_approach))\n}",
|
| 35 |
+
"diff_span": null,
|
| 36 |
+
"commit_sha": "8ef79f3dfe5969e37899f07d5814ca02a116db97"
|
| 37 |
+
},
|
| 38 |
+
{
|
| 39 |
+
"id": "crates/router/src/core/payments/routing.rs::function::perform_dynamic_routing_with_open_router",
|
| 40 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 41 |
+
"kind": "function_item",
|
| 42 |
+
"status": "added",
|
| 43 |
+
"before_code": null,
|
| 44 |
+
"after_code": "pub async fn perform_dynamic_routing_with_open_router<F, D>(\n state: &SessionState,\n routable_connectors: Vec<api_routing::RoutableConnectorChoice>,\n profile: &domain::Profile,\n payment_data: oss_storage::PaymentAttempt,\n old_payment_data: &mut D,\n) -> RoutingResult<Vec<api_routing::RoutableConnectorChoice>>\nwhere\n F: Send + Clone,\n D: OperationSessionGetters<F> + OperationSessionSetters<F> + Send + Sync + Clone,\n{\n let dynamic_routing_algo_ref: api_routing::DynamicRoutingAlgorithmRef = profile\n .dynamic_routing_algorithm\n .clone()\n .map(|val| val.parse_value(\"DynamicRoutingAlgorithmRef\"))\n .transpose()\n .change_context(errors::RoutingError::DeserializationError {\n from: \"JSON\".to_string(),\n to: \"DynamicRoutingAlgorithmRef\".to_string(),\n })\n .attach_printable(\"unable to deserialize DynamicRoutingAlgorithmRef from JSON\")?\n .ok_or(errors::RoutingError::GenericNotFoundError {\n field: \"dynamic_routing_algorithm\".to_string(),\n })?;\n\n logger::debug!(\n \"performing dynamic_routing with open_router for profile {}\",\n profile.get_id().get_string_repr()\n );\n\n let is_success_rate_routing_enabled =\n dynamic_routing_algo_ref.is_success_rate_routing_enabled();\n let is_elimination_enabled = dynamic_routing_algo_ref.is_elimination_enabled();\n\n // Since success_based and elimination routing is being done in 1 api call, we call decide_gateway when either of it enabled\n let connectors = if is_success_rate_routing_enabled || is_elimination_enabled {\n let connectors = perform_decide_gateway_call_with_open_router(\n state,\n routable_connectors.clone(),\n profile.get_id(),\n &payment_data,\n is_elimination_enabled,\n old_payment_data,\n )\n .await?;\n\n if is_elimination_enabled {\n // This will initiate the elimination process for the connector.\n // Penalize the elimination score of the connector before making a payment.\n // Once the payment is made, we will update the score based on the payment status\n if let Some(connector) = connectors.first() {\n logger::debug!(\n \"penalizing the elimination score of the gateway with id {} in open_router for profile {}\",\n connector, profile.get_id().get_string_repr()\n );\n update_gateway_score_with_open_router(\n state,\n connector.clone(),\n profile.get_id(),\n &payment_data.merchant_id,\n &payment_data.payment_id,\n common_enums::AttemptStatus::AuthenticationPending,\n )\n .await?\n }\n }\n connectors\n } else {\n routable_connectors\n };\n\n Ok(connectors)\n}",
|
| 45 |
+
"diff_span": null,
|
| 46 |
+
"commit_sha": "8ef79f3dfe5969e37899f07d5814ca02a116db97"
|
| 47 |
+
},
|
| 48 |
+
{
|
| 49 |
+
"id": "crates/router/src/core/payments/routing.rs::function::perform_eligibility_analysis",
|
| 50 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 51 |
+
"kind": "function_item",
|
| 52 |
+
"status": "added",
|
| 53 |
+
"before_code": null,
|
| 54 |
+
"after_code": "pub async fn perform_eligibility_analysis(\n state: &SessionState,\n key_store: &domain::MerchantKeyStore,\n chosen: Vec<routing_types::RoutableConnectorChoice>,\n transaction_data: &routing::TransactionData<'_>,\n eligible_connectors: Option<&Vec<api_enums::RoutableConnectors>>,\n profile_id: &common_utils::id_type::ProfileId,\n) -> RoutingResult<Vec<routing_types::RoutableConnectorChoice>> {\n let backend_input = match transaction_data {\n routing::TransactionData::Payment(payment_data) => make_dsl_input(payment_data)?,\n #[cfg(feature = \"payouts\")]\n routing::TransactionData::Payout(payout_data) => make_dsl_input_for_payouts(payout_data)?,\n };\n\n perform_cgraph_filtering(\n state,\n key_store,\n chosen,\n backend_input,\n eligible_connectors,\n profile_id,\n &api_enums::TransactionType::from(transaction_data),\n )\n .await\n}",
|
| 55 |
+
"diff_span": null,
|
| 56 |
+
"commit_sha": "8ef79f3dfe5969e37899f07d5814ca02a116db97"
|
| 57 |
+
},
|
| 58 |
+
{
|
| 59 |
+
"id": "crates/router/src/core/payments/routing.rs::function::perform_decide_gateway_call_with_open_router",
|
| 60 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 61 |
+
"kind": "function_item",
|
| 62 |
+
"status": "added",
|
| 63 |
+
"before_code": null,
|
| 64 |
+
"after_code": "pub async fn perform_decide_gateway_call_with_open_router<F, D>(\n state: &SessionState,\n mut routable_connectors: Vec<api_routing::RoutableConnectorChoice>,\n profile_id: &common_utils::id_type::ProfileId,\n payment_attempt: &oss_storage::PaymentAttempt,\n is_elimination_enabled: bool,\n old_payment_data: &mut D,\n) -> RoutingResult<Vec<api_routing::RoutableConnectorChoice>>\nwhere\n F: Send + Clone,\n D: OperationSessionGetters<F> + OperationSessionSetters<F> + Send + Sync + Clone,\n{\n logger::debug!(\n \"performing decide_gateway call with open_router for profile {}\",\n profile_id.get_string_repr()\n );\n\n let open_router_req_body = OpenRouterDecideGatewayRequest::construct_sr_request(\n payment_attempt,\n routable_connectors.clone(),\n Some(or_types::RankingAlgorithm::SrBasedRouting),\n is_elimination_enabled,\n );\n\n let routing_events_wrapper = utils::RoutingEventsWrapper::new(\n state.tenant.tenant_id.clone(),\n state.request_id.clone(),\n payment_attempt.payment_id.get_string_repr().to_string(),\n payment_attempt.profile_id.to_owned(),\n payment_attempt.merchant_id.to_owned(),\n \"DecisionEngine: SuccessRate decide_gateway\".to_string(),\n Some(open_router_req_body.clone()),\n true,\n false,\n );\n\n let response: RoutingResult<utils::RoutingEventsResponse<DecidedGateway>> =\n utils::SRApiClient::send_decision_engine_request(\n state,\n services::Method::Post,\n \"decide-gateway\",\n Some(open_router_req_body),\n None,\n Some(routing_events_wrapper),\n )\n .await;\n\n let sr_sorted_connectors = match response {\n Ok(resp) => {\n let decided_gateway: DecidedGateway =\n resp.response.ok_or(errors::RoutingError::OpenRouterError(\n \"Empty response received from open_router\".into(),\n ))?;\n\n let mut routing_event = resp.event.ok_or(errors::RoutingError::RoutingEventsError {\n message: \"Decision-Engine: RoutingEvent not found in RoutingEventsResponse\"\n .to_string(),\n status_code: 500,\n })?;\n\n routing_event.set_response_body(&decided_gateway);\n routing_event.set_routing_approach(\n utils::RoutingApproach::from_decision_engine_approach(\n &decided_gateway.routing_approach,\n )\n .to_string(),\n );\n\n old_payment_data.set_routing_approach_in_attempt(Some(\n common_enums::RoutingApproach::from_decision_engine_approach(\n &decided_gateway.routing_approach,\n ),\n ));\n\n if let Some(gateway_priority_map) = decided_gateway.gateway_priority_map {\n logger::debug!(gateway_priority_map=?gateway_priority_map, routing_approach=decided_gateway.routing_approach, \"open_router decide_gateway call response\");\n routable_connectors.sort_by(|connector_choice_a, connector_choice_b| {\n let connector_choice_a_score = gateway_priority_map\n .get(&connector_choice_a.to_string())\n .copied()\n .unwrap_or(0.0);\n let connector_choice_b_score = gateway_priority_map\n .get(&connector_choice_b.to_string())\n .copied()\n .unwrap_or(0.0);\n connector_choice_b_score\n .partial_cmp(&connector_choice_a_score)\n .unwrap_or(std::cmp::Ordering::Equal)\n });\n }\n\n routing_event.set_routable_connectors(routable_connectors.clone());\n state.event_handler().log_event(&routing_event);\n\n Ok(routable_connectors)\n }\n Err(err) => {\n logger::error!(\"open_router_error_response: {:?}\", err);\n\n Err(errors::RoutingError::OpenRouterError(\n \"Failed to perform decide_gateway call in open_router\".into(),\n ))\n }\n }?;\n\n Ok(sr_sorted_connectors)\n}",
|
| 65 |
+
"diff_span": null,
|
| 66 |
+
"commit_sha": "8ef79f3dfe5969e37899f07d5814ca02a116db97"
|
| 67 |
+
},
|
| 68 |
+
{
|
| 69 |
+
"id": "crates/router/src/core/payments/routing.rs::function::perform_eligibility_analysis_with_fallback",
|
| 70 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 71 |
+
"kind": "function_item",
|
| 72 |
+
"status": "added",
|
| 73 |
+
"before_code": null,
|
| 74 |
+
"after_code": "pub async fn perform_eligibility_analysis_with_fallback(\n state: &SessionState,\n key_store: &domain::MerchantKeyStore,\n chosen: Vec<routing_types::RoutableConnectorChoice>,\n transaction_data: &routing::TransactionData<'_>,\n eligible_connectors: Option<Vec<api_enums::RoutableConnectors>>,\n business_profile: &domain::Profile,\n) -> RoutingResult<Vec<routing_types::RoutableConnectorChoice>> {\n logger::debug!(\"euclid_routing: performing eligibility\");\n let mut final_selection = perform_eligibility_analysis(\n state,\n key_store,\n chosen,\n transaction_data,\n eligible_connectors.as_ref(),\n business_profile.get_id(),\n )\n .await?;\n\n let fallback_selection = perform_fallback_routing(\n state,\n key_store,\n transaction_data,\n eligible_connectors.as_ref(),\n business_profile,\n )\n .await;\n\n final_selection.append(\n &mut fallback_selection\n .unwrap_or_default()\n .iter()\n .filter(|&routable_connector_choice| {\n !final_selection.contains(routable_connector_choice)\n })\n .cloned()\n .collect::<Vec<_>>(),\n );\n\n let final_selected_connectors = final_selection\n .iter()\n .map(|item| item.connector)\n .collect::<Vec<_>>();\n logger::debug!(final_selected_connectors_for_routing=?final_selected_connectors, \"euclid_routing: List of final selected connectors for routing\");\n\n Ok(final_selection)\n}",
|
| 75 |
+
"diff_span": null,
|
| 76 |
+
"commit_sha": "8ef79f3dfe5969e37899f07d5814ca02a116db97"
|
| 77 |
+
},
|
| 78 |
+
{
|
| 79 |
+
"id": "crates/router/src/core/payments/routing.rs::function::perform_dynamic_routing_with_intelligent_router",
|
| 80 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 81 |
+
"kind": "function_item",
|
| 82 |
+
"status": "added",
|
| 83 |
+
"before_code": null,
|
| 84 |
+
"after_code": "pub async fn perform_dynamic_routing_with_intelligent_router<F, D>(\n state: &SessionState,\n routable_connectors: Vec<api_routing::RoutableConnectorChoice>,\n profile: &domain::Profile,\n dynamic_routing_config_params_interpolator: routing::helpers::DynamicRoutingConfigParamsInterpolator,\n payment_data: &mut D,\n) -> RoutingResult<Vec<api_routing::RoutableConnectorChoice>>\nwhere\n F: Send + Clone,\n D: OperationSessionGetters<F> + OperationSessionSetters<F> + Send + Sync + Clone,\n{\n let dynamic_routing_algo_ref: api_routing::DynamicRoutingAlgorithmRef = profile\n .dynamic_routing_algorithm\n .clone()\n .map(|val| val.parse_value(\"DynamicRoutingAlgorithmRef\"))\n .transpose()\n .change_context(errors::RoutingError::DeserializationError {\n from: \"JSON\".to_string(),\n to: \"DynamicRoutingAlgorithmRef\".to_string(),\n })\n .attach_printable(\"unable to deserialize DynamicRoutingAlgorithmRef from JSON\")?\n .ok_or(errors::RoutingError::GenericNotFoundError {\n field: \"dynamic_routing_algorithm\".to_string(),\n })?;\n\n logger::debug!(\n \"performing dynamic_routing for profile {}\",\n profile.get_id().get_string_repr()\n );\n\n let payment_attempt = payment_data.get_payment_attempt().clone();\n\n let mut connector_list = match dynamic_routing_algo_ref\n .success_based_algorithm\n .as_ref()\n .async_map(|algorithm| {\n perform_success_based_routing(\n state,\n routable_connectors.clone(),\n profile.get_id(),\n &payment_attempt.merchant_id,\n &payment_attempt.payment_id,\n dynamic_routing_config_params_interpolator.clone(),\n algorithm.clone(),\n payment_data,\n )\n })\n .await\n .transpose()\n .inspect_err(|e| logger::error!(dynamic_routing_error=?e))\n .ok()\n .flatten()\n {\n Some(success_based_list) => success_based_list,\n None => {\n // Only run contract based if success based returns None\n dynamic_routing_algo_ref\n .contract_based_routing\n .as_ref()\n .async_map(|algorithm| {\n perform_contract_based_routing(\n state,\n routable_connectors.clone(),\n profile.get_id(),\n &payment_attempt.merchant_id,\n &payment_attempt.payment_id,\n dynamic_routing_config_params_interpolator.clone(),\n algorithm.clone(),\n payment_data,\n )\n })\n .await\n .transpose()\n .inspect_err(|e| logger::error!(dynamic_routing_error=?e))\n .ok()\n .flatten()\n .unwrap_or(routable_connectors.clone())\n }\n };\n\n connector_list = dynamic_routing_algo_ref\n .elimination_routing_algorithm\n .as_ref()\n .async_map(|algorithm| {\n perform_elimination_routing(\n state,\n connector_list.clone(),\n profile.get_id(),\n &payment_attempt.merchant_id,\n &payment_attempt.payment_id,\n dynamic_routing_config_params_interpolator.clone(),\n algorithm.clone(),\n )\n })\n .await\n .transpose()\n .inspect_err(|e| logger::error!(dynamic_routing_error=?e))\n .ok()\n .flatten()\n .unwrap_or(connector_list);\n\n Ok(connector_list)\n}",
|
| 85 |
+
"diff_span": null,
|
| 86 |
+
"commit_sha": "8ef79f3dfe5969e37899f07d5814ca02a116db97"
|
| 87 |
+
},
|
| 88 |
+
{
|
| 89 |
+
"id": "crates/router/src/core/payments/routing.rs::function::update_gateway_score_with_open_router",
|
| 90 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 91 |
+
"kind": "function_item",
|
| 92 |
+
"status": "added",
|
| 93 |
+
"before_code": null,
|
| 94 |
+
"after_code": "pub async fn update_gateway_score_with_open_router(\n state: &SessionState,\n payment_connector: api_routing::RoutableConnectorChoice,\n profile_id: &common_utils::id_type::ProfileId,\n merchant_id: &common_utils::id_type::MerchantId,\n payment_id: &common_utils::id_type::PaymentId,\n payment_status: common_enums::AttemptStatus,\n) -> RoutingResult<()> {\n let open_router_req_body = or_types::UpdateScorePayload {\n merchant_id: profile_id.clone(),\n gateway: payment_connector.to_string(),\n status: payment_status.foreign_into(),\n payment_id: payment_id.clone(),\n };\n\n let routing_events_wrapper = utils::RoutingEventsWrapper::new(\n state.tenant.tenant_id.clone(),\n state.request_id.clone(),\n payment_id.get_string_repr().to_string(),\n profile_id.to_owned(),\n merchant_id.to_owned(),\n \"DecisionEngine: SuccessRate update_gateway_score\".to_string(),\n Some(open_router_req_body.clone()),\n true,\n false,\n );\n\n let response: RoutingResult<utils::RoutingEventsResponse<or_types::UpdateScoreResponse>> =\n utils::SRApiClient::send_decision_engine_request(\n state,\n services::Method::Post,\n \"update-gateway-score\",\n Some(open_router_req_body),\n None,\n Some(routing_events_wrapper),\n )\n .await;\n\n match response {\n Ok(resp) => {\n let update_score_resp = resp.response.ok_or(errors::RoutingError::OpenRouterError(\n \"Failed to parse the response from open_router\".into(),\n ))?;\n\n let mut routing_event = resp.event.ok_or(errors::RoutingError::RoutingEventsError {\n message: \"Decision-Engine: RoutingEvent not found in RoutingEventsResponse\"\n .to_string(),\n status_code: 500,\n })?;\n\n logger::debug!(\n \"open_router update_gateway_score response for gateway with id {}: {:?}\",\n payment_connector,\n update_score_resp.message\n );\n\n routing_event.set_response_body(&update_score_resp);\n routing_event.set_payment_connector(payment_connector.clone()); // check this in review\n state.event_handler().log_event(&routing_event);\n\n Ok(())\n }\n Err(err) => {\n logger::error!(\"open_router_update_gateway_score_error: {:?}\", err);\n\n Err(errors::RoutingError::OpenRouterError(\n \"Failed to update gateway score in open_router\".into(),\n ))\n }\n }?;\n\n Ok(())\n}",
|
| 95 |
+
"diff_span": null,
|
| 96 |
+
"commit_sha": "8ef79f3dfe5969e37899f07d5814ca02a116db97"
|
| 97 |
+
},
|
| 98 |
+
{
|
| 99 |
+
"id": "crates/router/src/core/payments/routing.rs::function::perform_session_routing_for_pm_type",
|
| 100 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 101 |
+
"kind": "function_item",
|
| 102 |
+
"status": "added",
|
| 103 |
+
"before_code": null,
|
| 104 |
+
"after_code": "async fn perform_session_routing_for_pm_type<'a>(\n state: &'a SessionState,\n key_store: &'a domain::MerchantKeyStore,\n session_pm_input: &SessionRoutingPmTypeInput<'_>,\n transaction_type: &api_enums::TransactionType,\n business_profile: &domain::Profile,\n) -> RoutingResult<Option<Vec<api_models::routing::RoutableConnectorChoice>>> {\n let profile_wrapper = admin::ProfileWrapper::new(business_profile.clone());\n let chosen_connectors = get_chosen_connectors(\n state,\n key_store,\n session_pm_input,\n transaction_type,\n &profile_wrapper,\n )\n .await?;\n\n let mut final_selection = perform_cgraph_filtering(\n state,\n key_store,\n chosen_connectors,\n session_pm_input.backend_input.clone(),\n None,\n session_pm_input.profile_id,\n transaction_type,\n )\n .await?;\n\n if final_selection.is_empty() {\n let fallback = profile_wrapper\n .get_default_fallback_list_of_connector_under_profile()\n .change_context(errors::RoutingError::FallbackConfigFetchFailed)?;\n\n final_selection = perform_cgraph_filtering(\n state,\n key_store,\n fallback,\n session_pm_input.backend_input.clone(),\n None,\n session_pm_input.profile_id,\n transaction_type,\n )\n .await?;\n }\n\n if final_selection.is_empty() {\n Ok(None)\n } else {\n Ok(Some(final_selection))\n }\n}",
|
| 105 |
+
"diff_span": null,
|
| 106 |
+
"commit_sha": "8ef79f3dfe5969e37899f07d5814ca02a116db97"
|
| 107 |
+
},
|
| 108 |
+
{
|
| 109 |
+
"id": "crates/router/src/core/payments/routing.rs::function::perform_fallback_routing",
|
| 110 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 111 |
+
"kind": "function_item",
|
| 112 |
+
"status": "added",
|
| 113 |
+
"before_code": null,
|
| 114 |
+
"after_code": "pub async fn perform_fallback_routing(\n state: &SessionState,\n key_store: &domain::MerchantKeyStore,\n transaction_data: &routing::TransactionData<'_>,\n eligible_connectors: Option<&Vec<api_enums::RoutableConnectors>>,\n business_profile: &domain::Profile,\n) -> RoutingResult<Vec<routing_types::RoutableConnectorChoice>> {\n #[cfg(feature = \"v1\")]\n let fallback_config = routing::helpers::get_merchant_default_config(\n &*state.store,\n match transaction_data {\n routing::TransactionData::Payment(payment_data) => payment_data\n .payment_intent\n .profile_id\n .as_ref()\n .get_required_value(\"profile_id\")\n .change_context(errors::RoutingError::ProfileIdMissing)?\n .get_string_repr(),\n #[cfg(feature = \"payouts\")]\n routing::TransactionData::Payout(payout_data) => {\n payout_data.payout_attempt.profile_id.get_string_repr()\n }\n },\n &api_enums::TransactionType::from(transaction_data),\n )\n .await\n .change_context(errors::RoutingError::FallbackConfigFetchFailed)?;\n #[cfg(feature = \"v2\")]\n let fallback_config = admin::ProfileWrapper::new(business_profile.clone())\n .get_default_fallback_list_of_connector_under_profile()\n .change_context(errors::RoutingError::FallbackConfigFetchFailed)?;\n let backend_input = match transaction_data {\n routing::TransactionData::Payment(payment_data) => make_dsl_input(payment_data)?,\n #[cfg(feature = \"payouts\")]\n routing::TransactionData::Payout(payout_data) => make_dsl_input_for_payouts(payout_data)?,\n };\n\n perform_cgraph_filtering(\n state,\n key_store,\n fallback_config,\n backend_input,\n eligible_connectors,\n business_profile.get_id(),\n &api_enums::TransactionType::from(transaction_data),\n )\n .await\n}",
|
| 115 |
+
"diff_span": null,
|
| 116 |
+
"commit_sha": "8ef79f3dfe5969e37899f07d5814ca02a116db97"
|
| 117 |
+
},
|
| 118 |
+
{
|
| 119 |
+
"id": "crates/router/src/core/payments/routing.rs::function::perform_success_based_routing",
|
| 120 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 121 |
+
"kind": "function_item",
|
| 122 |
+
"status": "added",
|
| 123 |
+
"before_code": null,
|
| 124 |
+
"after_code": "pub async fn perform_success_based_routing<F, D>(\n state: &SessionState,\n routable_connectors: Vec<api_routing::RoutableConnectorChoice>,\n profile_id: &common_utils::id_type::ProfileId,\n merchant_id: &common_utils::id_type::MerchantId,\n payment_id: &common_utils::id_type::PaymentId,\n success_based_routing_config_params_interpolator: routing::helpers::DynamicRoutingConfigParamsInterpolator,\n success_based_algo_ref: api_routing::SuccessBasedAlgorithm,\n payment_data: &mut D,\n) -> RoutingResult<Vec<api_routing::RoutableConnectorChoice>>\nwhere\n F: Send + Clone,\n D: OperationSessionGetters<F> + OperationSessionSetters<F> + Send + Sync + Clone,\n{\n if success_based_algo_ref.enabled_feature\n == api_routing::DynamicRoutingFeatures::DynamicConnectorSelection\n {\n logger::debug!(\n \"performing success_based_routing for profile {}\",\n profile_id.get_string_repr()\n );\n let client = &state\n .grpc_client\n .dynamic_routing\n .as_ref()\n .ok_or(errors::RoutingError::SuccessRateClientInitializationError)\n .attach_printable(\"dynamic routing gRPC client not found\")?\n .success_rate_client;\n\n let success_based_routing_configs = routing::helpers::fetch_dynamic_routing_configs::<\n api_routing::SuccessBasedRoutingConfig,\n >(\n state,\n profile_id,\n success_based_algo_ref\n .algorithm_id_with_timestamp\n .algorithm_id\n .ok_or(errors::RoutingError::GenericNotFoundError {\n field: \"success_based_routing_algorithm_id\".to_string(),\n })\n .attach_printable(\"success_based_routing_algorithm_id not found in profile_id\")?,\n )\n .await\n .change_context(errors::RoutingError::SuccessBasedRoutingConfigError)\n .attach_printable(\"unable to fetch success_rate based dynamic routing configs\")?;\n\n let success_based_routing_config_params = success_based_routing_config_params_interpolator\n .get_string_val(\n success_based_routing_configs\n .params\n .as_ref()\n .ok_or(errors::RoutingError::SuccessBasedRoutingParamsNotFoundError)?,\n );\n\n let event_request = utils::CalSuccessRateEventRequest {\n id: profile_id.get_string_repr().to_string(),\n params: success_based_routing_config_params.clone(),\n labels: routable_connectors\n .iter()\n .map(|conn_choice| conn_choice.to_string())\n .collect::<Vec<_>>(),\n config: success_based_routing_configs\n .config\n .as_ref()\n .map(utils::CalSuccessRateConfigEventRequest::from),\n };\n\n let routing_events_wrapper = utils::RoutingEventsWrapper::new(\n state.tenant.tenant_id.clone(),\n state.request_id.clone(),\n payment_id.get_string_repr().to_string(),\n profile_id.to_owned(),\n merchant_id.to_owned(),\n \"IntelligentRouter: CalculateSuccessRate\".to_string(),\n Some(event_request.clone()),\n true,\n false,\n );\n\n let closure = || async {\n let success_based_connectors_result = client\n .calculate_success_rate(\n profile_id.get_string_repr().into(),\n success_based_routing_configs,\n success_based_routing_config_params,\n routable_connectors,\n state.get_grpc_headers(),\n )\n .await\n .change_context(errors::RoutingError::SuccessRateCalculationError)\n .attach_printable(\n \"unable to calculate/fetch success rate from dynamic routing service\",\n );\n\n match success_based_connectors_result {\n Ok(success_response) => {\n let updated_resp = utils::CalSuccessRateEventResponse::try_from(\n &success_response,\n )\n .change_context(errors::RoutingError::RoutingEventsError { message: \"unable to convert SuccessBasedConnectors to CalSuccessRateEventResponse\".to_string(), status_code: 500 })\n .attach_printable(\n \"unable to convert SuccessBasedConnectors to CalSuccessRateEventResponse\",\n )?;\n\n Ok(Some(updated_resp))\n }\n Err(e) => {\n logger::error!(\n \"unable to calculate/fetch success rate from dynamic routing service: {:?}\",\n e.current_context()\n );\n\n Err(error_stack::report!(\n errors::RoutingError::SuccessRateCalculationError\n ))\n }\n }\n };\n\n let events_response = routing_events_wrapper\n .construct_event_builder(\n \"SuccessRateCalculator.FetchSuccessRate\".to_string(),\n RoutingEngine::IntelligentRouter,\n ApiMethod::Grpc,\n )?\n .trigger_event(state, closure)\n .await?;\n\n let success_based_connectors: utils::CalSuccessRateEventResponse = events_response\n .response\n .ok_or(errors::RoutingError::SuccessRateCalculationError)?;\n\n // Need to log error case\n let mut routing_event =\n events_response\n .event\n .ok_or(errors::RoutingError::RoutingEventsError {\n message:\n \"SR-Intelligent-Router: RoutingEvent not found in RoutingEventsResponse\"\n .to_string(),\n status_code: 500,\n })?;\n\n routing_event.set_routing_approach(success_based_connectors.routing_approach.to_string());\n payment_data.set_routing_approach_in_attempt(Some(common_enums::RoutingApproach::from(\n success_based_connectors.routing_approach,\n )));\n\n let mut connectors = Vec::with_capacity(success_based_connectors.labels_with_score.len());\n for label_with_score in success_based_connectors.labels_with_score {\n let (connector, merchant_connector_id) = label_with_score.label\n .split_once(':')\n .ok_or(errors::RoutingError::InvalidSuccessBasedConnectorLabel(label_with_score.label.to_string()))\n .attach_printable(\n \"unable to split connector_name and mca_id from the label obtained by the dynamic routing service\",\n )?;\n connectors.push(api_routing::RoutableConnectorChoice {\n choice_kind: api_routing::RoutableChoiceKind::FullStruct,\n connector: common_enums::RoutableConnectors::from_str(connector)\n .change_context(errors::RoutingError::GenericConversionError {\n from: \"String\".to_string(),\n to: \"RoutableConnectors\".to_string(),\n })\n .attach_printable(\"unable to convert String to RoutableConnectors\")?,\n merchant_connector_id: Some(\n common_utils::id_type::MerchantConnectorAccountId::wrap(\n merchant_connector_id.to_string(),\n )\n .change_context(errors::RoutingError::GenericConversionError {\n from: \"String\".to_string(),\n to: \"MerchantConnectorAccountId\".to_string(),\n })\n .attach_printable(\"unable to convert MerchantConnectorAccountId from string\")?,\n ),\n });\n }\n logger::debug!(success_based_routing_connectors=?connectors);\n\n routing_event.set_status_code(200);\n routing_event.set_routable_connectors(connectors.clone());\n state.event_handler().log_event(&routing_event);\n Ok(connectors)\n } else {\n Ok(routable_connectors)\n }\n}",
|
| 125 |
+
"diff_span": null,
|
| 126 |
+
"commit_sha": "8ef79f3dfe5969e37899f07d5814ca02a116db97"
|
| 127 |
+
},
|
| 128 |
+
{
|
| 129 |
+
"id": "crates/router/src/core/payments/routing.rs::function::perform_contract_based_routing",
|
| 130 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 131 |
+
"kind": "function_item",
|
| 132 |
+
"status": "added",
|
| 133 |
+
"before_code": null,
|
| 134 |
+
"after_code": "pub async fn perform_contract_based_routing<F, D>(\n state: &SessionState,\n routable_connectors: Vec<api_routing::RoutableConnectorChoice>,\n profile_id: &common_utils::id_type::ProfileId,\n merchant_id: &common_utils::id_type::MerchantId,\n payment_id: &common_utils::id_type::PaymentId,\n _dynamic_routing_config_params_interpolator: routing::helpers::DynamicRoutingConfigParamsInterpolator,\n contract_based_algo_ref: api_routing::ContractRoutingAlgorithm,\n payment_data: &mut D,\n) -> RoutingResult<Vec<api_routing::RoutableConnectorChoice>>\nwhere\n F: Send + Clone,\n D: OperationSessionGetters<F> + OperationSessionSetters<F> + Send + Sync + Clone,\n{\n if contract_based_algo_ref.enabled_feature\n == api_routing::DynamicRoutingFeatures::DynamicConnectorSelection\n {\n logger::debug!(\n \"performing contract_based_routing for profile {}\",\n profile_id.get_string_repr()\n );\n let client = &state\n .grpc_client\n .dynamic_routing\n .as_ref()\n .ok_or(errors::RoutingError::ContractRoutingClientInitializationError)\n .attach_printable(\"dynamic routing gRPC client not found\")?\n .contract_based_client;\n\n let contract_based_routing_configs = routing::helpers::fetch_dynamic_routing_configs::<\n api_routing::ContractBasedRoutingConfig,\n >(\n state,\n profile_id,\n contract_based_algo_ref\n .algorithm_id_with_timestamp\n .algorithm_id\n .ok_or(errors::RoutingError::GenericNotFoundError {\n field: \"contract_based_routing_algorithm_id\".to_string(),\n })\n .attach_printable(\"contract_based_routing_algorithm_id not found in profile_id\")?,\n )\n .await\n .change_context(errors::RoutingError::ContractBasedRoutingConfigError)\n .attach_printable(\"unable to fetch contract based dynamic routing configs\")?;\n\n let label_info = contract_based_routing_configs\n .label_info\n .clone()\n .ok_or(errors::RoutingError::ContractBasedRoutingConfigError)\n .attach_printable(\"Label information not found in contract routing configs\")?;\n\n let contract_based_connectors = routable_connectors\n .clone()\n .into_iter()\n .filter(|conn| {\n label_info\n .iter()\n .any(|info| Some(info.mca_id.clone()) == conn.merchant_connector_id.clone())\n })\n .collect::<Vec<_>>();\n\n let mut other_connectors = routable_connectors\n .into_iter()\n .filter(|conn| {\n label_info\n .iter()\n .all(|info| Some(info.mca_id.clone()) != conn.merchant_connector_id.clone())\n })\n .collect::<Vec<_>>();\n\n let event_request = utils::CalContractScoreEventRequest {\n id: profile_id.get_string_repr().to_string(),\n params: \"\".to_string(),\n labels: contract_based_connectors\n .iter()\n .map(|conn_choice| conn_choice.to_string())\n .collect::<Vec<_>>(),\n config: Some(contract_based_routing_configs.clone()),\n };\n\n let routing_events_wrapper = utils::RoutingEventsWrapper::new(\n state.tenant.tenant_id.clone(),\n state.request_id.clone(),\n payment_id.get_string_repr().to_string(),\n profile_id.to_owned(),\n merchant_id.to_owned(),\n \"IntelligentRouter: PerformContractRouting\".to_string(),\n Some(event_request.clone()),\n true,\n false,\n );\n\n let closure = || async {\n let contract_based_connectors_result = client\n .calculate_contract_score(\n profile_id.get_string_repr().into(),\n contract_based_routing_configs.clone(),\n \"\".to_string(),\n contract_based_connectors,\n state.get_grpc_headers(),\n )\n .await\n .attach_printable(\n \"unable to calculate/fetch contract score from dynamic routing service\",\n );\n\n let contract_based_connectors = match contract_based_connectors_result {\n Ok(resp) => Some(utils::CalContractScoreEventResponse::from(&resp)),\n Err(err) => match err.current_context() {\n DynamicRoutingError::ContractNotFound => {\n client\n .update_contracts(\n profile_id.get_string_repr().into(),\n label_info,\n \"\".to_string(),\n vec![],\n u64::default(),\n state.get_grpc_headers(),\n )\n .await\n .change_context(errors::RoutingError::ContractScoreUpdationError)\n .attach_printable(\n \"unable to update contract based routing window in dynamic routing service\",\n )?;\n return Err((errors::RoutingError::ContractScoreCalculationError {\n err: err.to_string(),\n })\n .into());\n }\n _ => {\n return Err((errors::RoutingError::ContractScoreCalculationError {\n err: err.to_string(),\n })\n .into())\n }\n },\n };\n\n Ok(contract_based_connectors)\n };\n\n let events_response = routing_events_wrapper\n .construct_event_builder(\n \"ContractScoreCalculator.FetchContractScore\".to_string(),\n RoutingEngine::IntelligentRouter,\n ApiMethod::Grpc,\n )?\n .trigger_event(state, closure)\n .await?;\n\n let contract_based_connectors: utils::CalContractScoreEventResponse = events_response\n .response\n .ok_or(errors::RoutingError::ContractScoreCalculationError {\n err: \"CalContractScoreEventResponse not found\".to_string(),\n })?;\n\n let mut routing_event = events_response\n .event\n .ok_or(errors::RoutingError::RoutingEventsError {\n message:\n \"ContractRouting-Intelligent-Router: RoutingEvent not found in RoutingEventsResponse\"\n .to_string(),\n status_code: 500,\n })?;\n\n payment_data.set_routing_approach_in_attempt(Some(\n common_enums::RoutingApproach::ContractBasedRouting,\n ));\n\n let mut connectors = Vec::with_capacity(contract_based_connectors.labels_with_score.len());\n\n for label_with_score in contract_based_connectors.labels_with_score {\n let (connector, merchant_connector_id) = label_with_score.label\n .split_once(':')\n .ok_or(errors::RoutingError::InvalidContractBasedConnectorLabel(label_with_score.label.to_string()))\n .attach_printable(\n \"unable to split connector_name and mca_id from the label obtained by the dynamic routing service\",\n )?;\n\n connectors.push(api_routing::RoutableConnectorChoice {\n choice_kind: api_routing::RoutableChoiceKind::FullStruct,\n connector: common_enums::RoutableConnectors::from_str(connector)\n .change_context(errors::RoutingError::GenericConversionError {\n from: \"String\".to_string(),\n to: \"RoutableConnectors\".to_string(),\n })\n .attach_printable(\"unable to convert String to RoutableConnectors\")?,\n merchant_connector_id: Some(\n common_utils::id_type::MerchantConnectorAccountId::wrap(\n merchant_connector_id.to_string(),\n )\n .change_context(errors::RoutingError::GenericConversionError {\n from: \"String\".to_string(),\n to: \"MerchantConnectorAccountId\".to_string(),\n })\n .attach_printable(\"unable to convert MerchantConnectorAccountId from string\")?,\n ),\n });\n }\n\n connectors.append(&mut other_connectors);\n\n logger::debug!(contract_based_routing_connectors=?connectors);\n\n routing_event.set_status_code(200);\n routing_event.set_routable_connectors(connectors.clone());\n routing_event.set_routing_approach(api_routing::RoutingApproach::ContractBased.to_string());\n state.event_handler().log_event(&routing_event);\n Ok(connectors)\n } else {\n Ok(routable_connectors)\n }\n}",
|
| 135 |
+
"diff_span": null,
|
| 136 |
+
"commit_sha": "8ef79f3dfe5969e37899f07d5814ca02a116db97"
|
| 137 |
+
},
|
| 138 |
+
{
|
| 139 |
+
"id": "crates/router/src/core/payments/routing.rs::function::perform_open_routing_for_debit_routing",
|
| 140 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 141 |
+
"kind": "function_item",
|
| 142 |
+
"status": "added",
|
| 143 |
+
"before_code": null,
|
| 144 |
+
"after_code": "pub async fn perform_open_routing_for_debit_routing<F, D>(\n state: &SessionState,\n co_badged_card_request: or_types::CoBadgedCardRequest,\n card_isin: Option<Secret<String>>,\n old_payment_data: &mut D,\n) -> RoutingResult<or_types::DebitRoutingOutput>\nwhere\n F: Send + Clone,\n D: OperationSessionGetters<F> + OperationSessionSetters<F> + Send + Sync + Clone,\n{\n let payment_attempt = old_payment_data.get_payment_attempt().clone();\n\n logger::debug!(\n \"performing debit routing with open_router for profile {}\",\n payment_attempt.profile_id.get_string_repr()\n );\n\n let metadata = Some(\n serde_json::to_string(&co_badged_card_request)\n .change_context(errors::ApiErrorResponse::InternalServerError)\n .attach_printable(\"Failed to encode Vaulting data to string\")\n .change_context(errors::RoutingError::MetadataParsingError)?,\n );\n\n let open_router_req_body = OpenRouterDecideGatewayRequest::construct_debit_request(\n &payment_attempt,\n metadata,\n card_isin,\n Some(or_types::RankingAlgorithm::NtwBasedRouting),\n );\n\n let routing_events_wrapper = utils::RoutingEventsWrapper::new(\n state.tenant.tenant_id.clone(),\n state.request_id.clone(),\n payment_attempt.payment_id.get_string_repr().to_string(),\n payment_attempt.profile_id.to_owned(),\n payment_attempt.merchant_id.to_owned(),\n \"DecisionEngine: Debit Routing\".to_string(),\n Some(open_router_req_body.clone()),\n true,\n true,\n );\n\n let response: RoutingResult<utils::RoutingEventsResponse<DecidedGateway>> =\n utils::EuclidApiClient::send_decision_engine_request(\n state,\n services::Method::Post,\n \"decide-gateway\",\n Some(open_router_req_body),\n None,\n Some(routing_events_wrapper),\n )\n .await;\n\n let output = match response {\n Ok(events_response) => {\n let response =\n events_response\n .response\n .ok_or(errors::RoutingError::OpenRouterError(\n \"Response from decision engine API is empty\".to_string(),\n ))?;\n\n let debit_routing_output = response\n .debit_routing_output\n .get_required_value(\"debit_routing_output\")\n .change_context(errors::RoutingError::OpenRouterError(\n \"Failed to parse the response from open_router\".into(),\n ))\n .attach_printable(\"debit_routing_output is missing in the open routing response\")?;\n\n old_payment_data.set_routing_approach_in_attempt(Some(\n common_enums::RoutingApproach::from_decision_engine_approach(\n &response.routing_approach,\n ),\n ));\n\n Ok(debit_routing_output)\n }\n Err(error_response) => {\n logger::error!(\"open_router_error_response: {:?}\", error_response);\n Err(errors::RoutingError::OpenRouterError(\n \"Failed to perform debit routing in open router\".into(),\n ))\n }\n }?;\n\n Ok(output)\n}",
|
| 145 |
+
"diff_span": null,
|
| 146 |
+
"commit_sha": "8ef79f3dfe5969e37899f07d5814ca02a116db97"
|
| 147 |
+
},
|
| 148 |
+
{
|
| 149 |
+
"id": "crates/router/src/core/payments/routing.rs::function::get_chosen_connectors",
|
| 150 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 151 |
+
"kind": "function_item",
|
| 152 |
+
"status": "added",
|
| 153 |
+
"before_code": null,
|
| 154 |
+
"after_code": "async fn get_chosen_connectors<'a>(\n state: &'a SessionState,\n key_store: &'a domain::MerchantKeyStore,\n session_pm_input: &SessionRoutingPmTypeInput<'_>,\n transaction_type: &api_enums::TransactionType,\n profile_wrapper: &admin::ProfileWrapper,\n) -> RoutingResult<Vec<api_models::routing::RoutableConnectorChoice>> {\n let merchant_id = &key_store.merchant_id;\n\n let MerchantAccountRoutingAlgorithm::V1(algorithm_id) = session_pm_input.routing_algorithm;\n\n let chosen_connectors = if let Some(ref algorithm_id) = algorithm_id {\n let cached_algorithm = ensure_algorithm_cached_v1(\n state,\n merchant_id,\n algorithm_id,\n session_pm_input.profile_id,\n transaction_type,\n )\n .await?;\n\n match cached_algorithm.as_ref() {\n CachedAlgorithm::Single(conn) => vec![(**conn).clone()],\n CachedAlgorithm::Priority(plist) => plist.clone(),\n CachedAlgorithm::VolumeSplit(splits) => perform_volume_split(splits.to_vec())\n .change_context(errors::RoutingError::ConnectorSelectionFailed)?,\n CachedAlgorithm::Advanced(interpreter) => execute_dsl_and_get_connector_v1(\n session_pm_input.backend_input.clone(),\n interpreter,\n )?,\n }\n } else {\n profile_wrapper\n .get_default_fallback_list_of_connector_under_profile()\n .change_context(errors::RoutingError::FallbackConfigFetchFailed)?\n };\n Ok(chosen_connectors)\n}",
|
| 155 |
+
"diff_span": null,
|
| 156 |
+
"commit_sha": "8ef79f3dfe5969e37899f07d5814ca02a116db97"
|
| 157 |
+
},
|
| 158 |
+
{
|
| 159 |
+
"id": "crates/router/src/core/payments/routing.rs::function::perform_elimination_routing",
|
| 160 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 161 |
+
"kind": "function_item",
|
| 162 |
+
"status": "added",
|
| 163 |
+
"before_code": null,
|
| 164 |
+
"after_code": "pub async fn perform_elimination_routing(\n state: &SessionState,\n routable_connectors: Vec<api_routing::RoutableConnectorChoice>,\n profile_id: &common_utils::id_type::ProfileId,\n merchant_id: &common_utils::id_type::MerchantId,\n payment_id: &common_utils::id_type::PaymentId,\n elimination_routing_configs_params_interpolator: routing::helpers::DynamicRoutingConfigParamsInterpolator,\n elimination_algo_ref: api_routing::EliminationRoutingAlgorithm,\n) -> RoutingResult<Vec<api_routing::RoutableConnectorChoice>> {\n if elimination_algo_ref.enabled_feature\n == api_routing::DynamicRoutingFeatures::DynamicConnectorSelection\n {\n logger::debug!(\n \"performing elimination_routing for profile {}\",\n profile_id.get_string_repr()\n );\n let client = &state\n .grpc_client\n .dynamic_routing\n .as_ref()\n .ok_or(errors::RoutingError::EliminationClientInitializationError)\n .attach_printable(\"dynamic routing gRPC client not found\")?\n .elimination_based_client;\n\n let elimination_routing_config = routing::helpers::fetch_dynamic_routing_configs::<\n api_routing::EliminationRoutingConfig,\n >(\n state,\n profile_id,\n elimination_algo_ref\n .algorithm_id_with_timestamp\n .algorithm_id\n .ok_or(errors::RoutingError::GenericNotFoundError {\n field: \"elimination_routing_algorithm_id\".to_string(),\n })\n .attach_printable(\n \"elimination_routing_algorithm_id not found in business_profile\",\n )?,\n )\n .await\n .change_context(errors::RoutingError::EliminationRoutingConfigError)\n .attach_printable(\"unable to fetch elimination dynamic routing configs\")?;\n\n let elimination_routing_config_params = elimination_routing_configs_params_interpolator\n .get_string_val(\n elimination_routing_config\n .params\n .as_ref()\n .ok_or(errors::RoutingError::EliminationBasedRoutingParamsNotFoundError)?,\n );\n\n let event_request = utils::EliminationRoutingEventRequest {\n id: profile_id.get_string_repr().to_string(),\n params: elimination_routing_config_params.clone(),\n labels: routable_connectors\n .iter()\n .map(|conn_choice| conn_choice.to_string())\n .collect::<Vec<_>>(),\n config: elimination_routing_config\n .elimination_analyser_config\n .as_ref()\n .map(utils::EliminationRoutingEventBucketConfig::from),\n };\n\n let routing_events_wrapper = utils::RoutingEventsWrapper::new(\n state.tenant.tenant_id.clone(),\n state.request_id.clone(),\n payment_id.get_string_repr().to_string(),\n profile_id.to_owned(),\n merchant_id.to_owned(),\n \"IntelligentRouter: PerformEliminationRouting\".to_string(),\n Some(event_request.clone()),\n true,\n false,\n );\n\n let closure = || async {\n let elimination_based_connectors_result = client\n .perform_elimination_routing(\n profile_id.get_string_repr().to_string(),\n elimination_routing_config_params,\n routable_connectors.clone(),\n elimination_routing_config.elimination_analyser_config,\n state.get_grpc_headers(),\n )\n .await\n .change_context(errors::RoutingError::EliminationRoutingCalculationError)\n .attach_printable(\n \"unable to analyze/fetch elimination routing from dynamic routing service\",\n );\n\n match elimination_based_connectors_result {\n Ok(elimination_response) => Ok(Some(utils::EliminationEventResponse::from(\n &elimination_response,\n ))),\n Err(e) => {\n logger::error!(\n \"unable to analyze/fetch elimination routing from dynamic routing service: {:?}\",\n e.current_context()\n );\n\n Err(error_stack::report!(\n errors::RoutingError::EliminationRoutingCalculationError\n ))\n }\n }\n };\n\n let events_response = routing_events_wrapper\n .construct_event_builder(\n \"EliminationAnalyser.GetEliminationStatus\".to_string(),\n RoutingEngine::IntelligentRouter,\n ApiMethod::Grpc,\n )?\n .trigger_event(state, closure)\n .await?;\n\n let elimination_based_connectors: utils::EliminationEventResponse = events_response\n .response\n .ok_or(errors::RoutingError::EliminationRoutingCalculationError)?;\n\n let mut routing_event = events_response\n .event\n .ok_or(errors::RoutingError::RoutingEventsError {\n message:\n \"Elimination-Intelligent-Router: RoutingEvent not found in RoutingEventsResponse\"\n .to_string(),\n status_code: 500,\n })?;\n\n routing_event.set_routing_approach(utils::RoutingApproach::Elimination.to_string());\n\n let mut connectors =\n Vec::with_capacity(elimination_based_connectors.labels_with_status.len());\n let mut eliminated_connectors =\n Vec::with_capacity(elimination_based_connectors.labels_with_status.len());\n let mut non_eliminated_connectors =\n Vec::with_capacity(elimination_based_connectors.labels_with_status.len());\n for labels_with_status in elimination_based_connectors.labels_with_status {\n let (connector, merchant_connector_id) = labels_with_status.label\n .split_once(':')\n .ok_or(errors::RoutingError::InvalidEliminationBasedConnectorLabel(labels_with_status.label.to_string()))\n .attach_printable(\n \"unable to split connector_name and mca_id from the label obtained by the elimination based dynamic routing service\",\n )?;\n\n let routable_connector = api_routing::RoutableConnectorChoice {\n choice_kind: api_routing::RoutableChoiceKind::FullStruct,\n connector: common_enums::RoutableConnectors::from_str(connector)\n .change_context(errors::RoutingError::GenericConversionError {\n from: \"String\".to_string(),\n to: \"RoutableConnectors\".to_string(),\n })\n .attach_printable(\"unable to convert String to RoutableConnectors\")?,\n merchant_connector_id: Some(\n common_utils::id_type::MerchantConnectorAccountId::wrap(\n merchant_connector_id.to_string(),\n )\n .change_context(errors::RoutingError::GenericConversionError {\n from: \"String\".to_string(),\n to: \"MerchantConnectorAccountId\".to_string(),\n })\n .attach_printable(\"unable to convert MerchantConnectorAccountId from string\")?,\n ),\n };\n\n if labels_with_status\n .elimination_information\n .is_some_and(|elimination_info| {\n elimination_info\n .entity\n .is_some_and(|entity_info| entity_info.is_eliminated)\n })\n {\n eliminated_connectors.push(routable_connector);\n } else {\n non_eliminated_connectors.push(routable_connector);\n }\n connectors.extend(non_eliminated_connectors.clone());\n connectors.extend(eliminated_connectors.clone());\n }\n logger::debug!(dynamic_eliminated_connectors=?eliminated_connectors);\n logger::debug!(dynamic_elimination_based_routing_connectors=?connectors);\n\n routing_event.set_status_code(200);\n routing_event.set_routable_connectors(connectors.clone());\n state.event_handler().log_event(&routing_event);\n Ok(connectors)\n } else {\n Ok(routable_connectors)\n }\n}",
|
| 165 |
+
"diff_span": null,
|
| 166 |
+
"commit_sha": "8ef79f3dfe5969e37899f07d5814ca02a116db97"
|
| 167 |
+
}
|
| 168 |
+
]
|
| 169 |
+
}
|
diffs/pr_10282/b83667d/diff.json
ADDED
|
@@ -0,0 +1,24 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "b83667dc0d2d3b9a325febf6016270491c9e9267",
|
| 3 |
+
"pr_number": 10282,
|
| 4 |
+
"rust_files": [
|
| 5 |
+
"crates/router/src/core/payments/routing.rs"
|
| 6 |
+
],
|
| 7 |
+
"diffs": [
|
| 8 |
+
{
|
| 9 |
+
"id": "crates/router/src/core/payments/routing.rs::function::perform_cgraph_filtering",
|
| 10 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 11 |
+
"kind": "function_item",
|
| 12 |
+
"status": "modified",
|
| 13 |
+
"code_changed": true,
|
| 14 |
+
"imports_changed": false,
|
| 15 |
+
"before_code": "pub async fn perform_cgraph_filtering(\n state: &SessionState,\n key_store: &domain::MerchantKeyStore,\n chosen: Vec<routing_types::RoutableConnectorChoice>,\n backend_input: dsl_inputs::BackendInput,\n eligible_connectors: Option<&Vec<api_enums::RoutableConnectors>>,\n profile_id: &common_utils::id_type::ProfileId,\n transaction_type: &api_enums::TransactionType,\n) -> RoutingResult<Vec<routing_types::RoutableConnectorChoice>> {\n let context = euclid_graph::AnalysisContext::from_dir_values(\n backend_input\n .into_context()\n .change_context(errors::RoutingError::KgraphAnalysisError)?,\n );\n let cached_cgraph = get_merchant_cgraph(state, key_store, profile_id, transaction_type).await?;\n\n let mut final_selection = Vec::<routing_types::RoutableConnectorChoice>::new();\n for choice in chosen {\n let routable_connector = choice.connector;\n let euclid_choice: ast::ConnectorChoice = choice.clone().foreign_into();\n let dir_val = euclid_choice\n .into_dir_value()\n .change_context(errors::RoutingError::KgraphAnalysisError)?;\n let cgraph_eligible = cached_cgraph\n .check_value_validity(\n dir_val,\n &context,\n &mut hyperswitch_constraint_graph::Memoization::new(),\n &mut hyperswitch_constraint_graph::CycleCheck::new(),\n None,\n )\n .change_context(errors::RoutingError::KgraphAnalysisError)?;\n\n let filter_eligible =\n eligible_connectors.is_none_or(|list| list.contains(&routable_connector));\n\n if cgraph_eligible && filter_eligible {\n final_selection.push(choice);\n }\n }\n\n Ok(final_selection)\n}",
|
| 16 |
+
"after_code": "pub async fn perform_cgraph_filtering(\n state: &SessionState,\n key_store: &domain::MerchantKeyStore,\n chosen: Vec<routing_types::RoutableConnectorChoice>,\n backend_input: dsl_inputs::BackendInput,\n eligible_connectors: Option<&Vec<api_enums::RoutableConnectors>>,\n profile_id: &common_utils::id_type::ProfileId,\n transaction_type: &api_enums::TransactionType,\n) -> RoutingResult<Vec<routing_types::RoutableConnectorChoice>> {\n let context = euclid_graph::AnalysisContext::from_dir_values(\n backend_input\n .into_context()\n .change_context(errors::RoutingError::KgraphAnalysisError)?,\n );\n let cached_cgraph = get_merchant_cgraph(state, key_store, profile_id, transaction_type).await?;\n\n let mut final_selection = Vec::<routing_types::RoutableConnectorChoice>::new();\n for choice in chosen {\n let routable_connector = choice.connector;\n let euclid_choice: ast::ConnectorChoice = choice.clone().foreign_into();\n let dir_val = euclid_choice\n .into_dir_value()\n .change_context(errors::RoutingError::KgraphAnalysisError)?;\n let cgraph_eligible = cached_cgraph\n .check_value_validity(\n dir_val,\n &context,\n &mut hyperswitch_constraint_graph::Memoization::new(),\n &mut hyperswitch_constraint_graph::CycleCheck::new(),\n None,\n )\n .change_context(errors::RoutingError::KgraphAnalysisError)?;\n\n let filter_eligible =\n eligible_connectors.is_none_or(|list| list.contains(&routable_connector));\n\n let db_mcas = state\n .store\n .find_merchant_connector_account_by_merchant_id_and_disabled_list(\n &state.into(),\n &key_store.merchant_id,\n false,\n key_store,\n )\n .await\n .unwrap_or_else(|_| std::iter::empty().collect());\n\n let mca_active = choice\n .merchant_connector_id\n .as_ref()\n .map(|id| db_mcas.iter().any(|mca| &mca.get_id() == id))\n .unwrap_or(true);\n\n if cgraph_eligible && filter_eligible && mca_active {\n final_selection.push(choice);\n }\n }\n\n Ok(final_selection)\n}",
|
| 17 |
+
"diff_span": {
|
| 18 |
+
"before": " eligible_connectors.is_none_or(|list| list.contains(&routable_connector));\n\n if cgraph_eligible && filter_eligible {\n final_selection.push(choice);\n }",
|
| 19 |
+
"after": " eligible_connectors.is_none_or(|list| list.contains(&routable_connector));\n\n let db_mcas = state\n .store\n .find_merchant_connector_account_by_merchant_id_and_disabled_list(\n &state.into(),\n &key_store.merchant_id,\n false,\n key_store,\n )\n .await\n .unwrap_or_else(|_| std::iter::empty().collect());\n\n let mca_active = choice\n .merchant_connector_id\n .as_ref()\n .map(|id| db_mcas.iter().any(|mca| &mca.get_id() == id))\n .unwrap_or(true);\n\n if cgraph_eligible && filter_eligible && mca_active {\n final_selection.push(choice);\n }"
|
| 20 |
+
},
|
| 21 |
+
"commit_sha": "b83667dc0d2d3b9a325febf6016270491c9e9267"
|
| 22 |
+
}
|
| 23 |
+
]
|
| 24 |
+
}
|
diffs/pr_10282/bc6c392/diff.json
ADDED
|
@@ -0,0 +1,24 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "bc6c392d697c574ce1091a9d1c52271085ff3547",
|
| 3 |
+
"pr_number": 10282,
|
| 4 |
+
"rust_files": [
|
| 5 |
+
"crates/router/src/core/payments/routing.rs"
|
| 6 |
+
],
|
| 7 |
+
"diffs": [
|
| 8 |
+
{
|
| 9 |
+
"id": "crates/router/src/core/payments/routing.rs::function::perform_cgraph_filtering",
|
| 10 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 11 |
+
"kind": "function_item",
|
| 12 |
+
"status": "modified",
|
| 13 |
+
"code_changed": true,
|
| 14 |
+
"imports_changed": false,
|
| 15 |
+
"before_code": "pub async fn perform_cgraph_filtering(\n state: &SessionState,\n key_store: &domain::MerchantKeyStore,\n chosen: Vec<routing_types::RoutableConnectorChoice>,\n backend_input: dsl_inputs::BackendInput,\n eligible_connectors: Option<&Vec<api_enums::RoutableConnectors>>,\n profile_id: &common_utils::id_type::ProfileId,\n transaction_type: &api_enums::TransactionType,\n) -> RoutingResult<Vec<routing_types::RoutableConnectorChoice>> {\n let context = euclid_graph::AnalysisContext::from_dir_values(\n backend_input\n .into_context()\n .change_context(errors::RoutingError::KgraphAnalysisError)?,\n );\n let cached_cgraph = get_merchant_cgraph(state, key_store, profile_id, transaction_type).await?;\n let db_mcas = state\n .store\n .find_merchant_connector_account_by_merchant_id_and_disabled_list(\n &state.into(),\n &key_store.merchant_id,\n false,\n key_store,\n )\n .await\n .unwrap_or_else(|_| std::iter::empty().collect::<Vec<_>>());\n\n let active_mca_ids: std::collections::HashSet<_> = db_mcas\n .iter()\n .map(|mca| mca.get_id().to_string())\n .collect();\n\n let mut final_selection = Vec::<routing_types::RoutableConnectorChoice>::new();\n\n for choice in chosen {\n let routable_connector = choice.connector;\n\n let euclid_choice: ast::ConnectorChoice = choice.clone().foreign_into();\n let dir_val = euclid_choice\n .into_dir_value()\n .change_context(errors::RoutingError::KgraphAnalysisError)?;\n\n let cgraph_eligible = cached_cgraph\n .check_value_validity(\n dir_val,\n &context,\n &mut hyperswitch_constraint_graph::Memoization::new(),\n &mut hyperswitch_constraint_graph::CycleCheck::new(),\n None,\n )\n .change_context(errors::RoutingError::KgraphAnalysisError)?;\n\n let filter_eligible =\n eligible_connectors.is_none_or(|list| list.contains(&routable_connector));\n\n let mca_active = choice\n .merchant_connector_id\n .as_ref()\n .map(|id| active_mca_ids.contains(id))\n .unwrap_or(true);\n\n if cgraph_eligible && filter_eligible && mca_active {\n final_selection.push(choice);\n }\n }\n\n Ok(final_selection)\n}",
|
| 16 |
+
"after_code": "pub async fn perform_cgraph_filtering(\n state: &SessionState,\n key_store: &domain::MerchantKeyStore,\n chosen: Vec<routing_types::RoutableConnectorChoice>,\n backend_input: dsl_inputs::BackendInput,\n eligible_connectors: Option<&Vec<api_enums::RoutableConnectors>>,\n profile_id: &common_utils::id_type::ProfileId,\n transaction_type: &api_enums::TransactionType,\n) -> RoutingResult<Vec<routing_types::RoutableConnectorChoice>> {\n let context = euclid_graph::AnalysisContext::from_dir_values(\n backend_input\n .into_context()\n .change_context(errors::RoutingError::KgraphAnalysisError)?,\n );\n let cached_cgraph = get_merchant_cgraph(state, key_store, profile_id, transaction_type).await?;\n let db_mcas = state\n .store\n .find_merchant_connector_account_by_merchant_id_and_disabled_list(\n &state.into(),\n &key_store.merchant_id,\n false,\n key_store,\n )\n .await\n .unwrap_or_else(|_| std::iter::empty().collect::<Vec<_>>());\n\n let active_mca_ids: std::collections::HashSet<_> =\n db_mcas.iter().map(|mca| mca.get_id().to_string()).collect();\n\n let mut final_selection = Vec::<routing_types::RoutableConnectorChoice>::new();\n\n for choice in chosen {\n let routable_connector = choice.connector;\n\n let euclid_choice: ast::ConnectorChoice = choice.clone().foreign_into();\n let dir_val = euclid_choice\n .into_dir_value()\n .change_context(errors::RoutingError::KgraphAnalysisError)?;\n\n let cgraph_eligible = cached_cgraph\n .check_value_validity(\n dir_val,\n &context,\n &mut hyperswitch_constraint_graph::Memoization::new(),\n &mut hyperswitch_constraint_graph::CycleCheck::new(),\n None,\n )\n .change_context(errors::RoutingError::KgraphAnalysisError)?;\n\n let filter_eligible =\n eligible_connectors.is_none_or(|list| list.contains(&routable_connector));\n\n let mca_active = choice\n .merchant_connector_id\n .as_ref()\n .map(|id| active_mca_ids.contains(id))\n .unwrap_or(true);\n\n if cgraph_eligible && filter_eligible && mca_active {\n final_selection.push(choice);\n }\n }\n\n Ok(final_selection)\n}",
|
| 17 |
+
"diff_span": {
|
| 18 |
+
"before": " .unwrap_or_else(|_| std::iter::empty().collect::<Vec<_>>());\n\n let active_mca_ids: std::collections::HashSet<_> = db_mcas\n .iter()\n .map(|mca| mca.get_id().to_string())\n .collect();\n\n let mut final_selection = Vec::<routing_types::RoutableConnectorChoice>::new();",
|
| 19 |
+
"after": " .unwrap_or_else(|_| std::iter::empty().collect::<Vec<_>>());\n\n let active_mca_ids: std::collections::HashSet<_> =\n db_mcas.iter().map(|mca| mca.get_id().to_string()).collect();\n\n let mut final_selection = Vec::<routing_types::RoutableConnectorChoice>::new();"
|
| 20 |
+
},
|
| 21 |
+
"commit_sha": "bc6c392d697c574ce1091a9d1c52271085ff3547"
|
| 22 |
+
}
|
| 23 |
+
]
|
| 24 |
+
}
|
diffs/pr_10282/e13c8a0/diff.json
ADDED
|
@@ -0,0 +1,24 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "e13c8a0bd21d4d37ae9ad8534fea865b668bc763",
|
| 3 |
+
"pr_number": 10282,
|
| 4 |
+
"rust_files": [
|
| 5 |
+
"crates/router/src/core/payments/routing.rs"
|
| 6 |
+
],
|
| 7 |
+
"diffs": [
|
| 8 |
+
{
|
| 9 |
+
"id": "crates/router/src/core/payments/routing.rs::function::perform_cgraph_filtering",
|
| 10 |
+
"file": "crates/router/src/core/payments/routing.rs",
|
| 11 |
+
"kind": "function_item",
|
| 12 |
+
"status": "modified",
|
| 13 |
+
"code_changed": true,
|
| 14 |
+
"imports_changed": false,
|
| 15 |
+
"before_code": "pub async fn perform_cgraph_filtering(\n state: &SessionState,\n key_store: &domain::MerchantKeyStore,\n chosen: Vec<routing_types::RoutableConnectorChoice>,\n backend_input: dsl_inputs::BackendInput,\n eligible_connectors: Option<&Vec<api_enums::RoutableConnectors>>,\n profile_id: &common_utils::id_type::ProfileId,\n transaction_type: &api_enums::TransactionType,\n) -> RoutingResult<Vec<routing_types::RoutableConnectorChoice>> {\n let context = euclid_graph::AnalysisContext::from_dir_values(\n backend_input\n .into_context()\n .change_context(errors::RoutingError::KgraphAnalysisError)?,\n );\n\n let cached_cgraph = get_merchant_cgraph(state, key_store, profile_id, transaction_type).await?;\n\n let db_mcas = state\n .store\n .find_merchant_connector_account_by_merchant_id_and_disabled_list(\n &state.into(),\n &key_store.merchant_id,\n false,\n key_store,\n )\n .await\n .unwrap_or_else(|_| {\n hyperswitch_domain_models::merchant_connector_account::MerchantConnectorAccounts::new(\n vec![],\n )\n });\n\n let active_mca_ids: std::collections::HashSet<_> =\n db_mcas.iter().map(|mca| mca.get_id().clone()).collect();\n\n let mut final_selection = Vec::new();\n\n for choice in chosen {\n let routable_connector = choice.connector;\n\n let euclid_choice: ast::ConnectorChoice = choice.clone().foreign_into();\n let dir_val = euclid_choice\n .into_dir_value()\n .change_context(errors::RoutingError::KgraphAnalysisError)?;\n\n let cgraph_eligible = cached_cgraph\n .check_value_validity(\n dir_val,\n &context,\n &mut hyperswitch_constraint_graph::Memoization::new(),\n &mut hyperswitch_constraint_graph::CycleCheck::new(),\n None,\n )\n .change_context(errors::RoutingError::KgraphAnalysisError)?;\n\n let filter_eligible =\n eligible_connectors.is_none_or(|list| list.contains(&routable_connector));\n\n let mca_active = choice\n .merchant_connector_id\n .as_ref()\n .map(|id| active_mca_ids.contains(id))\n .unwrap_or(true);\n\n if cgraph_eligible && filter_eligible && mca_active {\n final_selection.push(choice);\n }\n }\n\n Ok(final_selection)\n}",
|
| 16 |
+
"after_code": "pub async fn perform_cgraph_filtering(\n state: &SessionState,\n key_store: &domain::MerchantKeyStore,\n chosen: Vec<routing_types::RoutableConnectorChoice>,\n backend_input: dsl_inputs::BackendInput,\n eligible_connectors: Option<&Vec<api_enums::RoutableConnectors>>,\n profile_id: &common_utils::id_type::ProfileId,\n transaction_type: &api_enums::TransactionType,\n) -> RoutingResult<Vec<routing_types::RoutableConnectorChoice>> {\n let context = euclid_graph::AnalysisContext::from_dir_values(\n backend_input\n .into_context()\n .change_context(errors::RoutingError::KgraphAnalysisError)?,\n );\n\n let cached_cgraph = get_merchant_cgraph(state, key_store, profile_id, transaction_type).await?;\n\n let db_mcas = state\n .store\n .find_merchant_connector_account_by_merchant_id_and_disabled_list(\n &state.into(),\n &key_store.merchant_id,\n false,\n key_store,\n )\n .await\n .unwrap_or_else(|_| {\n hyperswitch_domain_models::merchant_connector_account::MerchantConnectorAccounts::new(\n vec![],\n )\n });\n\n let active_mca_ids: std::collections::HashSet<_> =\n db_mcas.iter().map(|mca| mca.get_id().clone()).collect();\n\n let mut final_selection = Vec::new();\n\n for choice in chosen {\n let routable_connector = choice.connector;\n\n let euclid_choice: ast::ConnectorChoice = choice.clone().foreign_into();\n let dir_val = euclid_choice\n .into_dir_value()\n .change_context(errors::RoutingError::KgraphAnalysisError)?;\n\n let cgraph_eligible = cached_cgraph\n .check_value_validity(\n dir_val,\n &context,\n &mut hyperswitch_constraint_graph::Memoization::new(),\n &mut hyperswitch_constraint_graph::CycleCheck::new(),\n None,\n )\n .change_context(errors::RoutingError::KgraphAnalysisError)?;\n\n let filter_eligible =\n eligible_connectors.is_none_or(|list| list.contains(&routable_connector));\n\n let mca_active = choice\n .merchant_connector_id\n .as_ref()\n .map(|id| active_mca_ids.contains(id))\n .unwrap_or(false);\n\n if cgraph_eligible && filter_eligible && mca_active {\n final_selection.push(choice);\n }\n }\n\n Ok(final_selection)\n}",
|
| 17 |
+
"diff_span": {
|
| 18 |
+
"before": " .as_ref()\n .map(|id| active_mca_ids.contains(id))\n .unwrap_or(true);\n\n if cgraph_eligible && filter_eligible && mca_active {",
|
| 19 |
+
"after": " .as_ref()\n .map(|id| active_mca_ids.contains(id))\n .unwrap_or(false);\n\n if cgraph_eligible && filter_eligible && mca_active {"
|
| 20 |
+
},
|
| 21 |
+
"commit_sha": "e13c8a0bd21d4d37ae9ad8534fea865b668bc763"
|
| 22 |
+
}
|
| 23 |
+
]
|
| 24 |
+
}
|
diffs/pr_10326/9e82c74/diff.json
ADDED
|
@@ -0,0 +1,24 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "9e82c74ae4fd26fc7c37e19a53e58ca5940fa064",
|
| 3 |
+
"pr_number": 10326,
|
| 4 |
+
"rust_files": [
|
| 5 |
+
"crates/payment_methods/src/configs/payment_connector_required_fields.rs"
|
| 6 |
+
],
|
| 7 |
+
"diffs": [
|
| 8 |
+
{
|
| 9 |
+
"id": "crates/payment_methods/src/configs/payment_connector_required_fields.rs::function::get_cards_required_fields",
|
| 10 |
+
"file": "crates/payment_methods/src/configs/payment_connector_required_fields.rs",
|
| 11 |
+
"kind": "function_item",
|
| 12 |
+
"status": "modified",
|
| 13 |
+
"code_changed": true,
|
| 14 |
+
"imports_changed": false,
|
| 15 |
+
"before_code": "fn get_cards_required_fields() -> HashMap<Connector, RequiredFieldFinal> {\n HashMap::from([\n (Connector::Aci, fields(vec![], vec![], card_with_name())),\n (Connector::Authipay, fields(vec![], vec![], card_basic())),\n (Connector::Adyen, fields(vec![], vec![], card_basic())),\n (Connector::Airwallex, fields(vec![], card_basic(), vec![])),\n (\n Connector::Authorizedotnet,\n fields(vec![], vec![], card_basic()),\n ),\n (\n Connector::Bambora,\n fields(vec![], [card_with_name(), billing_email()].concat(), vec![]),\n ),\n (\n Connector::Bankofamerica,\n fields(\n vec![],\n vec![],\n [card_basic(), email(), full_name(), billing_address()].concat(),\n ),\n ),\n (\n Connector::Barclaycard,\n fields(\n vec![],\n vec![],\n [card_basic(), email(), full_name(), billing_address()].concat(),\n ),\n ),\n (Connector::Billwerk, fields(vec![], vec![], card_basic())),\n (\n Connector::Bluesnap,\n fields(\n vec![],\n [card_basic(), email(), full_name()].concat(),\n vec![],\n ),\n ),\n (Connector::Boku, fields(vec![], vec![], card_basic())),\n (Connector::Braintree, fields(vec![], vec![], card_basic())),\n (Connector::Celero, fields(vec![], vec![], card_basic())),\n (Connector::Checkout, fields(vec![], card_basic(), vec![])),\n (\n Connector::Coinbase,\n fields(vec![], vec![RequiredField::BillingUserFirstName], vec![]),\n ),\n (\n Connector::Cybersource,\n fields(\n vec![],\n vec![],\n [card_with_name(), billing_email(), billing_address()].concat(),\n ),\n ),\n (\n Connector::Datatrans,\n fields(vec![], vec![], [billing_email(), card_with_name()].concat()),\n ),\n (\n Connector::Deutschebank,\n fields(\n vec![],\n [\n card_basic(),\n email(),\n billing_address(),\n vec![\n RequiredField::BillingFirstName(\"first_name\", FieldType::UserFullName),\n RequiredField::BillingLastName(\"last_name\", FieldType::UserFullName),\n ],\n ]\n .concat(),\n vec![],\n ),\n ),\n (\n Connector::Dlocal,\n fields(\n vec![],\n [\n card_with_name(),\n vec![RequiredField::BillingAddressCountries(vec![\"ALL\"])],\n ]\n .concat(),\n vec![],\n ),\n ),\n #[cfg(feature = \"dummy_connector\")]\n (\n Connector::DummyConnector1,\n fields(vec![], vec![], card_basic()),\n ),\n #[cfg(feature = \"dummy_connector\")]\n (\n Connector::DummyConnector2,\n fields(vec![], vec![], card_basic()),\n ),\n #[cfg(feature = \"dummy_connector\")]\n (\n Connector::DummyConnector3,\n fields(vec![], vec![], card_basic()),\n ),\n #[cfg(feature = \"dummy_connector\")]\n (\n Connector::DummyConnector4,\n fields(vec![], vec![], card_basic()),\n ),\n #[cfg(feature = \"dummy_connector\")]\n (\n Connector::DummyConnector5,\n fields(vec![], vec![], card_basic()),\n ),\n #[cfg(feature = \"dummy_connector\")]\n (\n Connector::DummyConnector6,\n fields(vec![], vec![], card_basic()),\n ),\n #[cfg(feature = \"dummy_connector\")]\n (\n Connector::DummyConnector7,\n fields(vec![], vec![], card_basic()),\n ),\n (\n Connector::Elavon,\n fields(vec![], [card_basic(), billing_email()].concat(), vec![]),\n ),\n (Connector::Fiserv, fields(vec![], card_basic(), vec![])),\n (\n Connector::Fiuu,\n fields(\n vec![\n RequiredField::BillingEmail,\n RequiredField::BillingUserFirstName,\n ],\n vec![],\n card_basic(),\n ),\n ),\n (Connector::Forte, fields(vec![], card_with_name(), vec![])),\n (Connector::Globalpay, fields(vec![], vec![], card_basic())),\n (\n Connector::Hipay,\n fields(\n vec![],\n vec![],\n [\n vec![RequiredField::BillingEmail],\n billing_address(),\n card_with_name(),\n ]\n .concat(),\n ),\n ),\n (\n Connector::Helcim,\n fields(\n vec![],\n [\n card_with_name(),\n vec![\n RequiredField::BillingAddressZip,\n RequiredField::BillingAddressLine1,\n ],\n ]\n .concat(),\n vec![],\n ),\n ),\n (Connector::Iatapay, fields(vec![], vec![], vec![])),\n (Connector::Mollie, fields(vec![], card_with_name(), vec![])),\n (Connector::Moneris, fields(vec![], card_basic(), vec![])),\n (\n Connector::Multisafepay,\n fields(\n vec![],\n vec![],\n [\n card_with_name(),\n vec![\n RequiredField::BillingAddressLine1,\n RequiredField::BillingAddressLine2,\n RequiredField::BillingAddressCity,\n RequiredField::BillingAddressZip,\n RequiredField::BillingAddressCountries(vec![\"ALL\"]),\n ],\n ]\n .concat(),\n ),\n ),\n (Connector::Nexinets, fields(vec![], vec![], card_basic())),\n (\n Connector::Nexixpay,\n RequiredFieldFinal {\n mandate: HashMap::new(),\n non_mandate: HashMap::new(),\n common: HashMap::from([\n RequiredField::CardNumber.to_tuple(),\n RequiredField::CardExpMonth.to_tuple(),\n RequiredField::CardExpYear.to_tuple(),\n RequiredField::BillingFirstName(\"first_name\", FieldType::UserFullName)\n .to_tuple(),\n RequiredField::BillingLastName(\"last_name\", FieldType::UserFullName).to_tuple(),\n ]),\n },\n ),\n (\n Connector::Nmi,\n fields(\n vec![],\n [card_with_name(), vec![RequiredField::BillingAddressZip]].concat(),\n vec![],\n ),\n ),\n (Connector::Noon, fields(vec![], vec![], card_with_name())),\n (\n Connector::Novalnet,\n fields(\n vec![],\n vec![],\n [\n vec![\n RequiredField::BillingFirstName(\"first_name\", FieldType::UserFullName),\n RequiredField::BillingLastName(\"last_name\", FieldType::UserFullName),\n ],\n billing_email(),\n ]\n .concat(),\n ),\n ),\n (\n Connector::Zift,\n fields(vec![], vec![], [card_with_name()].concat()),\n ),\n (\n Connector::Nuvei,\n fields(\n vec![],\n vec![],\n [\n card_basic(),\n vec![\n RequiredField::BillingEmail,\n RequiredField::BillingCountries(vec![\"ALL\"]),\n RequiredField::BillingFirstName(\"first_name\", FieldType::UserFullName),\n RequiredField::BillingLastName(\"last_name\", FieldType::UserFullName),\n ],\n ]\n .concat(),\n ),\n ),\n (\n Connector::Paybox,\n fields(\n vec![],\n vec![],\n [\n email(),\n card_with_name(),\n vec![\n RequiredField::BillingAddressLine1,\n RequiredField::BillingAddressCity,\n RequiredField::BillingAddressZip,\n RequiredField::BillingAddressCountries(vec![\"ALL\"]),\n ],\n ]\n .concat(),\n ),\n ),\n (\n Connector::Paysafe,\n fields(\n vec![\n RequiredField::BillingAddressCountries(vec![\"ALL\"]),\n RequiredField::BillingEmail,\n RequiredField::BillingAddressZip,\n RequiredField::BillingAddressState,\n ],\n vec![],\n vec![],\n ),\n ),\n (\n Connector::Payload,\n fields(\n vec![],\n vec![],\n [\n email(),\n card_with_name(),\n vec![\n RequiredField::BillingAddressLine1,\n RequiredField::BillingAddressCity,\n RequiredField::BillingAddressZip,\n RequiredField::BillingAddressState,\n RequiredField::BillingAddressCountries(vec![\"ALL\"]),\n ],\n ]\n .concat(),\n ),\n ),\n (\n Connector::Payme,\n fields(vec![], vec![], [email(), card_with_name()].concat()),\n ),\n (Connector::Paypal, fields(vec![], card_basic(), vec![])),\n (Connector::Payu, fields(vec![], card_basic(), vec![])),\n (\n Connector::Peachpayments,\n fields(vec![], vec![], card_with_name()),\n ),\n (\n Connector::Powertranz,\n fields(vec![], card_with_name(), vec![]),\n ),\n (Connector::Rapyd, fields(vec![], card_with_name(), vec![])),\n (Connector::Redsys, fields(vec![], card_basic(), vec![])),\n (Connector::Shift4, fields(vec![], card_basic(), vec![])),\n (Connector::Silverflow, fields(vec![], vec![], card_basic())),\n (Connector::Square, fields(vec![], vec![], card_basic())),\n (Connector::Stax, fields(vec![], card_with_name(), vec![])),\n (Connector::Stripe, fields(vec![], vec![], card_basic())),\n (\n Connector::Trustpay,\n fields(\n vec![],\n [\n card_with_name(),\n vec![\n RequiredField::BillingAddressLine1,\n RequiredField::BillingAddressCity,\n RequiredField::BillingAddressZip,\n RequiredField::BillingAddressCountries(vec![\"ALL\"]),\n ],\n ]\n .concat(),\n vec![],\n ),\n ),\n (\n Connector::Trustpayments,\n fields(vec![], vec![], card_basic()),\n ),\n (\n Connector::Tesouro,\n fields(\n vec![],\n vec![],\n vec![\n RequiredField::CardNumber,\n RequiredField::CardExpMonth,\n RequiredField::CardExpYear,\n RequiredField::CardCvc,\n ],\n ),\n ),\n (Connector::Tsys, fields(vec![], card_basic(), vec![])),\n (\n Connector::Wellsfargo,\n fields(\n vec![],\n vec![],\n [card_with_name(), email(), billing_address()].concat(),\n ),\n ),\n (\n Connector::Worldline,\n fields(\n vec![],\n [\n card_basic(),\n vec![RequiredField::BillingAddressCountries(vec![\"ALL\"])],\n ]\n .concat(),\n vec![],\n ),\n ),\n (\n Connector::Worldpay,\n fields(\n vec![],\n vec![],\n vec![\n RequiredField::CardNumber,\n RequiredField::CardExpMonth,\n RequiredField::CardExpYear,\n RequiredField::BillingUserFirstName,\n ],\n ),\n ),\n (\n Connector::Worldpayvantiv,\n fields(vec![], card_basic(), vec![]),\n ),\n (\n Connector::Xendit,\n fields(\n vec![],\n vec![],\n [\n card_basic(),\n vec![\n RequiredField::BillingEmail,\n RequiredField::BillingPhone,\n RequiredField::BillingPhoneCountryCode,\n RequiredField::BillingUserFirstName,\n RequiredField::BillingUserLastName,\n RequiredField::BillingAddressCountries(vec![\"ID,PH\"]),\n ],\n ]\n .concat(),\n ),\n ),\n (\n Connector::Zen,\n RequiredFieldFinal {\n mandate: HashMap::new(),\n non_mandate: HashMap::from([\n RequiredField::CardNumber.to_tuple(),\n RequiredField::CardExpMonth.to_tuple(),\n RequiredField::CardExpYear.to_tuple(),\n RequiredField::Email.to_tuple(),\n ]),\n common: HashMap::new(),\n },\n ),\n ])\n}",
|
| 16 |
+
"after_code": "fn get_cards_required_fields() -> HashMap<Connector, RequiredFieldFinal> {\n HashMap::from([\n (Connector::Aci, fields(vec![], vec![], card_with_name())),\n (Connector::Authipay, fields(vec![], vec![], card_basic())),\n (Connector::Adyen, fields(vec![], vec![], card_with_name())),\n (Connector::Airwallex, fields(vec![], card_basic(), vec![])),\n (\n Connector::Authorizedotnet,\n fields(vec![], vec![], card_basic()),\n ),\n (\n Connector::Bambora,\n fields(vec![], [card_with_name(), billing_email()].concat(), vec![]),\n ),\n (\n Connector::Bankofamerica,\n fields(\n vec![],\n vec![],\n [card_basic(), email(), full_name(), billing_address()].concat(),\n ),\n ),\n (\n Connector::Barclaycard,\n fields(\n vec![],\n vec![],\n [card_basic(), email(), full_name(), billing_address()].concat(),\n ),\n ),\n (Connector::Billwerk, fields(vec![], vec![], card_basic())),\n (\n Connector::Bluesnap,\n fields(\n vec![],\n [card_basic(), email(), full_name()].concat(),\n vec![],\n ),\n ),\n (Connector::Boku, fields(vec![], vec![], card_basic())),\n (Connector::Braintree, fields(vec![], vec![], card_basic())),\n (Connector::Celero, fields(vec![], vec![], card_basic())),\n (Connector::Checkout, fields(vec![], card_basic(), vec![])),\n (\n Connector::Coinbase,\n fields(vec![], vec![RequiredField::BillingUserFirstName], vec![]),\n ),\n (\n Connector::Cybersource,\n fields(\n vec![],\n vec![],\n [card_with_name(), billing_email(), billing_address()].concat(),\n ),\n ),\n (\n Connector::Datatrans,\n fields(vec![], vec![], [billing_email(), card_with_name()].concat()),\n ),\n (\n Connector::Deutschebank,\n fields(\n vec![],\n [\n card_basic(),\n email(),\n billing_address(),\n vec![\n RequiredField::BillingFirstName(\"first_name\", FieldType::UserFullName),\n RequiredField::BillingLastName(\"last_name\", FieldType::UserFullName),\n ],\n ]\n .concat(),\n vec![],\n ),\n ),\n (\n Connector::Dlocal,\n fields(\n vec![],\n [\n card_with_name(),\n vec![RequiredField::BillingAddressCountries(vec![\"ALL\"])],\n ]\n .concat(),\n vec![],\n ),\n ),\n #[cfg(feature = \"dummy_connector\")]\n (\n Connector::DummyConnector1,\n fields(vec![], vec![], card_basic()),\n ),\n #[cfg(feature = \"dummy_connector\")]\n (\n Connector::DummyConnector2,\n fields(vec![], vec![], card_basic()),\n ),\n #[cfg(feature = \"dummy_connector\")]\n (\n Connector::DummyConnector3,\n fields(vec![], vec![], card_basic()),\n ),\n #[cfg(feature = \"dummy_connector\")]\n (\n Connector::DummyConnector4,\n fields(vec![], vec![], card_basic()),\n ),\n #[cfg(feature = \"dummy_connector\")]\n (\n Connector::DummyConnector5,\n fields(vec![], vec![], card_basic()),\n ),\n #[cfg(feature = \"dummy_connector\")]\n (\n Connector::DummyConnector6,\n fields(vec![], vec![], card_basic()),\n ),\n #[cfg(feature = \"dummy_connector\")]\n (\n Connector::DummyConnector7,\n fields(vec![], vec![], card_basic()),\n ),\n (\n Connector::Elavon,\n fields(vec![], [card_basic(), billing_email()].concat(), vec![]),\n ),\n (Connector::Fiserv, fields(vec![], card_basic(), vec![])),\n (\n Connector::Fiuu,\n fields(\n vec![\n RequiredField::BillingEmail,\n RequiredField::BillingUserFirstName,\n ],\n vec![],\n card_basic(),\n ),\n ),\n (Connector::Forte, fields(vec![], card_with_name(), vec![])),\n (Connector::Globalpay, fields(vec![], vec![], card_basic())),\n (\n Connector::Hipay,\n fields(\n vec![],\n vec![],\n [\n vec![RequiredField::BillingEmail],\n billing_address(),\n card_with_name(),\n ]\n .concat(),\n ),\n ),\n (\n Connector::Helcim,\n fields(\n vec![],\n [\n card_with_name(),\n vec![\n RequiredField::BillingAddressZip,\n RequiredField::BillingAddressLine1,\n ],\n ]\n .concat(),\n vec![],\n ),\n ),\n (Connector::Iatapay, fields(vec![], vec![], vec![])),\n (Connector::Mollie, fields(vec![], card_with_name(), vec![])),\n (Connector::Moneris, fields(vec![], card_basic(), vec![])),\n (\n Connector::Multisafepay,\n fields(\n vec![],\n vec![],\n [\n card_with_name(),\n vec![\n RequiredField::BillingAddressLine1,\n RequiredField::BillingAddressLine2,\n RequiredField::BillingAddressCity,\n RequiredField::BillingAddressZip,\n RequiredField::BillingAddressCountries(vec![\"ALL\"]),\n ],\n ]\n .concat(),\n ),\n ),\n (Connector::Nexinets, fields(vec![], vec![], card_basic())),\n (\n Connector::Nexixpay,\n RequiredFieldFinal {\n mandate: HashMap::new(),\n non_mandate: HashMap::new(),\n common: HashMap::from([\n RequiredField::CardNumber.to_tuple(),\n RequiredField::CardExpMonth.to_tuple(),\n RequiredField::CardExpYear.to_tuple(),\n RequiredField::BillingFirstName(\"first_name\", FieldType::UserFullName)\n .to_tuple(),\n RequiredField::BillingLastName(\"last_name\", FieldType::UserFullName).to_tuple(),\n ]),\n },\n ),\n (\n Connector::Nmi,\n fields(\n vec![],\n [card_with_name(), vec![RequiredField::BillingAddressZip]].concat(),\n vec![],\n ),\n ),\n (Connector::Noon, fields(vec![], vec![], card_with_name())),\n (\n Connector::Novalnet,\n fields(\n vec![],\n vec![],\n [\n vec![\n RequiredField::BillingFirstName(\"first_name\", FieldType::UserFullName),\n RequiredField::BillingLastName(\"last_name\", FieldType::UserFullName),\n ],\n billing_email(),\n ]\n .concat(),\n ),\n ),\n (\n Connector::Zift,\n fields(vec![], vec![], [card_with_name()].concat()),\n ),\n (\n Connector::Nuvei,\n fields(\n vec![],\n vec![],\n [\n card_basic(),\n vec![\n RequiredField::BillingEmail,\n RequiredField::BillingCountries(vec![\"ALL\"]),\n RequiredField::BillingFirstName(\"first_name\", FieldType::UserFullName),\n RequiredField::BillingLastName(\"last_name\", FieldType::UserFullName),\n ],\n ]\n .concat(),\n ),\n ),\n (\n Connector::Paybox,\n fields(\n vec![],\n vec![],\n [\n email(),\n card_with_name(),\n vec![\n RequiredField::BillingAddressLine1,\n RequiredField::BillingAddressCity,\n RequiredField::BillingAddressZip,\n RequiredField::BillingAddressCountries(vec![\"ALL\"]),\n ],\n ]\n .concat(),\n ),\n ),\n (\n Connector::Paysafe,\n fields(\n vec![\n RequiredField::BillingAddressCountries(vec![\"ALL\"]),\n RequiredField::BillingEmail,\n RequiredField::BillingAddressZip,\n RequiredField::BillingAddressState,\n ],\n vec![],\n vec![],\n ),\n ),\n (\n Connector::Payload,\n fields(\n vec![],\n vec![],\n [\n email(),\n card_with_name(),\n vec![\n RequiredField::BillingAddressLine1,\n RequiredField::BillingAddressCity,\n RequiredField::BillingAddressZip,\n RequiredField::BillingAddressState,\n RequiredField::BillingAddressCountries(vec![\"ALL\"]),\n ],\n ]\n .concat(),\n ),\n ),\n (\n Connector::Payme,\n fields(vec![], vec![], [email(), card_with_name()].concat()),\n ),\n (Connector::Paypal, fields(vec![], card_basic(), vec![])),\n (Connector::Payu, fields(vec![], card_basic(), vec![])),\n (\n Connector::Peachpayments,\n fields(vec![], vec![], card_with_name()),\n ),\n (\n Connector::Powertranz,\n fields(vec![], card_with_name(), vec![]),\n ),\n (Connector::Rapyd, fields(vec![], card_with_name(), vec![])),\n (Connector::Redsys, fields(vec![], card_basic(), vec![])),\n (Connector::Shift4, fields(vec![], card_basic(), vec![])),\n (Connector::Silverflow, fields(vec![], vec![], card_basic())),\n (Connector::Square, fields(vec![], vec![], card_basic())),\n (Connector::Stax, fields(vec![], card_with_name(), vec![])),\n (Connector::Stripe, fields(vec![], vec![], card_basic())),\n (\n Connector::Trustpay,\n fields(\n vec![],\n [\n card_with_name(),\n vec![\n RequiredField::BillingAddressLine1,\n RequiredField::BillingAddressCity,\n RequiredField::BillingAddressZip,\n RequiredField::BillingAddressCountries(vec![\"ALL\"]),\n ],\n ]\n .concat(),\n vec![],\n ),\n ),\n (\n Connector::Trustpayments,\n fields(vec![], vec![], card_basic()),\n ),\n (\n Connector::Tesouro,\n fields(\n vec![],\n vec![],\n vec![\n RequiredField::CardNumber,\n RequiredField::CardExpMonth,\n RequiredField::CardExpYear,\n RequiredField::CardCvc,\n ],\n ),\n ),\n (Connector::Tsys, fields(vec![], card_basic(), vec![])),\n (\n Connector::Wellsfargo,\n fields(\n vec![],\n vec![],\n [card_with_name(), email(), billing_address()].concat(),\n ),\n ),\n (\n Connector::Worldline,\n fields(\n vec![],\n [\n card_basic(),\n vec![RequiredField::BillingAddressCountries(vec![\"ALL\"])],\n ]\n .concat(),\n vec![],\n ),\n ),\n (\n Connector::Worldpay,\n fields(\n vec![],\n vec![],\n vec![\n RequiredField::CardNumber,\n RequiredField::CardExpMonth,\n RequiredField::CardExpYear,\n RequiredField::BillingUserFirstName,\n ],\n ),\n ),\n (\n Connector::Worldpayvantiv,\n fields(vec![], card_basic(), vec![]),\n ),\n (\n Connector::Xendit,\n fields(\n vec![],\n vec![],\n [\n card_basic(),\n vec![\n RequiredField::BillingEmail,\n RequiredField::BillingPhone,\n RequiredField::BillingPhoneCountryCode,\n RequiredField::BillingUserFirstName,\n RequiredField::BillingUserLastName,\n RequiredField::BillingAddressCountries(vec![\"ID,PH\"]),\n ],\n ]\n .concat(),\n ),\n ),\n (\n Connector::Zen,\n RequiredFieldFinal {\n mandate: HashMap::new(),\n non_mandate: HashMap::from([\n RequiredField::CardNumber.to_tuple(),\n RequiredField::CardExpMonth.to_tuple(),\n RequiredField::CardExpYear.to_tuple(),\n RequiredField::Email.to_tuple(),\n ]),\n common: HashMap::new(),\n },\n ),\n ])\n}",
|
| 17 |
+
"diff_span": {
|
| 18 |
+
"before": " (Connector::Aci, fields(vec![], vec![], card_with_name())),\n (Connector::Authipay, fields(vec![], vec![], card_basic())),\n (Connector::Adyen, fields(vec![], vec![], card_basic())),\n (Connector::Airwallex, fields(vec![], card_basic(), vec![])),\n (",
|
| 19 |
+
"after": " (Connector::Aci, fields(vec![], vec![], card_with_name())),\n (Connector::Authipay, fields(vec![], vec![], card_basic())),\n (Connector::Adyen, fields(vec![], vec![], card_with_name())),\n (Connector::Airwallex, fields(vec![], card_basic(), vec![])),\n ("
|
| 20 |
+
},
|
| 21 |
+
"commit_sha": "9e82c74ae4fd26fc7c37e19a53e58ca5940fa064"
|
| 22 |
+
}
|
| 23 |
+
]
|
| 24 |
+
}
|
diffs/pr_6687/ee37bb7/diff.json
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
diffs/pr_6734/0793d2b/diff.json
ADDED
|
@@ -0,0 +1,24 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "0793d2b0f131bb3cec43a7423b9ef630632e403f",
|
| 3 |
+
"pr_number": 6734,
|
| 4 |
+
"rust_files": [
|
| 5 |
+
"crates/router/src/core/payments/operations/payment_confirm.rs"
|
| 6 |
+
],
|
| 7 |
+
"diffs": [
|
| 8 |
+
{
|
| 9 |
+
"id": "crates/router/src/core/payments/operations/payment_confirm.rs::PaymentConfirm::function::get_trackers",
|
| 10 |
+
"file": "crates/router/src/core/payments/operations/payment_confirm.rs",
|
| 11 |
+
"kind": "function_item",
|
| 12 |
+
"status": "modified",
|
| 13 |
+
"code_changed": true,
|
| 14 |
+
"imports_changed": false,
|
| 15 |
+
"before_code": "async fn get_trackers<'a>(\n &'a self,\n state: &'a SessionState,\n payment_id: &api::PaymentIdType,\n request: &api::PaymentsRequest,\n merchant_account: &domain::MerchantAccount,\n key_store: &domain::MerchantKeyStore,\n auth_flow: services::AuthFlow,\n header_payload: &hyperswitch_domain_models::payments::HeaderPayload,\n ) -> RouterResult<operations::GetTrackerResponse<'a, F, api::PaymentsRequest, PaymentData<F>>>\n {\n let key_manager_state = &state.into();\n\n let merchant_id = merchant_account.get_id();\n let storage_scheme = merchant_account.storage_scheme;\n let (currency, amount);\n\n let payment_id = payment_id\n .get_payment_intent_id()\n .change_context(errors::ApiErrorResponse::PaymentNotFound)?;\n\n // Stage 1\n let store = &*state.store;\n let m_merchant_id = merchant_id.clone();\n\n // Parallel calls - level 0\n let mut payment_intent = store\n .find_payment_intent_by_payment_id_merchant_id(\n key_manager_state,\n &payment_id,\n &m_merchant_id,\n key_store,\n storage_scheme,\n )\n .await\n .to_not_found_response(errors::ApiErrorResponse::PaymentNotFound)?;\n\n if let Some(order_details) = &request.order_details {\n helpers::validate_order_details_amount(\n order_details.to_owned(),\n payment_intent.amount,\n false,\n )?;\n }\n\n helpers::validate_customer_access(&payment_intent, auth_flow, request)?;\n\n if [\n Some(common_enums::PaymentSource::Webhook),\n Some(common_enums::PaymentSource::ExternalAuthenticator),\n ]\n .contains(&header_payload.payment_confirm_source)\n {\n helpers::validate_payment_status_against_not_allowed_statuses(\n &payment_intent.status,\n &[\n storage_enums::IntentStatus::Cancelled,\n storage_enums::IntentStatus::Succeeded,\n storage_enums::IntentStatus::Processing,\n storage_enums::IntentStatus::RequiresCapture,\n storage_enums::IntentStatus::RequiresMerchantAction,\n ],\n \"confirm\",\n )?;\n } else {\n helpers::validate_payment_status_against_not_allowed_statuses(\n &payment_intent.status,\n &[\n storage_enums::IntentStatus::Cancelled,\n storage_enums::IntentStatus::Succeeded,\n storage_enums::IntentStatus::Processing,\n storage_enums::IntentStatus::RequiresCapture,\n storage_enums::IntentStatus::RequiresMerchantAction,\n storage_enums::IntentStatus::RequiresCustomerAction,\n ],\n \"confirm\",\n )?;\n }\n\n helpers::authenticate_client_secret(request.client_secret.as_ref(), &payment_intent)?;\n\n let customer_details = helpers::get_customer_details_from_request(request);\n\n // Stage 2\n let attempt_id = payment_intent.active_attempt.get_id();\n let profile_id = payment_intent\n .profile_id\n .clone()\n .get_required_value(\"profile_id\")\n .change_context(errors::ApiErrorResponse::InternalServerError)\n .attach_printable(\"'profile_id' not set in payment intent\")?;\n\n let store = state.store.clone();\n let key_manager_state_clone = key_manager_state.clone();\n let key_store_clone = key_store.clone();\n\n let business_profile_fut = tokio::spawn(\n async move {\n store\n .find_business_profile_by_profile_id(\n &key_manager_state_clone,\n &key_store_clone,\n &profile_id,\n )\n .map(|business_profile_result| {\n business_profile_result.to_not_found_response(\n errors::ApiErrorResponse::ProfileNotFound {\n id: profile_id.get_string_repr().to_owned(),\n },\n )\n })\n .await\n }\n .in_current_span(),\n );\n\n let store = state.store.clone();\n\n let m_payment_id = payment_intent.payment_id.clone();\n let m_merchant_id = merchant_id.clone();\n\n let payment_attempt_fut = tokio::spawn(\n async move {\n store\n .find_payment_attempt_by_payment_id_merchant_id_attempt_id(\n &m_payment_id,\n &m_merchant_id,\n attempt_id.as_str(),\n storage_scheme,\n )\n .map(|x| x.to_not_found_response(errors::ApiErrorResponse::PaymentNotFound))\n .await\n }\n .in_current_span(),\n );\n\n let m_merchant_id = merchant_id.clone();\n let m_request_shipping = request.shipping.clone();\n let m_payment_intent_shipping_address_id = payment_intent.shipping_address_id.clone();\n let m_payment_intent_payment_id = payment_intent.payment_id.clone();\n let m_customer_details_customer_id = customer_details.customer_id.clone();\n let m_payment_intent_customer_id = payment_intent.customer_id.clone();\n let m_key_store = key_store.clone();\n let session_state = state.clone();\n\n let shipping_address_fut = tokio::spawn(\n async move {\n helpers::create_or_update_address_for_payment_by_request(\n &session_state,\n m_request_shipping.as_ref(),\n m_payment_intent_shipping_address_id.as_deref(),\n &m_merchant_id,\n m_payment_intent_customer_id\n .as_ref()\n .or(m_customer_details_customer_id.as_ref()),\n &m_key_store,\n &m_payment_intent_payment_id,\n storage_scheme,\n )\n .await\n }\n .in_current_span(),\n );\n\n let m_merchant_id = merchant_id.clone();\n let m_request_billing = request.billing.clone();\n let m_customer_details_customer_id = customer_details.customer_id.clone();\n let m_payment_intent_customer_id = payment_intent.customer_id.clone();\n let m_payment_intent_billing_address_id = payment_intent.billing_address_id.clone();\n let m_payment_intent_payment_id = payment_intent.payment_id.clone();\n let m_key_store = key_store.clone();\n let session_state = state.clone();\n\n let billing_address_fut = tokio::spawn(\n async move {\n helpers::create_or_update_address_for_payment_by_request(\n &session_state,\n m_request_billing.as_ref(),\n m_payment_intent_billing_address_id.as_deref(),\n &m_merchant_id,\n m_payment_intent_customer_id\n .as_ref()\n .or(m_customer_details_customer_id.as_ref()),\n &m_key_store,\n &m_payment_intent_payment_id,\n storage_scheme,\n )\n .await\n }\n .in_current_span(),\n );\n\n let m_merchant_id = merchant_id.clone();\n let store = state.clone().store;\n let m_request_merchant_connector_details = request.merchant_connector_details.clone();\n\n let config_update_fut = tokio::spawn(\n async move {\n m_request_merchant_connector_details\n .async_map(|mcd| async {\n helpers::insert_merchant_connector_creds_to_config(\n store.as_ref(),\n &m_merchant_id,\n mcd,\n )\n .await\n })\n .map(|x| x.transpose())\n .await\n }\n .in_current_span(),\n );\n\n // Based on whether a retry can be performed or not, fetch relevant entities\n let (mut payment_attempt, shipping_address, billing_address, business_profile) =\n match payment_intent.status {\n api_models::enums::IntentStatus::RequiresCustomerAction\n | api_models::enums::IntentStatus::RequiresMerchantAction\n | api_models::enums::IntentStatus::RequiresPaymentMethod\n | api_models::enums::IntentStatus::RequiresConfirmation => {\n // Normal payment\n // Parallel calls - level 1\n let (payment_attempt, shipping_address, billing_address, business_profile, _) =\n tokio::try_join!(\n utils::flatten_join_error(payment_attempt_fut),\n utils::flatten_join_error(shipping_address_fut),\n utils::flatten_join_error(billing_address_fut),\n utils::flatten_join_error(business_profile_fut),\n utils::flatten_join_error(config_update_fut)\n )?;\n\n (\n payment_attempt,\n shipping_address,\n billing_address,\n business_profile,\n )\n }\n _ => {\n // Retry payment\n let (\n mut payment_attempt,\n shipping_address,\n billing_address,\n business_profile,\n _,\n ) = tokio::try_join!(\n utils::flatten_join_error(payment_attempt_fut),\n utils::flatten_join_error(shipping_address_fut),\n utils::flatten_join_error(billing_address_fut),\n utils::flatten_join_error(business_profile_fut),\n utils::flatten_join_error(config_update_fut)\n )?;\n\n let attempt_type = helpers::get_attempt_type(\n &payment_intent,\n &payment_attempt,\n request,\n \"confirm\",\n )?;\n\n // 3\n (payment_intent, payment_attempt) = attempt_type\n .modify_payment_intent_and_payment_attempt(\n request,\n payment_intent,\n payment_attempt,\n state,\n key_store,\n storage_scheme,\n )\n .await?;\n\n (\n payment_attempt,\n shipping_address,\n billing_address,\n business_profile,\n )\n }\n };\n\n payment_intent.order_details = request\n .get_order_details_as_value()\n .change_context(errors::ApiErrorResponse::InternalServerError)\n .attach_printable(\"Failed to convert order details to value\")?\n .or(payment_intent.order_details);\n\n payment_intent.setup_future_usage = request\n .setup_future_usage\n .or(payment_intent.setup_future_usage);\n\n payment_intent.psd2_sca_exemption_type = request\n .psd2_sca_exemption_type\n .or(payment_intent.psd2_sca_exemption_type);\n\n let browser_info = request\n .browser_info\n .clone()\n .or(payment_attempt.browser_info)\n .as_ref()\n .map(Encode::encode_to_value)\n .transpose()\n .change_context(errors::ApiErrorResponse::InvalidDataValue {\n field_name: \"browser_info\",\n })?;\n let customer_acceptance = request.customer_acceptance.clone().or(payment_attempt\n .customer_acceptance\n .clone()\n .map(|customer_acceptance| {\n customer_acceptance\n .expose()\n .parse_value(\"CustomerAcceptance\")\n .change_context(errors::ApiErrorResponse::InternalServerError)\n .attach_printable(\"Failed while deserializing customer_acceptance\")\n })\n .transpose()?);\n\n let recurring_details = request.recurring_details.clone();\n\n helpers::validate_card_data(\n request\n .payment_method_data\n .as_ref()\n .and_then(|pmd| pmd.payment_method_data.clone()),\n )?;\n\n // validate billing name for card holder name\n helpers::validate_billing_name(\n request\n .billing\n .as_ref()\n .and_then(|billing| billing.address.as_ref()),\n )?;\n\n payment_attempt.browser_info = browser_info;\n\n payment_attempt.payment_experience = request\n .payment_experience\n .or(payment_attempt.payment_experience);\n\n payment_attempt.capture_method = request.capture_method.or(payment_attempt.capture_method);\n\n payment_attempt.customer_acceptance = request\n .customer_acceptance\n .clone()\n .map(|customer_acceptance| customer_acceptance.encode_to_value())\n .transpose()\n .change_context(errors::ApiErrorResponse::InternalServerError)\n .attach_printable(\"Failed while encoding customer_acceptance to value\")?\n .map(masking::Secret::new)\n .or(payment_attempt.customer_acceptance);\n\n currency = payment_attempt.currency.get_required_value(\"currency\")?;\n amount = payment_attempt.get_total_amount().into();\n\n helpers::validate_customer_id_mandatory_cases(\n request.setup_future_usage.is_some(),\n payment_intent\n .customer_id\n .as_ref()\n .or(customer_details.customer_id.as_ref()),\n )?;\n\n let creds_identifier = request\n .merchant_connector_details\n .as_ref()\n .map(|mcd| mcd.creds_identifier.to_owned());\n\n payment_intent.shipping_address_id =\n shipping_address.as_ref().map(|i| i.address_id.clone());\n payment_intent.billing_address_id = billing_address.as_ref().map(|i| i.address_id.clone());\n payment_intent.return_url = request\n .return_url\n .as_ref()\n .map(|a| a.to_string())\n .or(payment_intent.return_url);\n\n payment_intent.allowed_payment_method_types = request\n .get_allowed_payment_method_types_as_value()\n .change_context(errors::ApiErrorResponse::InternalServerError)\n .attach_printable(\"Error converting allowed_payment_types to Value\")?\n .or(payment_intent.allowed_payment_method_types);\n\n payment_intent.connector_metadata = request\n .get_connector_metadata_as_value()\n .change_context(errors::ApiErrorResponse::InternalServerError)\n .attach_printable(\"Error converting connector_metadata to Value\")?\n .or(payment_intent.connector_metadata);\n\n payment_intent.feature_metadata = request\n .get_feature_metadata_as_value()\n .change_context(errors::ApiErrorResponse::InternalServerError)\n .attach_printable(\"Error converting feature_metadata to Value\")?\n .or(payment_intent.feature_metadata);\n payment_intent.metadata = request.metadata.clone().or(payment_intent.metadata);\n payment_intent.frm_metadata = request.frm_metadata.clone().or(payment_intent.frm_metadata);\n payment_intent.request_incremental_authorization = request\n .request_incremental_authorization\n .map(|request_incremental_authorization| {\n core_utils::get_request_incremental_authorization_value(\n Some(request_incremental_authorization),\n payment_attempt.capture_method,\n )\n })\n .unwrap_or(Ok(payment_intent.request_incremental_authorization))?;\n payment_attempt.business_sub_label = request\n .business_sub_label\n .clone()\n .or(payment_attempt.business_sub_label);\n\n let n_request_payment_method_data = request\n .payment_method_data\n .as_ref()\n .and_then(|pmd| pmd.payment_method_data.clone());\n\n let store = state.clone().store;\n let profile_id = payment_intent\n .profile_id\n .clone()\n .get_required_value(\"profile_id\")\n .change_context(errors::ApiErrorResponse::InternalServerError)\n .attach_printable(\"'profile_id' not set in payment intent\")?;\n\n let additional_pm_data_fut = tokio::spawn(\n async move {\n Ok(n_request_payment_method_data\n .async_map(|payment_method_data| async move {\n helpers::get_additional_payment_data(\n &payment_method_data.into(),\n store.as_ref(),\n &profile_id,\n )\n .await\n })\n .await)\n }\n .in_current_span(),\n );\n\n let n_payment_method_billing_address_id =\n payment_attempt.payment_method_billing_address_id.clone();\n let n_request_payment_method_billing_address = request\n .payment_method_data\n .as_ref()\n .and_then(|pmd| pmd.billing.clone());\n let m_payment_intent_customer_id = payment_intent.customer_id.clone();\n let m_payment_intent_payment_id = payment_intent.payment_id.clone();\n let m_key_store = key_store.clone();\n let m_customer_details_customer_id = customer_details.customer_id.clone();\n let m_merchant_id = merchant_id.clone();\n let session_state = state.clone();\n\n let payment_method_billing_future = tokio::spawn(\n async move {\n helpers::create_or_update_address_for_payment_by_request(\n &session_state,\n n_request_payment_method_billing_address.as_ref(),\n n_payment_method_billing_address_id.as_deref(),\n &m_merchant_id,\n m_payment_intent_customer_id\n .as_ref()\n .or(m_customer_details_customer_id.as_ref()),\n &m_key_store,\n &m_payment_intent_payment_id,\n storage_scheme,\n )\n .await\n }\n .in_current_span(),\n );\n\n let mandate_type = m_helpers::get_mandate_type(\n request.mandate_data.clone(),\n request.off_session,\n payment_intent.setup_future_usage,\n request.customer_acceptance.clone(),\n request.payment_token.clone(),\n payment_attempt.payment_method.or(request.payment_method),\n )\n .change_context(errors::ApiErrorResponse::MandateValidationFailed {\n reason: \"Expected one out of recurring_details and mandate_data but got both\".into(),\n })?;\n\n let m_state = state.clone();\n let m_mandate_type = mandate_type;\n let m_merchant_account = merchant_account.clone();\n let m_request = request.clone();\n let m_key_store = key_store.clone();\n\n let payment_intent_customer_id = payment_intent.customer_id.clone();\n\n let mandate_details_fut = tokio::spawn(\n async move {\n Box::pin(helpers::get_token_pm_type_mandate_details(\n &m_state,\n &m_request,\n m_mandate_type,\n &m_merchant_account,\n &m_key_store,\n None,\n payment_intent_customer_id.as_ref(),\n ))\n .await\n }\n .in_current_span(),\n );\n\n // Parallel calls - level 2\n let (mandate_details, additional_pm_info, payment_method_billing) = tokio::try_join!(\n utils::flatten_join_error(mandate_details_fut),\n utils::flatten_join_error(additional_pm_data_fut),\n utils::flatten_join_error(payment_method_billing_future),\n )?;\n\n let additional_pm_data = additional_pm_info.transpose()?.flatten();\n\n let m_helpers::MandateGenericData {\n token,\n payment_method,\n payment_method_type,\n mandate_data,\n recurring_mandate_payment_data,\n mandate_connector,\n payment_method_info,\n } = mandate_details;\n\n let token = token.or_else(|| payment_attempt.payment_token.clone());\n\n helpers::validate_pm_or_token_given(\n &request.payment_method,\n &request\n .payment_method_data\n .as_ref()\n .and_then(|pmd| pmd.payment_method_data.clone()),\n &request.payment_method_type,\n &mandate_type,\n &token,\n )?;\n\n let (token_data, payment_method_info) = if let Some(token) = token.clone() {\n let token_data = helpers::retrieve_payment_token_data(\n state,\n token,\n payment_method.or(payment_attempt.payment_method),\n )\n .await?;\n\n let payment_method_info = helpers::retrieve_payment_method_from_db_with_token_data(\n state,\n key_store,\n &token_data,\n storage_scheme,\n )\n .await?;\n\n (Some(token_data), payment_method_info)\n } else {\n (None, payment_method_info)\n };\n let additional_pm_data_from_locker = if let Some(ref pm) = payment_method_info {\n let card_detail_from_locker: Option<api::CardDetailFromLocker> = pm\n .payment_method_data\n .clone()\n .map(|x| x.into_inner().expose())\n .and_then(|v| {\n v.parse_value(\"PaymentMethodsData\")\n .map_err(|err| {\n router_env::logger::info!(\n \"PaymentMethodsData deserialization failed: {:?}\",\n err\n )\n })\n .ok()\n })\n .and_then(|pmd| match pmd {\n PaymentMethodsData::Card(crd) => Some(api::CardDetailFromLocker::from(crd)),\n _ => None,\n });\n card_detail_from_locker.map(|card_details| {\n let additional_data = card_details.into();\n api_models::payments::AdditionalPaymentData::Card(Box::new(additional_data))\n })\n } else {\n None\n };\n payment_attempt.payment_method_data = additional_pm_data_from_locker\n .as_ref()\n .map(Encode::encode_to_value)\n .transpose()\n .change_context(errors::ApiErrorResponse::InternalServerError)\n .attach_printable(\"Failed to encode additional pm data\")?;\n\n payment_attempt.payment_method = payment_method.or(payment_attempt.payment_method);\n\n let payment_method_type = Option::<api_models::enums::PaymentMethodType>::foreign_from((\n payment_method_type,\n additional_pm_data.as_ref(),\n ));\n\n payment_attempt.payment_method_type = payment_method_type\n .or(payment_attempt.payment_method_type)\n .or(payment_method_info\n .as_ref()\n .and_then(|pm_info| pm_info.get_payment_method_subtype()));\n\n // The operation merges mandate data from both request and payment_attempt\n let setup_mandate = mandate_data.map(|mut sm| {\n sm.mandate_type = payment_attempt.mandate_details.clone().or(sm.mandate_type);\n sm.update_mandate_id = payment_attempt\n .mandate_data\n .clone()\n .and_then(|mandate| mandate.update_mandate_id)\n .or(sm.update_mandate_id);\n sm\n });\n\n let mandate_details_present =\n payment_attempt.mandate_details.is_some() || request.mandate_data.is_some();\n helpers::validate_mandate_data_and_future_usage(\n payment_intent.setup_future_usage,\n mandate_details_present,\n )?;\n\n let payment_method_data_after_card_bin_call = request\n .payment_method_data\n .as_ref()\n .and_then(|request_payment_method_data| {\n request_payment_method_data.payment_method_data.as_ref()\n })\n .zip(additional_pm_data)\n .map(|(payment_method_data, additional_payment_data)| {\n payment_method_data.apply_additional_payment_data(additional_payment_data)\n })\n .transpose()\n .change_context(errors::ApiErrorResponse::InternalServerError)\n .attach_printable(\"Card cobadge check failed due to an invalid card network regex\")?;\n\n payment_attempt.payment_method_billing_address_id = payment_method_billing\n .as_ref()\n .map(|payment_method_billing| payment_method_billing.address_id.clone());\n\n let address = PaymentAddress::new(\n shipping_address.as_ref().map(From::from),\n billing_address.as_ref().map(From::from),\n payment_method_billing.as_ref().map(From::from),\n business_profile.use_billing_as_payment_method_billing,\n );\n\n let payment_method_data_billing = request\n .payment_method_data\n .as_ref()\n .and_then(|pmd| pmd.payment_method_data.as_ref())\n .and_then(|payment_method_data_billing| {\n payment_method_data_billing.get_billing_address()\n });\n\n let unified_address =\n address.unify_with_payment_method_data_billing(payment_method_data_billing);\n\n // If processor_payment_token is passed in request then populating the same in PaymentData\n let mandate_id = request\n .recurring_details\n .as_ref()\n .and_then(|recurring_details| match recurring_details {\n api_models::mandates::RecurringDetails::ProcessorPaymentToken(token) => {\n payment_intent.is_payment_processor_token_flow = Some(true);\n Some(api_models::payments::MandateIds {\n mandate_id: None,\n mandate_reference_id: Some(\n api_models::payments::MandateReferenceId::ConnectorMandateId(\n ConnectorMandateReferenceId::new(\n Some(token.processor_payment_token.clone()), // connector_mandate_id\n None, // payment_method_id\n None, // update_history\n None, // mandate_metadata\n None, // connector_mandate_request_reference_id\n ),\n ),\n ),\n })\n }\n _ => None,\n });\n\n let pmt_order_tax_amount = payment_intent.tax_details.clone().and_then(|tax| {\n if tax.payment_method_type.clone().map(|a| a.pmt) == payment_attempt.payment_method_type\n {\n tax.payment_method_type.map(|a| a.order_tax_amount)\n } else {\n None\n }\n });\n\n let order_tax_amount = pmt_order_tax_amount.or_else(|| {\n payment_intent\n .tax_details\n .clone()\n .and_then(|tax| tax.default.map(|a| a.order_tax_amount))\n });\n\n payment_attempt\n .net_amount\n .set_order_tax_amount(order_tax_amount);\n\n payment_attempt.connector_mandate_detail = Some(\n DieselConnectorMandateReferenceId::foreign_from(ConnectorMandateReferenceId::new(\n None,\n None,\n None, // update_history\n None, // mandate_metadata\n Some(common_utils::generate_id_with_len(\n consts::CONNECTOR_MANDATE_REQUEST_REFERENCE_ID_LENGTH.to_owned(),\n )), // connector_mandate_request_reference_id\n )),\n );\n let payment_data = PaymentData {\n flow: PhantomData,\n payment_intent,\n payment_attempt,\n currency,\n amount,\n email: request.email.clone(),\n mandate_id: mandate_id.clone(),\n mandate_connector,\n setup_mandate,\n customer_acceptance: customer_acceptance.map(From::from),\n token,\n address: unified_address,\n token_data,\n confirm: request.confirm,\n payment_method_data: payment_method_data_after_card_bin_call.map(Into::into),\n payment_method_info,\n force_sync: None,\n refunds: vec![],\n disputes: vec![],\n attempts: None,\n sessions_token: vec![],\n card_cvc: request.card_cvc.clone(),\n creds_identifier,\n pm_token: None,\n connector_customer_id: None,\n recurring_mandate_payment_data,\n ephemeral_key: None,\n multiple_capture_data: None,\n redirect_response: None,\n surcharge_details: None,\n frm_message: None,\n payment_link_data: None,\n incremental_authorization_details: None,\n authorizations: vec![],\n authentication: None,\n recurring_details,\n poll_config: None,\n tax_data: None,\n session_id: None,\n };\n\n let get_trackers_response = operations::GetTrackerResponse {\n operation: Box::new(self),\n customer_details: Some(customer_details),\n payment_data,\n business_profile,\n mandate_type,\n };\n\n Ok(get_trackers_response)\n }",
|
| 16 |
+
"after_code": "async fn get_trackers<'a>(\n &'a self,\n state: &'a SessionState,\n payment_id: &api::PaymentIdType,\n request: &api::PaymentsRequest,\n merchant_account: &domain::MerchantAccount,\n key_store: &domain::MerchantKeyStore,\n auth_flow: services::AuthFlow,\n header_payload: &hyperswitch_domain_models::payments::HeaderPayload,\n ) -> RouterResult<operations::GetTrackerResponse<'a, F, api::PaymentsRequest, PaymentData<F>>>\n {\n let key_manager_state = &state.into();\n\n let merchant_id = merchant_account.get_id();\n let storage_scheme = merchant_account.storage_scheme;\n let (currency, amount);\n\n let payment_id = payment_id\n .get_payment_intent_id()\n .change_context(errors::ApiErrorResponse::PaymentNotFound)?;\n\n // Stage 1\n let store = &*state.store;\n let m_merchant_id = merchant_id.clone();\n\n // Parallel calls - level 0\n let mut payment_intent = store\n .find_payment_intent_by_payment_id_merchant_id(\n key_manager_state,\n &payment_id,\n &m_merchant_id,\n key_store,\n storage_scheme,\n )\n .await\n .to_not_found_response(errors::ApiErrorResponse::PaymentNotFound)?;\n\n if let Some(order_details) = &request.order_details {\n helpers::validate_order_details_amount(\n order_details.to_owned(),\n payment_intent.amount,\n false,\n )?;\n }\n\n helpers::validate_customer_access(&payment_intent, auth_flow, request)?;\n\n if [\n Some(common_enums::PaymentSource::Webhook),\n Some(common_enums::PaymentSource::ExternalAuthenticator),\n ]\n .contains(&header_payload.payment_confirm_source)\n {\n helpers::validate_payment_status_against_not_allowed_statuses(\n &payment_intent.status,\n &[\n storage_enums::IntentStatus::Cancelled,\n storage_enums::IntentStatus::Succeeded,\n storage_enums::IntentStatus::Processing,\n storage_enums::IntentStatus::RequiresCapture,\n storage_enums::IntentStatus::RequiresMerchantAction,\n ],\n \"confirm\",\n )?;\n } else {\n helpers::validate_payment_status_against_not_allowed_statuses(\n &payment_intent.status,\n &[\n storage_enums::IntentStatus::Cancelled,\n storage_enums::IntentStatus::Succeeded,\n storage_enums::IntentStatus::Processing,\n storage_enums::IntentStatus::RequiresCapture,\n storage_enums::IntentStatus::RequiresMerchantAction,\n storage_enums::IntentStatus::RequiresCustomerAction,\n ],\n \"confirm\",\n )?;\n }\n\n helpers::authenticate_client_secret(request.client_secret.as_ref(), &payment_intent)?;\n\n let customer_details = helpers::get_customer_details_from_request(request);\n\n // Stage 2\n let attempt_id = payment_intent.active_attempt.get_id();\n let profile_id = payment_intent\n .profile_id\n .clone()\n .get_required_value(\"profile_id\")\n .change_context(errors::ApiErrorResponse::InternalServerError)\n .attach_printable(\"'profile_id' not set in payment intent\")?;\n\n let store = state.store.clone();\n let key_manager_state_clone = key_manager_state.clone();\n let key_store_clone = key_store.clone();\n\n let business_profile_fut = tokio::spawn(\n async move {\n store\n .find_business_profile_by_profile_id(\n &key_manager_state_clone,\n &key_store_clone,\n &profile_id,\n )\n .map(|business_profile_result| {\n business_profile_result.to_not_found_response(\n errors::ApiErrorResponse::ProfileNotFound {\n id: profile_id.get_string_repr().to_owned(),\n },\n )\n })\n .await\n }\n .in_current_span(),\n );\n\n let store = state.store.clone();\n\n let m_payment_id = payment_intent.payment_id.clone();\n let m_merchant_id = merchant_id.clone();\n\n let payment_attempt_fut = tokio::spawn(\n async move {\n store\n .find_payment_attempt_by_payment_id_merchant_id_attempt_id(\n &m_payment_id,\n &m_merchant_id,\n attempt_id.as_str(),\n storage_scheme,\n )\n .map(|x| x.to_not_found_response(errors::ApiErrorResponse::PaymentNotFound))\n .await\n }\n .in_current_span(),\n );\n\n let m_merchant_id = merchant_id.clone();\n let m_request_shipping = request.shipping.clone();\n let m_payment_intent_shipping_address_id = payment_intent.shipping_address_id.clone();\n let m_payment_intent_payment_id = payment_intent.payment_id.clone();\n let m_customer_details_customer_id = customer_details.customer_id.clone();\n let m_payment_intent_customer_id = payment_intent.customer_id.clone();\n let m_key_store = key_store.clone();\n let session_state = state.clone();\n\n let shipping_address_fut = tokio::spawn(\n async move {\n helpers::create_or_update_address_for_payment_by_request(\n &session_state,\n m_request_shipping.as_ref(),\n m_payment_intent_shipping_address_id.as_deref(),\n &m_merchant_id,\n m_payment_intent_customer_id\n .as_ref()\n .or(m_customer_details_customer_id.as_ref()),\n &m_key_store,\n &m_payment_intent_payment_id,\n storage_scheme,\n )\n .await\n }\n .in_current_span(),\n );\n\n let m_merchant_id = merchant_id.clone();\n let m_request_billing = request.billing.clone();\n let m_customer_details_customer_id = customer_details.customer_id.clone();\n let m_payment_intent_customer_id = payment_intent.customer_id.clone();\n let m_payment_intent_billing_address_id = payment_intent.billing_address_id.clone();\n let m_payment_intent_payment_id = payment_intent.payment_id.clone();\n let m_key_store = key_store.clone();\n let session_state = state.clone();\n\n let billing_address_fut = tokio::spawn(\n async move {\n helpers::create_or_update_address_for_payment_by_request(\n &session_state,\n m_request_billing.as_ref(),\n m_payment_intent_billing_address_id.as_deref(),\n &m_merchant_id,\n m_payment_intent_customer_id\n .as_ref()\n .or(m_customer_details_customer_id.as_ref()),\n &m_key_store,\n &m_payment_intent_payment_id,\n storage_scheme,\n )\n .await\n }\n .in_current_span(),\n );\n\n let m_merchant_id = merchant_id.clone();\n let store = state.clone().store;\n let m_request_merchant_connector_details = request.merchant_connector_details.clone();\n\n let config_update_fut = tokio::spawn(\n async move {\n m_request_merchant_connector_details\n .async_map(|mcd| async {\n helpers::insert_merchant_connector_creds_to_config(\n store.as_ref(),\n &m_merchant_id,\n mcd,\n )\n .await\n })\n .map(|x| x.transpose())\n .await\n }\n .in_current_span(),\n );\n\n // Based on whether a retry can be performed or not, fetch relevant entities\n let (mut payment_attempt, shipping_address, billing_address, business_profile) =\n match payment_intent.status {\n api_models::enums::IntentStatus::RequiresCustomerAction\n | api_models::enums::IntentStatus::RequiresMerchantAction\n | api_models::enums::IntentStatus::RequiresPaymentMethod\n | api_models::enums::IntentStatus::RequiresConfirmation => {\n // Normal payment\n // Parallel calls - level 1\n let (payment_attempt, shipping_address, billing_address, business_profile, _) =\n tokio::try_join!(\n utils::flatten_join_error(payment_attempt_fut),\n utils::flatten_join_error(shipping_address_fut),\n utils::flatten_join_error(billing_address_fut),\n utils::flatten_join_error(business_profile_fut),\n utils::flatten_join_error(config_update_fut)\n )?;\n\n (\n payment_attempt,\n shipping_address,\n billing_address,\n business_profile,\n )\n }\n _ => {\n // Retry payment\n let (\n mut payment_attempt,\n shipping_address,\n billing_address,\n business_profile,\n _,\n ) = tokio::try_join!(\n utils::flatten_join_error(payment_attempt_fut),\n utils::flatten_join_error(shipping_address_fut),\n utils::flatten_join_error(billing_address_fut),\n utils::flatten_join_error(business_profile_fut),\n utils::flatten_join_error(config_update_fut)\n )?;\n\n let attempt_type = helpers::get_attempt_type(\n &payment_intent,\n &payment_attempt,\n request,\n \"confirm\",\n )?;\n\n // 3\n (payment_intent, payment_attempt) = attempt_type\n .modify_payment_intent_and_payment_attempt(\n request,\n payment_intent,\n payment_attempt,\n state,\n key_store,\n storage_scheme,\n )\n .await?;\n\n (\n payment_attempt,\n shipping_address,\n billing_address,\n business_profile,\n )\n }\n };\n\n payment_intent.order_details = request\n .get_order_details_as_value()\n .change_context(errors::ApiErrorResponse::InternalServerError)\n .attach_printable(\"Failed to convert order details to value\")?\n .or(payment_intent.order_details);\n\n payment_intent.setup_future_usage = request\n .setup_future_usage\n .or(payment_intent.setup_future_usage);\n\n payment_intent.psd2_sca_exemption_type = request\n .psd2_sca_exemption_type\n .or(payment_intent.psd2_sca_exemption_type);\n\n let browser_info = request\n .browser_info\n .clone()\n .or(payment_attempt.browser_info)\n .as_ref()\n .map(Encode::encode_to_value)\n .transpose()\n .change_context(errors::ApiErrorResponse::InvalidDataValue {\n field_name: \"browser_info\",\n })?;\n let customer_acceptance = request.customer_acceptance.clone().or(payment_attempt\n .customer_acceptance\n .clone()\n .map(|customer_acceptance| {\n customer_acceptance\n .expose()\n .parse_value(\"CustomerAcceptance\")\n .change_context(errors::ApiErrorResponse::InternalServerError)\n .attach_printable(\"Failed while deserializing customer_acceptance\")\n })\n .transpose()?);\n\n let recurring_details = request.recurring_details.clone();\n\n helpers::validate_card_data(\n request\n .payment_method_data\n .as_ref()\n .and_then(|pmd| pmd.payment_method_data.clone()),\n )?;\n\n payment_attempt.browser_info = browser_info;\n\n payment_attempt.payment_experience = request\n .payment_experience\n .or(payment_attempt.payment_experience);\n\n payment_attempt.capture_method = request.capture_method.or(payment_attempt.capture_method);\n\n payment_attempt.customer_acceptance = request\n .customer_acceptance\n .clone()\n .map(|customer_acceptance| customer_acceptance.encode_to_value())\n .transpose()\n .change_context(errors::ApiErrorResponse::InternalServerError)\n .attach_printable(\"Failed while encoding customer_acceptance to value\")?\n .map(masking::Secret::new)\n .or(payment_attempt.customer_acceptance);\n\n currency = payment_attempt.currency.get_required_value(\"currency\")?;\n amount = payment_attempt.get_total_amount().into();\n\n helpers::validate_customer_id_mandatory_cases(\n request.setup_future_usage.is_some(),\n payment_intent\n .customer_id\n .as_ref()\n .or(customer_details.customer_id.as_ref()),\n )?;\n\n let creds_identifier = request\n .merchant_connector_details\n .as_ref()\n .map(|mcd| mcd.creds_identifier.to_owned());\n\n payment_intent.shipping_address_id =\n shipping_address.as_ref().map(|i| i.address_id.clone());\n payment_intent.billing_address_id = billing_address.as_ref().map(|i| i.address_id.clone());\n payment_intent.return_url = request\n .return_url\n .as_ref()\n .map(|a| a.to_string())\n .or(payment_intent.return_url);\n\n payment_intent.allowed_payment_method_types = request\n .get_allowed_payment_method_types_as_value()\n .change_context(errors::ApiErrorResponse::InternalServerError)\n .attach_printable(\"Error converting allowed_payment_types to Value\")?\n .or(payment_intent.allowed_payment_method_types);\n\n payment_intent.connector_metadata = request\n .get_connector_metadata_as_value()\n .change_context(errors::ApiErrorResponse::InternalServerError)\n .attach_printable(\"Error converting connector_metadata to Value\")?\n .or(payment_intent.connector_metadata);\n\n payment_intent.feature_metadata = request\n .get_feature_metadata_as_value()\n .change_context(errors::ApiErrorResponse::InternalServerError)\n .attach_printable(\"Error converting feature_metadata to Value\")?\n .or(payment_intent.feature_metadata);\n payment_intent.metadata = request.metadata.clone().or(payment_intent.metadata);\n payment_intent.frm_metadata = request.frm_metadata.clone().or(payment_intent.frm_metadata);\n payment_intent.request_incremental_authorization = request\n .request_incremental_authorization\n .map(|request_incremental_authorization| {\n core_utils::get_request_incremental_authorization_value(\n Some(request_incremental_authorization),\n payment_attempt.capture_method,\n )\n })\n .unwrap_or(Ok(payment_intent.request_incremental_authorization))?;\n payment_attempt.business_sub_label = request\n .business_sub_label\n .clone()\n .or(payment_attempt.business_sub_label);\n\n let n_request_payment_method_data = request\n .payment_method_data\n .as_ref()\n .and_then(|pmd| pmd.payment_method_data.clone());\n\n let store = state.clone().store;\n let profile_id = payment_intent\n .profile_id\n .clone()\n .get_required_value(\"profile_id\")\n .change_context(errors::ApiErrorResponse::InternalServerError)\n .attach_printable(\"'profile_id' not set in payment intent\")?;\n\n let additional_pm_data_fut = tokio::spawn(\n async move {\n Ok(n_request_payment_method_data\n .async_map(|payment_method_data| async move {\n helpers::get_additional_payment_data(\n &payment_method_data.into(),\n store.as_ref(),\n &profile_id,\n )\n .await\n })\n .await)\n }\n .in_current_span(),\n );\n\n let n_payment_method_billing_address_id =\n payment_attempt.payment_method_billing_address_id.clone();\n let n_request_payment_method_billing_address = request\n .payment_method_data\n .as_ref()\n .and_then(|pmd| pmd.billing.clone());\n let m_payment_intent_customer_id = payment_intent.customer_id.clone();\n let m_payment_intent_payment_id = payment_intent.payment_id.clone();\n let m_key_store = key_store.clone();\n let m_customer_details_customer_id = customer_details.customer_id.clone();\n let m_merchant_id = merchant_id.clone();\n let session_state = state.clone();\n\n let payment_method_billing_future = tokio::spawn(\n async move {\n helpers::create_or_update_address_for_payment_by_request(\n &session_state,\n n_request_payment_method_billing_address.as_ref(),\n n_payment_method_billing_address_id.as_deref(),\n &m_merchant_id,\n m_payment_intent_customer_id\n .as_ref()\n .or(m_customer_details_customer_id.as_ref()),\n &m_key_store,\n &m_payment_intent_payment_id,\n storage_scheme,\n )\n .await\n }\n .in_current_span(),\n );\n\n let mandate_type = m_helpers::get_mandate_type(\n request.mandate_data.clone(),\n request.off_session,\n payment_intent.setup_future_usage,\n request.customer_acceptance.clone(),\n request.payment_token.clone(),\n payment_attempt.payment_method.or(request.payment_method),\n )\n .change_context(errors::ApiErrorResponse::MandateValidationFailed {\n reason: \"Expected one out of recurring_details and mandate_data but got both\".into(),\n })?;\n\n let m_state = state.clone();\n let m_mandate_type = mandate_type;\n let m_merchant_account = merchant_account.clone();\n let m_request = request.clone();\n let m_key_store = key_store.clone();\n\n let payment_intent_customer_id = payment_intent.customer_id.clone();\n\n let mandate_details_fut = tokio::spawn(\n async move {\n Box::pin(helpers::get_token_pm_type_mandate_details(\n &m_state,\n &m_request,\n m_mandate_type,\n &m_merchant_account,\n &m_key_store,\n None,\n payment_intent_customer_id.as_ref(),\n ))\n .await\n }\n .in_current_span(),\n );\n\n // Parallel calls - level 2\n let (mandate_details, additional_pm_info, payment_method_billing) = tokio::try_join!(\n utils::flatten_join_error(mandate_details_fut),\n utils::flatten_join_error(additional_pm_data_fut),\n utils::flatten_join_error(payment_method_billing_future),\n )?;\n\n let additional_pm_data = additional_pm_info.transpose()?.flatten();\n\n let m_helpers::MandateGenericData {\n token,\n payment_method,\n payment_method_type,\n mandate_data,\n recurring_mandate_payment_data,\n mandate_connector,\n payment_method_info,\n } = mandate_details;\n\n let token = token.or_else(|| payment_attempt.payment_token.clone());\n\n helpers::validate_pm_or_token_given(\n &request.payment_method,\n &request\n .payment_method_data\n .as_ref()\n .and_then(|pmd| pmd.payment_method_data.clone()),\n &request.payment_method_type,\n &mandate_type,\n &token,\n )?;\n\n let (token_data, payment_method_info) = if let Some(token) = token.clone() {\n let token_data = helpers::retrieve_payment_token_data(\n state,\n token,\n payment_method.or(payment_attempt.payment_method),\n )\n .await?;\n\n let payment_method_info = helpers::retrieve_payment_method_from_db_with_token_data(\n state,\n key_store,\n &token_data,\n storage_scheme,\n )\n .await?;\n\n (Some(token_data), payment_method_info)\n } else {\n (None, payment_method_info)\n };\n let additional_pm_data_from_locker = if let Some(ref pm) = payment_method_info {\n let card_detail_from_locker: Option<api::CardDetailFromLocker> = pm\n .payment_method_data\n .clone()\n .map(|x| x.into_inner().expose())\n .and_then(|v| {\n v.parse_value(\"PaymentMethodsData\")\n .map_err(|err| {\n router_env::logger::info!(\n \"PaymentMethodsData deserialization failed: {:?}\",\n err\n )\n })\n .ok()\n })\n .and_then(|pmd| match pmd {\n PaymentMethodsData::Card(crd) => Some(api::CardDetailFromLocker::from(crd)),\n _ => None,\n });\n card_detail_from_locker.map(|card_details| {\n let additional_data = card_details.into();\n api_models::payments::AdditionalPaymentData::Card(Box::new(additional_data))\n })\n } else {\n None\n };\n payment_attempt.payment_method_data = additional_pm_data_from_locker\n .as_ref()\n .map(Encode::encode_to_value)\n .transpose()\n .change_context(errors::ApiErrorResponse::InternalServerError)\n .attach_printable(\"Failed to encode additional pm data\")?;\n\n payment_attempt.payment_method = payment_method.or(payment_attempt.payment_method);\n\n let payment_method_type = Option::<api_models::enums::PaymentMethodType>::foreign_from((\n payment_method_type,\n additional_pm_data.as_ref(),\n ));\n\n payment_attempt.payment_method_type = payment_method_type\n .or(payment_attempt.payment_method_type)\n .or(payment_method_info\n .as_ref()\n .and_then(|pm_info| pm_info.get_payment_method_subtype()));\n\n // The operation merges mandate data from both request and payment_attempt\n let setup_mandate = mandate_data.map(|mut sm| {\n sm.mandate_type = payment_attempt.mandate_details.clone().or(sm.mandate_type);\n sm.update_mandate_id = payment_attempt\n .mandate_data\n .clone()\n .and_then(|mandate| mandate.update_mandate_id)\n .or(sm.update_mandate_id);\n sm\n });\n\n let mandate_details_present =\n payment_attempt.mandate_details.is_some() || request.mandate_data.is_some();\n helpers::validate_mandate_data_and_future_usage(\n payment_intent.setup_future_usage,\n mandate_details_present,\n )?;\n\n let payment_method_data_after_card_bin_call = request\n .payment_method_data\n .as_ref()\n .and_then(|request_payment_method_data| {\n request_payment_method_data.payment_method_data.as_ref()\n })\n .zip(additional_pm_data)\n .map(|(payment_method_data, additional_payment_data)| {\n payment_method_data.apply_additional_payment_data(additional_payment_data)\n })\n .transpose()\n .change_context(errors::ApiErrorResponse::InternalServerError)\n .attach_printable(\"Card cobadge check failed due to an invalid card network regex\")?;\n\n payment_attempt.payment_method_billing_address_id = payment_method_billing\n .as_ref()\n .map(|payment_method_billing| payment_method_billing.address_id.clone());\n\n let address = PaymentAddress::new(\n shipping_address.as_ref().map(From::from),\n billing_address.as_ref().map(From::from),\n payment_method_billing.as_ref().map(From::from),\n business_profile.use_billing_as_payment_method_billing,\n );\n\n let payment_method_data_billing = request\n .payment_method_data\n .as_ref()\n .and_then(|pmd| pmd.payment_method_data.as_ref())\n .and_then(|payment_method_data_billing| {\n payment_method_data_billing.get_billing_address()\n });\n\n // validate billing name for card holder name\n helpers::validate_billing_name(\n payment_method_data_billing\n .as_ref()\n .and_then(|billing| billing.address.as_ref())\n .or(request\n .billing\n .as_ref()\n .and_then(|billing| billing.address.as_ref())),\n )?;\n\n let unified_address =\n address.unify_with_payment_method_data_billing(payment_method_data_billing);\n\n // If processor_payment_token is passed in request then populating the same in PaymentData\n let mandate_id = request\n .recurring_details\n .as_ref()\n .and_then(|recurring_details| match recurring_details {\n api_models::mandates::RecurringDetails::ProcessorPaymentToken(token) => {\n payment_intent.is_payment_processor_token_flow = Some(true);\n Some(api_models::payments::MandateIds {\n mandate_id: None,\n mandate_reference_id: Some(\n api_models::payments::MandateReferenceId::ConnectorMandateId(\n ConnectorMandateReferenceId::new(\n Some(token.processor_payment_token.clone()), // connector_mandate_id\n None, // payment_method_id\n None, // update_history\n None, // mandate_metadata\n None, // connector_mandate_request_reference_id\n ),\n ),\n ),\n })\n }\n _ => None,\n });\n\n let pmt_order_tax_amount = payment_intent.tax_details.clone().and_then(|tax| {\n if tax.payment_method_type.clone().map(|a| a.pmt) == payment_attempt.payment_method_type\n {\n tax.payment_method_type.map(|a| a.order_tax_amount)\n } else {\n None\n }\n });\n\n let order_tax_amount = pmt_order_tax_amount.or_else(|| {\n payment_intent\n .tax_details\n .clone()\n .and_then(|tax| tax.default.map(|a| a.order_tax_amount))\n });\n\n payment_attempt\n .net_amount\n .set_order_tax_amount(order_tax_amount);\n\n payment_attempt.connector_mandate_detail = Some(\n DieselConnectorMandateReferenceId::foreign_from(ConnectorMandateReferenceId::new(\n None,\n None,\n None, // update_history\n None, // mandate_metadata\n Some(common_utils::generate_id_with_len(\n consts::CONNECTOR_MANDATE_REQUEST_REFERENCE_ID_LENGTH.to_owned(),\n )), // connector_mandate_request_reference_id\n )),\n );\n let payment_data = PaymentData {\n flow: PhantomData,\n payment_intent,\n payment_attempt,\n currency,\n amount,\n email: request.email.clone(),\n mandate_id: mandate_id.clone(),\n mandate_connector,\n setup_mandate,\n customer_acceptance: customer_acceptance.map(From::from),\n token,\n address: unified_address,\n token_data,\n confirm: request.confirm,\n payment_method_data: payment_method_data_after_card_bin_call.map(Into::into),\n payment_method_info,\n force_sync: None,\n refunds: vec![],\n disputes: vec![],\n attempts: None,\n sessions_token: vec![],\n card_cvc: request.card_cvc.clone(),\n creds_identifier,\n pm_token: None,\n connector_customer_id: None,\n recurring_mandate_payment_data,\n ephemeral_key: None,\n multiple_capture_data: None,\n redirect_response: None,\n surcharge_details: None,\n frm_message: None,\n payment_link_data: None,\n incremental_authorization_details: None,\n authorizations: vec![],\n authentication: None,\n recurring_details,\n poll_config: None,\n tax_data: None,\n session_id: None,\n };\n\n let get_trackers_response = operations::GetTrackerResponse {\n operation: Box::new(self),\n customer_details: Some(customer_details),\n payment_data,\n business_profile,\n mandate_type,\n };\n\n Ok(get_trackers_response)\n }",
|
| 17 |
+
"diff_span": {
|
| 18 |
+
"before": " )?;\n\n // validate billing name for card holder name\n helpers::validate_billing_name(\n request\n .billing\n .as_ref()\n .and_then(|billing| billing.address.as_ref()),\n )?;\n\n payment_attempt.browser_info = browser_info;\n",
|
| 19 |
+
"after": " });\n\n // validate billing name for card holder name\n helpers::validate_billing_name(\n payment_method_data_billing\n .as_ref()\n .and_then(|billing| billing.address.as_ref())\n .or(request\n .billing\n .as_ref()\n .and_then(|billing| billing.address.as_ref())),\n )?;\n\n let unified_address =\n address.unify_with_payment_method_data_billing(payment_method_data_billing);"
|
| 20 |
+
},
|
| 21 |
+
"commit_sha": "0793d2b0f131bb3cec43a7423b9ef630632e403f"
|
| 22 |
+
}
|
| 23 |
+
]
|
| 24 |
+
}
|
diffs/pr_6734/0a3d671/diff.json
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
diffs/pr_6734/4ead56c/diff.json
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
diffs/pr_6734/5199422/diff.json
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
diffs/pr_6734/5d6f6eb/diff.json
ADDED
|
@@ -0,0 +1,53 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "5d6f6eb08bb719a919a706349752a5e92e3570d7",
|
| 3 |
+
"pr_number": 6734,
|
| 4 |
+
"rust_files": [
|
| 5 |
+
"crates/common_utils/src/types.rs",
|
| 6 |
+
"crates/router/src/core/payment_methods.rs"
|
| 7 |
+
],
|
| 8 |
+
"diffs": [
|
| 9 |
+
{
|
| 10 |
+
"id": "crates/common_utils/src/types.rs::NameType::function::try_from",
|
| 11 |
+
"file": "crates/common_utils/src/types.rs",
|
| 12 |
+
"kind": "function_item",
|
| 13 |
+
"status": "modified",
|
| 14 |
+
"code_changed": true,
|
| 15 |
+
"imports_changed": true,
|
| 16 |
+
"before_code": "fn try_from(card_holder_name: Option<masking::Secret<String>>) -> Result<Self, Self::Error> {\n match card_holder_name {\n Some(card_holder_name) => Self::try_from(card_holder_name),\n None => Err(report!(ValidationError::MissingRequiredField {\n field_name: \"card holder name \".to_string()\n })),\n }\n }",
|
| 17 |
+
"after_code": "fn try_from(masked_card_holder_name: masking::Secret<String>) -> Result<Self, Self::Error> {\n Self::try_from(masked_card_holder_name.expose())\n }",
|
| 18 |
+
"diff_span": {
|
| 19 |
+
"before": "fn try_from(card_holder_name: Option<masking::Secret<String>>) -> Result<Self, Self::Error> {\n match card_holder_name {\n Some(card_holder_name) => Self::try_from(card_holder_name),\n None => Err(report!(ValidationError::MissingRequiredField {\n field_name: \"card holder name \".to_string()\n })),\n }\n }",
|
| 20 |
+
"after": "fn try_from(masked_card_holder_name: masking::Secret<String>) -> Result<Self, Self::Error> {\n Self::try_from(masked_card_holder_name.expose())\n }"
|
| 21 |
+
},
|
| 22 |
+
"commit_sha": "5d6f6eb08bb719a919a706349752a5e92e3570d7",
|
| 23 |
+
"before_imports": [
|
| 24 |
+
"use thiserror::Error;",
|
| 25 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 26 |
+
"pub use primitive_wrappers::bool_wrappers::{\n AlwaysRequestExtendedAuthorization, ExtendedAuthorizationAppliedBool,\n RequestExtendedAuthorizationBool,\n};",
|
| 27 |
+
"use error_stack::{report, ResultExt};",
|
| 28 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};"
|
| 29 |
+
],
|
| 30 |
+
"after_imports": [
|
| 31 |
+
"use thiserror::Error;",
|
| 32 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 33 |
+
"pub use primitive_wrappers::bool_wrappers::{\n AlwaysRequestExtendedAuthorization, ExtendedAuthorizationAppliedBool,\n RequestExtendedAuthorizationBool,\n};",
|
| 34 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};"
|
| 35 |
+
]
|
| 36 |
+
},
|
| 37 |
+
{
|
| 38 |
+
"id": "crates/router/src/core/payment_methods.rs::function::get_payment_method_create_request",
|
| 39 |
+
"file": "crates/router/src/core/payment_methods.rs",
|
| 40 |
+
"kind": "function_item",
|
| 41 |
+
"status": "modified",
|
| 42 |
+
"code_changed": true,
|
| 43 |
+
"imports_changed": false,
|
| 44 |
+
"before_code": "pub(crate) async fn get_payment_method_create_request(\n payment_method_data: Option<&domain::PaymentMethodData>,\n payment_method: Option<storage_enums::PaymentMethod>,\n payment_method_type: Option<storage_enums::PaymentMethodType>,\n customer_id: &Option<id_type::CustomerId>,\n billing_name: Option<Secret<String>>,\n payment_method_billing_address: Option<&hyperswitch_domain_models::address::Address>,\n) -> RouterResult<payment_methods::PaymentMethodCreate> {\n match payment_method_data {\n Some(pm_data) => match payment_method {\n Some(payment_method) => match pm_data {\n domain::PaymentMethodData::Card(card) => {\n let card_detail = payment_methods::CardDetail {\n card_number: card.card_number.clone(),\n card_exp_month: card.card_exp_month.clone(),\n card_exp_year: card.card_exp_year.clone(),\n card_holder_name: card.card_holder_name.clone().or(Some(\n common_utils::types::NameType::try_from(billing_name).change_context(\n errors::ApiErrorResponse::InvalidDataValue {\n field_name: \"card_holder_name\",\n },\n )?,\n )),\n nick_name: card.nick_name.clone(),\n card_issuing_country: card.card_issuing_country.clone(),\n card_network: card.card_network.clone(),\n card_issuer: card.card_issuer.clone(),\n card_type: card.card_type.clone(),\n };\n let payment_method_request = payment_methods::PaymentMethodCreate {\n payment_method: Some(payment_method),\n payment_method_type,\n payment_method_issuer: card.card_issuer.clone(),\n payment_method_issuer_code: None,\n #[cfg(feature = \"payouts\")]\n bank_transfer: None,\n #[cfg(feature = \"payouts\")]\n wallet: None,\n card: Some(card_detail),\n metadata: None,\n customer_id: customer_id.clone(),\n card_network: card\n .card_network\n .as_ref()\n .map(|card_network| card_network.to_string()),\n client_secret: None,\n payment_method_data: None,\n //TODO: why are we using api model in router internally\n billing: payment_method_billing_address.cloned().map(From::from),\n connector_mandate_details: None,\n network_transaction_id: None,\n };\n Ok(payment_method_request)\n }\n _ => {\n let payment_method_request = payment_methods::PaymentMethodCreate {\n payment_method: Some(payment_method),\n payment_method_type,\n payment_method_issuer: None,\n payment_method_issuer_code: None,\n #[cfg(feature = \"payouts\")]\n bank_transfer: None,\n #[cfg(feature = \"payouts\")]\n wallet: None,\n card: None,\n metadata: None,\n customer_id: customer_id.clone(),\n card_network: None,\n client_secret: None,\n payment_method_data: None,\n billing: None,\n connector_mandate_details: None,\n network_transaction_id: None,\n };\n\n Ok(payment_method_request)\n }\n },\n None => Err(report!(errors::ApiErrorResponse::MissingRequiredField {\n field_name: \"payment_method_type\"\n })\n .attach_printable(\"PaymentMethodType Required\")),\n },\n None => Err(report!(errors::ApiErrorResponse::MissingRequiredField {\n field_name: \"payment_method_data\"\n })\n .attach_printable(\"PaymentMethodData required Or Card is already saved\")),\n }\n}",
|
| 45 |
+
"after_code": "pub(crate) async fn get_payment_method_create_request(\n payment_method_data: Option<&domain::PaymentMethodData>,\n payment_method: Option<storage_enums::PaymentMethod>,\n payment_method_type: Option<storage_enums::PaymentMethodType>,\n customer_id: &Option<id_type::CustomerId>,\n billing_name: Option<Secret<String>>,\n payment_method_billing_address: Option<&hyperswitch_domain_models::address::Address>,\n) -> RouterResult<payment_methods::PaymentMethodCreate> {\n match payment_method_data {\n Some(pm_data) => match payment_method {\n Some(payment_method) => match pm_data {\n domain::PaymentMethodData::Card(card) => {\n let card_detail = payment_methods::CardDetail {\n card_number: card.card_number.clone(),\n card_exp_month: card.card_exp_month.clone(),\n card_exp_year: card.card_exp_year.clone(),\n card_holder_name: card.card_holder_name.clone().or(billing_name\n .map(common_utils::types::NameType::get_unchecked_from_secret)), // this is unchecked because billing name is coming from a checked type\n nick_name: card.nick_name.clone(),\n card_issuing_country: card.card_issuing_country.clone(),\n card_network: card.card_network.clone(),\n card_issuer: card.card_issuer.clone(),\n card_type: card.card_type.clone(),\n };\n let payment_method_request = payment_methods::PaymentMethodCreate {\n payment_method: Some(payment_method),\n payment_method_type,\n payment_method_issuer: card.card_issuer.clone(),\n payment_method_issuer_code: None,\n #[cfg(feature = \"payouts\")]\n bank_transfer: None,\n #[cfg(feature = \"payouts\")]\n wallet: None,\n card: Some(card_detail),\n metadata: None,\n customer_id: customer_id.clone(),\n card_network: card\n .card_network\n .as_ref()\n .map(|card_network| card_network.to_string()),\n client_secret: None,\n payment_method_data: None,\n //TODO: why are we using api model in router internally\n billing: payment_method_billing_address.cloned().map(From::from),\n connector_mandate_details: None,\n network_transaction_id: None,\n };\n Ok(payment_method_request)\n }\n _ => {\n let payment_method_request = payment_methods::PaymentMethodCreate {\n payment_method: Some(payment_method),\n payment_method_type,\n payment_method_issuer: None,\n payment_method_issuer_code: None,\n #[cfg(feature = \"payouts\")]\n bank_transfer: None,\n #[cfg(feature = \"payouts\")]\n wallet: None,\n card: None,\n metadata: None,\n customer_id: customer_id.clone(),\n card_network: None,\n client_secret: None,\n payment_method_data: None,\n billing: None,\n connector_mandate_details: None,\n network_transaction_id: None,\n };\n\n Ok(payment_method_request)\n }\n },\n None => Err(report!(errors::ApiErrorResponse::MissingRequiredField {\n field_name: \"payment_method_type\"\n })\n .attach_printable(\"PaymentMethodType Required\")),\n },\n None => Err(report!(errors::ApiErrorResponse::MissingRequiredField {\n field_name: \"payment_method_data\"\n })\n .attach_printable(\"PaymentMethodData required Or Card is already saved\")),\n }\n}",
|
| 46 |
+
"diff_span": {
|
| 47 |
+
"before": " card_exp_month: card.card_exp_month.clone(),\n card_exp_year: card.card_exp_year.clone(),\n card_holder_name: card.card_holder_name.clone().or(Some(\n common_utils::types::NameType::try_from(billing_name).change_context(\n errors::ApiErrorResponse::InvalidDataValue {\n field_name: \"card_holder_name\",\n },\n )?,\n )),\n nick_name: card.nick_name.clone(),\n card_issuing_country: card.card_issuing_country.clone(),",
|
| 48 |
+
"after": " card_exp_month: card.card_exp_month.clone(),\n card_exp_year: card.card_exp_year.clone(),\n card_holder_name: card.card_holder_name.clone().or(billing_name\n .map(common_utils::types::NameType::get_unchecked_from_secret)), // this is unchecked because billing name is coming from a checked type\n nick_name: card.nick_name.clone(),\n card_issuing_country: card.card_issuing_country.clone(),"
|
| 49 |
+
},
|
| 50 |
+
"commit_sha": "5d6f6eb08bb719a919a706349752a5e92e3570d7"
|
| 51 |
+
}
|
| 52 |
+
]
|
| 53 |
+
}
|
diffs/pr_6734/62b63b6/diff.json
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
diffs/pr_6734/7aef96e/diff.json
ADDED
|
@@ -0,0 +1,556 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "7aef96ea7ee2604acf7c36a63d1a73d093c14b70",
|
| 3 |
+
"pr_number": 6734,
|
| 4 |
+
"rust_files": [
|
| 5 |
+
"crates/common_utils/src/types.rs"
|
| 6 |
+
],
|
| 7 |
+
"diffs": [
|
| 8 |
+
{
|
| 9 |
+
"id": "crates/common_utils/src/types.rs::ClientSecret::function::from_sql",
|
| 10 |
+
"file": "crates/common_utils/src/types.rs",
|
| 11 |
+
"kind": "function_item",
|
| 12 |
+
"status": "modified",
|
| 13 |
+
"code_changed": false,
|
| 14 |
+
"imports_changed": true,
|
| 15 |
+
"before_code": "fn from_sql(value: DB::RawValue<'_>) -> deserialize::Result<Self> {\n let string_repr = String::from_sql(value)?;\n let (payment_id, secret) =\n string_repr\n .rsplit_once(\"_secret_\")\n .ok_or(ParsingError::EncodeError(\n \"Expected a string in the format '{payment_id}_secret_{secret}'\",\n ))?;\n\n let payment_id = id_type::GlobalPaymentId::try_from(Cow::Owned(payment_id.to_owned()))\n .map_err(|err| {\n logger::error!(global_payment_id_error=?err);\n ParsingError::EncodeError(\"Error while constructing GlobalPaymentId\")\n })?;\n\n Ok(Self {\n payment_id,\n secret: masking::Secret::new(secret.to_owned()),\n })\n }",
|
| 16 |
+
"after_code": "fn from_sql(value: DB::RawValue<'_>) -> deserialize::Result<Self> {\n let string_repr = String::from_sql(value)?;\n let (payment_id, secret) =\n string_repr\n .rsplit_once(\"_secret_\")\n .ok_or(ParsingError::EncodeError(\n \"Expected a string in the format '{payment_id}_secret_{secret}'\",\n ))?;\n\n let payment_id = id_type::GlobalPaymentId::try_from(Cow::Owned(payment_id.to_owned()))\n .map_err(|err| {\n logger::error!(global_payment_id_error=?err);\n ParsingError::EncodeError(\"Error while constructing GlobalPaymentId\")\n })?;\n\n Ok(Self {\n payment_id,\n secret: masking::Secret::new(secret.to_owned()),\n })\n }",
|
| 17 |
+
"diff_span": {
|
| 18 |
+
"before": "",
|
| 19 |
+
"after": ""
|
| 20 |
+
},
|
| 21 |
+
"commit_sha": "7aef96ea7ee2604acf7c36a63d1a73d093c14b70",
|
| 22 |
+
"before_imports": [
|
| 23 |
+
"use masking::{ExposeInterface, PeekInterface, Secret};",
|
| 24 |
+
"use thiserror::Error;",
|
| 25 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 26 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};",
|
| 27 |
+
"use crate::id_type::GlobalPaymentId;",
|
| 28 |
+
"use crate::id_type;",
|
| 29 |
+
"use router_env::logger;"
|
| 30 |
+
],
|
| 31 |
+
"after_imports": [
|
| 32 |
+
"use thiserror::Error;",
|
| 33 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 34 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};",
|
| 35 |
+
"use crate::id_type::GlobalPaymentId;",
|
| 36 |
+
"use crate::id_type;",
|
| 37 |
+
"use router_env::logger;"
|
| 38 |
+
]
|
| 39 |
+
},
|
| 40 |
+
{
|
| 41 |
+
"id": "crates/common_utils/src/types.rs::ClientSecret::function::new",
|
| 42 |
+
"file": "crates/common_utils/src/types.rs",
|
| 43 |
+
"kind": "function_item",
|
| 44 |
+
"status": "modified",
|
| 45 |
+
"code_changed": false,
|
| 46 |
+
"imports_changed": true,
|
| 47 |
+
"before_code": "pub(crate) fn new(payment_id: id_type::GlobalPaymentId, secret: String) -> Self {\n Self {\n payment_id,\n secret: masking::Secret::new(secret),\n }\n }",
|
| 48 |
+
"after_code": "pub(crate) fn new(payment_id: id_type::GlobalPaymentId, secret: String) -> Self {\n Self {\n payment_id,\n secret: masking::Secret::new(secret),\n }\n }",
|
| 49 |
+
"diff_span": {
|
| 50 |
+
"before": "",
|
| 51 |
+
"after": ""
|
| 52 |
+
},
|
| 53 |
+
"commit_sha": "7aef96ea7ee2604acf7c36a63d1a73d093c14b70",
|
| 54 |
+
"before_imports": [
|
| 55 |
+
"use masking::{ExposeInterface, PeekInterface, Secret};",
|
| 56 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 57 |
+
"use crate::id_type::GlobalPaymentId;",
|
| 58 |
+
"use crate::id_type;",
|
| 59 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};"
|
| 60 |
+
],
|
| 61 |
+
"after_imports": [
|
| 62 |
+
"use crate::id_type;",
|
| 63 |
+
"use crate::id_type::GlobalPaymentId;",
|
| 64 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 65 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};"
|
| 66 |
+
]
|
| 67 |
+
},
|
| 68 |
+
{
|
| 69 |
+
"id": "crates/common_utils/src/types.rs::NameType::function::try_from",
|
| 70 |
+
"file": "crates/common_utils/src/types.rs",
|
| 71 |
+
"kind": "function_item",
|
| 72 |
+
"status": "modified",
|
| 73 |
+
"code_changed": true,
|
| 74 |
+
"imports_changed": true,
|
| 75 |
+
"before_code": "fn try_from(masked_card_holder_name: Secret<String>) -> Result<Self, Self::Error> {\n Self::try_from(masked_card_holder_name.expose())\n }",
|
| 76 |
+
"after_code": "fn try_from(masked_card_holder_name: masking::Secret<String>) -> Result<Self, Self::Error> {\n Self::try_from(masked_card_holder_name.expose())\n }",
|
| 77 |
+
"diff_span": {
|
| 78 |
+
"before": "fn try_from(masked_card_holder_name: Secret<String>) -> Result<Self, Self::Error> {\n Self::try_from(masked_card_holder_name.expose())\n }",
|
| 79 |
+
"after": "fn try_from(masked_card_holder_name: masking::Secret<String>) -> Result<Self, Self::Error> {\n Self::try_from(masked_card_holder_name.expose())\n }"
|
| 80 |
+
},
|
| 81 |
+
"commit_sha": "7aef96ea7ee2604acf7c36a63d1a73d093c14b70",
|
| 82 |
+
"before_imports": [
|
| 83 |
+
"use masking::{ExposeInterface, PeekInterface, Secret};",
|
| 84 |
+
"use thiserror::Error;",
|
| 85 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 86 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};"
|
| 87 |
+
],
|
| 88 |
+
"after_imports": [
|
| 89 |
+
"use thiserror::Error;",
|
| 90 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 91 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};"
|
| 92 |
+
]
|
| 93 |
+
},
|
| 94 |
+
{
|
| 95 |
+
"id": "crates/common_utils/src/types.rs::ClientSecret::struct::ClientSecretVisitor",
|
| 96 |
+
"file": "crates/common_utils/src/types.rs",
|
| 97 |
+
"kind": "struct_item",
|
| 98 |
+
"status": "modified",
|
| 99 |
+
"code_changed": false,
|
| 100 |
+
"imports_changed": true,
|
| 101 |
+
"before_code": "struct ClientSecretVisitor;",
|
| 102 |
+
"after_code": "struct ClientSecretVisitor;",
|
| 103 |
+
"diff_span": {
|
| 104 |
+
"before": "",
|
| 105 |
+
"after": ""
|
| 106 |
+
},
|
| 107 |
+
"commit_sha": "7aef96ea7ee2604acf7c36a63d1a73d093c14b70",
|
| 108 |
+
"before_imports": [
|
| 109 |
+
"use masking::{ExposeInterface, PeekInterface, Secret};",
|
| 110 |
+
"pub use client_secret_type::ClientSecret;",
|
| 111 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 112 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};"
|
| 113 |
+
],
|
| 114 |
+
"after_imports": [
|
| 115 |
+
"pub use client_secret_type::ClientSecret;",
|
| 116 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 117 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};"
|
| 118 |
+
]
|
| 119 |
+
},
|
| 120 |
+
{
|
| 121 |
+
"id": "crates/common_utils/src/types.rs::struct::NameType",
|
| 122 |
+
"file": "crates/common_utils/src/types.rs",
|
| 123 |
+
"kind": "struct_item",
|
| 124 |
+
"status": "modified",
|
| 125 |
+
"code_changed": true,
|
| 126 |
+
"imports_changed": true,
|
| 127 |
+
"before_code": "pub struct NameType(Secret<LengthString<256, 1>>);",
|
| 128 |
+
"after_code": "pub struct NameType(masking::Secret<LengthString<256, 1>>);",
|
| 129 |
+
"diff_span": {
|
| 130 |
+
"before": "pub struct NameType(Secret<LengthString<256, 1>>);",
|
| 131 |
+
"after": "pub struct NameType(masking::Secret<LengthString<256, 1>>);"
|
| 132 |
+
},
|
| 133 |
+
"commit_sha": "7aef96ea7ee2604acf7c36a63d1a73d093c14b70",
|
| 134 |
+
"before_imports": [
|
| 135 |
+
"use masking::{ExposeInterface, PeekInterface, Secret};",
|
| 136 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 137 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};"
|
| 138 |
+
],
|
| 139 |
+
"after_imports": [
|
| 140 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 141 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};"
|
| 142 |
+
]
|
| 143 |
+
},
|
| 144 |
+
{
|
| 145 |
+
"id": "crates/common_utils/src/types.rs::NameType::type::Target",
|
| 146 |
+
"file": "crates/common_utils/src/types.rs",
|
| 147 |
+
"kind": "type_item",
|
| 148 |
+
"status": "modified",
|
| 149 |
+
"code_changed": true,
|
| 150 |
+
"imports_changed": true,
|
| 151 |
+
"before_code": "type Target = Secret<LengthString<256, 1>>;",
|
| 152 |
+
"after_code": "type Target = masking::Secret<LengthString<256, 1>>;",
|
| 153 |
+
"diff_span": {
|
| 154 |
+
"before": "type Target = Secret<LengthString<256, 1>>;",
|
| 155 |
+
"after": "type Target = masking::Secret<LengthString<256, 1>>;"
|
| 156 |
+
},
|
| 157 |
+
"commit_sha": "7aef96ea7ee2604acf7c36a63d1a73d093c14b70",
|
| 158 |
+
"before_imports": [
|
| 159 |
+
"use masking::{ExposeInterface, PeekInterface, Secret};",
|
| 160 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 161 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};"
|
| 162 |
+
],
|
| 163 |
+
"after_imports": [
|
| 164 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 165 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};"
|
| 166 |
+
]
|
| 167 |
+
},
|
| 168 |
+
{
|
| 169 |
+
"id": "crates/common_utils/src/types.rs::client_secret_tests::function::test_deserialize_client_secret",
|
| 170 |
+
"file": "crates/common_utils/src/types.rs",
|
| 171 |
+
"kind": "function_item",
|
| 172 |
+
"status": "modified",
|
| 173 |
+
"code_changed": false,
|
| 174 |
+
"imports_changed": true,
|
| 175 |
+
"before_code": "fn test_deserialize_client_secret() {\n // This is a valid global id\n let global_payment_id_str = \"12345_pay_1a961ed9093c48b09781bf8ab17ba6bd\";\n let secret = \"fc34taHLw1ekPgNh92qr\".to_string();\n\n let valid_payment_global_id =\n GlobalPaymentId::try_from(Cow::Borrowed(global_payment_id_str))\n .expect(\"Failed to create valid global payment id\");\n\n // This is an invalid global id because of the cell id being in invalid length\n let invalid_global_payment_id = \"123_pay_1a961ed9093c48b09781bf8ab17ba6bd\";\n\n // Create a client secret string which is valid\n let valid_client_secret = format!(r#\"\"{global_payment_id_str}_secret_{secret}\"\"#);\n\n dbg!(&valid_client_secret);\n\n // Create a client secret string which is invalid\n let invalid_client_secret_because_of_invalid_payment_id =\n format!(r#\"\"{invalid_global_payment_id}_secret_{secret}\"\"#);\n\n // Create a client secret string which is invalid because of invalid secret\n let invalid_client_secret_because_of_invalid_secret =\n format!(r#\"\"{invalid_global_payment_id}\"\"#);\n\n let valid_client_secret = serde_json::from_str::<ClientSecret>(&valid_client_secret)\n .expect(\"Failed to deserialize client_secret_str1\");\n\n let invalid_deser1 = serde_json::from_str::<ClientSecret>(\n &invalid_client_secret_because_of_invalid_payment_id,\n );\n\n dbg!(&invalid_deser1);\n\n let invalid_deser2 = serde_json::from_str::<ClientSecret>(\n &invalid_client_secret_because_of_invalid_secret,\n );\n\n dbg!(&invalid_deser2);\n\n assert_eq!(valid_client_secret.payment_id, valid_payment_global_id);\n\n assert_eq!(valid_client_secret.secret.peek(), &secret);\n\n assert_eq!(\n invalid_deser1.err().unwrap().to_string(),\n \"Incorrect value provided for field: payment_id at line 1 column 70\"\n );\n\n assert_eq!(\n invalid_deser2.err().unwrap().to_string(),\n \"invalid value: string \\\"123_pay_1a961ed9093c48b09781bf8ab17ba6bd\\\", expected a string with '_secret_' at line 1 column 42\"\n );\n }",
|
| 176 |
+
"after_code": "fn test_deserialize_client_secret() {\n // This is a valid global id\n let global_payment_id_str = \"12345_pay_1a961ed9093c48b09781bf8ab17ba6bd\";\n let secret = \"fc34taHLw1ekPgNh92qr\".to_string();\n\n let valid_payment_global_id =\n GlobalPaymentId::try_from(Cow::Borrowed(global_payment_id_str))\n .expect(\"Failed to create valid global payment id\");\n\n // This is an invalid global id because of the cell id being in invalid length\n let invalid_global_payment_id = \"123_pay_1a961ed9093c48b09781bf8ab17ba6bd\";\n\n // Create a client secret string which is valid\n let valid_client_secret = format!(r#\"\"{global_payment_id_str}_secret_{secret}\"\"#);\n\n dbg!(&valid_client_secret);\n\n // Create a client secret string which is invalid\n let invalid_client_secret_because_of_invalid_payment_id =\n format!(r#\"\"{invalid_global_payment_id}_secret_{secret}\"\"#);\n\n // Create a client secret string which is invalid because of invalid secret\n let invalid_client_secret_because_of_invalid_secret =\n format!(r#\"\"{invalid_global_payment_id}\"\"#);\n\n let valid_client_secret = serde_json::from_str::<ClientSecret>(&valid_client_secret)\n .expect(\"Failed to deserialize client_secret_str1\");\n\n let invalid_deser1 = serde_json::from_str::<ClientSecret>(\n &invalid_client_secret_because_of_invalid_payment_id,\n );\n\n dbg!(&invalid_deser1);\n\n let invalid_deser2 = serde_json::from_str::<ClientSecret>(\n &invalid_client_secret_because_of_invalid_secret,\n );\n\n dbg!(&invalid_deser2);\n\n assert_eq!(valid_client_secret.payment_id, valid_payment_global_id);\n\n assert_eq!(valid_client_secret.secret.peek(), &secret);\n\n assert_eq!(\n invalid_deser1.err().unwrap().to_string(),\n \"Incorrect value provided for field: payment_id at line 1 column 70\"\n );\n\n assert_eq!(\n invalid_deser2.err().unwrap().to_string(),\n \"invalid value: string \\\"123_pay_1a961ed9093c48b09781bf8ab17ba6bd\\\", expected a string with '_secret_' at line 1 column 42\"\n );\n }",
|
| 177 |
+
"diff_span": {
|
| 178 |
+
"before": "",
|
| 179 |
+
"after": ""
|
| 180 |
+
},
|
| 181 |
+
"commit_sha": "7aef96ea7ee2604acf7c36a63d1a73d093c14b70",
|
| 182 |
+
"before_imports": [
|
| 183 |
+
"use masking::{ExposeInterface, PeekInterface, Secret};",
|
| 184 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 185 |
+
"pub use client_secret_type::ClientSecret;",
|
| 186 |
+
"use crate::id_type::GlobalPaymentId;",
|
| 187 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};"
|
| 188 |
+
],
|
| 189 |
+
"after_imports": [
|
| 190 |
+
"pub use client_secret_type::ClientSecret;",
|
| 191 |
+
"use crate::id_type::GlobalPaymentId;",
|
| 192 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 193 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};"
|
| 194 |
+
]
|
| 195 |
+
},
|
| 196 |
+
{
|
| 197 |
+
"id": "crates/common_utils/src/types.rs::mod::client_secret_type",
|
| 198 |
+
"file": "crates/common_utils/src/types.rs",
|
| 199 |
+
"kind": "mod_item",
|
| 200 |
+
"status": "modified",
|
| 201 |
+
"code_changed": false,
|
| 202 |
+
"imports_changed": true,
|
| 203 |
+
"before_code": "mod client_secret_type {\n use std::fmt;\n\n use masking::PeekInterface;\n use router_env::logger;\n\n use super::*;\n use crate::id_type;\n\n /// A domain type that can be used to represent a client secret\n /// Client secret is generated for a payment and is used to authenticate the client side api calls\n #[derive(Debug, PartialEq, Clone, AsExpression)]\n #[diesel(sql_type = sql_types::Text)]\n pub struct ClientSecret {\n /// The payment id of the payment\n pub payment_id: id_type::GlobalPaymentId,\n /// The secret string\n pub secret: masking::Secret<String>,\n }\n\n impl ClientSecret {\n pub(crate) fn get_string_repr(&self) -> String {\n format!(\n \"{}_secret_{}\",\n self.payment_id.get_string_repr(),\n self.secret.peek()\n )\n }\n\n /// Create a new client secret\n pub(crate) fn new(payment_id: id_type::GlobalPaymentId, secret: String) -> Self {\n Self {\n payment_id,\n secret: masking::Secret::new(secret),\n }\n }\n }\n\n impl FromStr for ClientSecret {\n type Err = ParsingError;\n\n fn from_str(str_value: &str) -> Result<Self, Self::Err> {\n let (payment_id, secret) =\n str_value\n .rsplit_once(\"_secret_\")\n .ok_or(ParsingError::EncodeError(\n \"Expected a string in the format '{payment_id}_secret_{secret}'\",\n ))?;\n\n let payment_id = id_type::GlobalPaymentId::try_from(Cow::Owned(payment_id.to_owned()))\n .map_err(|err| {\n logger::error!(global_payment_id_error=?err);\n ParsingError::EncodeError(\"Error while constructing GlobalPaymentId\")\n })?;\n\n Ok(Self {\n payment_id,\n secret: masking::Secret::new(secret.to_owned()),\n })\n }\n }\n\n impl<'de> Deserialize<'de> for ClientSecret {\n fn deserialize<D>(deserializer: D) -> Result<Self, D::Error>\n where\n D: Deserializer<'de>,\n {\n struct ClientSecretVisitor;\n\n impl Visitor<'_> for ClientSecretVisitor {\n type Value = ClientSecret;\n\n fn expecting(&self, formatter: &mut fmt::Formatter<'_>) -> fmt::Result {\n formatter.write_str(\"a string in the format '{payment_id}_secret_{secret}'\")\n }\n\n fn visit_str<E>(self, value: &str) -> Result<ClientSecret, E>\n where\n E: serde::de::Error,\n {\n let (payment_id, secret) = value.rsplit_once(\"_secret_\").ok_or_else(|| {\n E::invalid_value(\n serde::de::Unexpected::Str(value),\n &\"a string with '_secret_'\",\n )\n })?;\n\n let payment_id =\n id_type::GlobalPaymentId::try_from(Cow::Owned(payment_id.to_owned()))\n .map_err(serde::de::Error::custom)?;\n\n Ok(ClientSecret {\n payment_id,\n secret: masking::Secret::new(secret.to_owned()),\n })\n }\n }\n\n deserializer.deserialize_str(ClientSecretVisitor)\n }\n }\n\n impl Serialize for ClientSecret {\n fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error>\n where\n S: serde::ser::Serializer,\n {\n serializer.serialize_str(self.get_string_repr().as_str())\n }\n }\n\n impl ToSql<sql_types::Text, diesel::pg::Pg> for ClientSecret\n where\n String: ToSql<sql_types::Text, diesel::pg::Pg>,\n {\n fn to_sql<'b>(\n &'b self,\n out: &mut Output<'b, '_, diesel::pg::Pg>,\n ) -> diesel::serialize::Result {\n let string_repr = self.get_string_repr();\n <String as ToSql<sql_types::Text, diesel::pg::Pg>>::to_sql(\n &string_repr,\n &mut out.reborrow(),\n )\n }\n }\n\n impl<DB> FromSql<sql_types::Text, DB> for ClientSecret\n where\n DB: Backend,\n String: FromSql<sql_types::Text, DB>,\n {\n fn from_sql(value: DB::RawValue<'_>) -> deserialize::Result<Self> {\n let string_repr = String::from_sql(value)?;\n let (payment_id, secret) =\n string_repr\n .rsplit_once(\"_secret_\")\n .ok_or(ParsingError::EncodeError(\n \"Expected a string in the format '{payment_id}_secret_{secret}'\",\n ))?;\n\n let payment_id = id_type::GlobalPaymentId::try_from(Cow::Owned(payment_id.to_owned()))\n .map_err(|err| {\n logger::error!(global_payment_id_error=?err);\n ParsingError::EncodeError(\"Error while constructing GlobalPaymentId\")\n })?;\n\n Ok(Self {\n payment_id,\n secret: masking::Secret::new(secret.to_owned()),\n })\n }\n }\n\n impl<DB> Queryable<sql_types::Text, DB> for ClientSecret\n where\n DB: Backend,\n Self: FromSql<sql_types::Text, DB>,\n {\n type Row = Self;\n\n fn build(row: Self::Row) -> deserialize::Result<Self> {\n Ok(row)\n }\n }\n crate::impl_serializable_secret_id_type!(ClientSecret);\n #[cfg(test)]\n mod client_secret_tests {\n #![allow(clippy::expect_used)]\n #![allow(clippy::unwrap_used)]\n\n use serde_json;\n\n use super::*;\n use crate::id_type::GlobalPaymentId;\n\n #[test]\n fn test_serialize_client_secret() {\n let global_payment_id = \"12345_pay_1a961ed9093c48b09781bf8ab17ba6bd\";\n let secret = \"fc34taHLw1ekPgNh92qr\".to_string();\n\n let expected_client_secret_string = format!(\"\\\"{global_payment_id}_secret_{secret}\\\"\");\n\n let client_secret1 = ClientSecret {\n payment_id: GlobalPaymentId::try_from(Cow::Borrowed(global_payment_id)).unwrap(),\n secret: masking::Secret::new(secret),\n };\n\n let parsed_client_secret =\n serde_json::to_string(&client_secret1).expect(\"Failed to serialize client_secret1\");\n\n assert_eq!(expected_client_secret_string, parsed_client_secret);\n }\n\n #[test]\n fn test_deserialize_client_secret() {\n // This is a valid global id\n let global_payment_id_str = \"12345_pay_1a961ed9093c48b09781bf8ab17ba6bd\";\n let secret = \"fc34taHLw1ekPgNh92qr\".to_string();\n\n let valid_payment_global_id =\n GlobalPaymentId::try_from(Cow::Borrowed(global_payment_id_str))\n .expect(\"Failed to create valid global payment id\");\n\n // This is an invalid global id because of the cell id being in invalid length\n let invalid_global_payment_id = \"123_pay_1a961ed9093c48b09781bf8ab17ba6bd\";\n\n // Create a client secret string which is valid\n let valid_client_secret = format!(r#\"\"{global_payment_id_str}_secret_{secret}\"\"#);\n\n dbg!(&valid_client_secret);\n\n // Create a client secret string which is invalid\n let invalid_client_secret_because_of_invalid_payment_id =\n format!(r#\"\"{invalid_global_payment_id}_secret_{secret}\"\"#);\n\n // Create a client secret string which is invalid because of invalid secret\n let invalid_client_secret_because_of_invalid_secret =\n format!(r#\"\"{invalid_global_payment_id}\"\"#);\n\n let valid_client_secret = serde_json::from_str::<ClientSecret>(&valid_client_secret)\n .expect(\"Failed to deserialize client_secret_str1\");\n\n let invalid_deser1 = serde_json::from_str::<ClientSecret>(\n &invalid_client_secret_because_of_invalid_payment_id,\n );\n\n dbg!(&invalid_deser1);\n\n let invalid_deser2 = serde_json::from_str::<ClientSecret>(\n &invalid_client_secret_because_of_invalid_secret,\n );\n\n dbg!(&invalid_deser2);\n\n assert_eq!(valid_client_secret.payment_id, valid_payment_global_id);\n\n assert_eq!(valid_client_secret.secret.peek(), &secret);\n\n assert_eq!(\n invalid_deser1.err().unwrap().to_string(),\n \"Incorrect value provided for field: payment_id at line 1 column 70\"\n );\n\n assert_eq!(\n invalid_deser2.err().unwrap().to_string(),\n \"invalid value: string \\\"123_pay_1a961ed9093c48b09781bf8ab17ba6bd\\\", expected a string with '_secret_' at line 1 column 42\"\n );\n }\n }\n}",
|
| 204 |
+
"after_code": "mod client_secret_type {\n use std::fmt;\n\n use masking::PeekInterface;\n use router_env::logger;\n\n use super::*;\n use crate::id_type;\n\n /// A domain type that can be used to represent a client secret\n /// Client secret is generated for a payment and is used to authenticate the client side api calls\n #[derive(Debug, PartialEq, Clone, AsExpression)]\n #[diesel(sql_type = sql_types::Text)]\n pub struct ClientSecret {\n /// The payment id of the payment\n pub payment_id: id_type::GlobalPaymentId,\n /// The secret string\n pub secret: masking::Secret<String>,\n }\n\n impl ClientSecret {\n pub(crate) fn get_string_repr(&self) -> String {\n format!(\n \"{}_secret_{}\",\n self.payment_id.get_string_repr(),\n self.secret.peek()\n )\n }\n\n /// Create a new client secret\n pub(crate) fn new(payment_id: id_type::GlobalPaymentId, secret: String) -> Self {\n Self {\n payment_id,\n secret: masking::Secret::new(secret),\n }\n }\n }\n\n impl FromStr for ClientSecret {\n type Err = ParsingError;\n\n fn from_str(str_value: &str) -> Result<Self, Self::Err> {\n let (payment_id, secret) =\n str_value\n .rsplit_once(\"_secret_\")\n .ok_or(ParsingError::EncodeError(\n \"Expected a string in the format '{payment_id}_secret_{secret}'\",\n ))?;\n\n let payment_id = id_type::GlobalPaymentId::try_from(Cow::Owned(payment_id.to_owned()))\n .map_err(|err| {\n logger::error!(global_payment_id_error=?err);\n ParsingError::EncodeError(\"Error while constructing GlobalPaymentId\")\n })?;\n\n Ok(Self {\n payment_id,\n secret: masking::Secret::new(secret.to_owned()),\n })\n }\n }\n\n impl<'de> Deserialize<'de> for ClientSecret {\n fn deserialize<D>(deserializer: D) -> Result<Self, D::Error>\n where\n D: Deserializer<'de>,\n {\n struct ClientSecretVisitor;\n\n impl Visitor<'_> for ClientSecretVisitor {\n type Value = ClientSecret;\n\n fn expecting(&self, formatter: &mut fmt::Formatter<'_>) -> fmt::Result {\n formatter.write_str(\"a string in the format '{payment_id}_secret_{secret}'\")\n }\n\n fn visit_str<E>(self, value: &str) -> Result<ClientSecret, E>\n where\n E: serde::de::Error,\n {\n let (payment_id, secret) = value.rsplit_once(\"_secret_\").ok_or_else(|| {\n E::invalid_value(\n serde::de::Unexpected::Str(value),\n &\"a string with '_secret_'\",\n )\n })?;\n\n let payment_id =\n id_type::GlobalPaymentId::try_from(Cow::Owned(payment_id.to_owned()))\n .map_err(serde::de::Error::custom)?;\n\n Ok(ClientSecret {\n payment_id,\n secret: masking::Secret::new(secret.to_owned()),\n })\n }\n }\n\n deserializer.deserialize_str(ClientSecretVisitor)\n }\n }\n\n impl Serialize for ClientSecret {\n fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error>\n where\n S: serde::ser::Serializer,\n {\n serializer.serialize_str(self.get_string_repr().as_str())\n }\n }\n\n impl ToSql<sql_types::Text, diesel::pg::Pg> for ClientSecret\n where\n String: ToSql<sql_types::Text, diesel::pg::Pg>,\n {\n fn to_sql<'b>(\n &'b self,\n out: &mut Output<'b, '_, diesel::pg::Pg>,\n ) -> diesel::serialize::Result {\n let string_repr = self.get_string_repr();\n <String as ToSql<sql_types::Text, diesel::pg::Pg>>::to_sql(\n &string_repr,\n &mut out.reborrow(),\n )\n }\n }\n\n impl<DB> FromSql<sql_types::Text, DB> for ClientSecret\n where\n DB: Backend,\n String: FromSql<sql_types::Text, DB>,\n {\n fn from_sql(value: DB::RawValue<'_>) -> deserialize::Result<Self> {\n let string_repr = String::from_sql(value)?;\n let (payment_id, secret) =\n string_repr\n .rsplit_once(\"_secret_\")\n .ok_or(ParsingError::EncodeError(\n \"Expected a string in the format '{payment_id}_secret_{secret}'\",\n ))?;\n\n let payment_id = id_type::GlobalPaymentId::try_from(Cow::Owned(payment_id.to_owned()))\n .map_err(|err| {\n logger::error!(global_payment_id_error=?err);\n ParsingError::EncodeError(\"Error while constructing GlobalPaymentId\")\n })?;\n\n Ok(Self {\n payment_id,\n secret: masking::Secret::new(secret.to_owned()),\n })\n }\n }\n\n impl<DB> Queryable<sql_types::Text, DB> for ClientSecret\n where\n DB: Backend,\n Self: FromSql<sql_types::Text, DB>,\n {\n type Row = Self;\n\n fn build(row: Self::Row) -> deserialize::Result<Self> {\n Ok(row)\n }\n }\n crate::impl_serializable_secret_id_type!(ClientSecret);\n #[cfg(test)]\n mod client_secret_tests {\n #![allow(clippy::expect_used)]\n #![allow(clippy::unwrap_used)]\n\n use serde_json;\n\n use super::*;\n use crate::id_type::GlobalPaymentId;\n\n #[test]\n fn test_serialize_client_secret() {\n let global_payment_id = \"12345_pay_1a961ed9093c48b09781bf8ab17ba6bd\";\n let secret = \"fc34taHLw1ekPgNh92qr\".to_string();\n\n let expected_client_secret_string = format!(\"\\\"{global_payment_id}_secret_{secret}\\\"\");\n\n let client_secret1 = ClientSecret {\n payment_id: GlobalPaymentId::try_from(Cow::Borrowed(global_payment_id)).unwrap(),\n secret: masking::Secret::new(secret),\n };\n\n let parsed_client_secret =\n serde_json::to_string(&client_secret1).expect(\"Failed to serialize client_secret1\");\n\n assert_eq!(expected_client_secret_string, parsed_client_secret);\n }\n\n #[test]\n fn test_deserialize_client_secret() {\n // This is a valid global id\n let global_payment_id_str = \"12345_pay_1a961ed9093c48b09781bf8ab17ba6bd\";\n let secret = \"fc34taHLw1ekPgNh92qr\".to_string();\n\n let valid_payment_global_id =\n GlobalPaymentId::try_from(Cow::Borrowed(global_payment_id_str))\n .expect(\"Failed to create valid global payment id\");\n\n // This is an invalid global id because of the cell id being in invalid length\n let invalid_global_payment_id = \"123_pay_1a961ed9093c48b09781bf8ab17ba6bd\";\n\n // Create a client secret string which is valid\n let valid_client_secret = format!(r#\"\"{global_payment_id_str}_secret_{secret}\"\"#);\n\n dbg!(&valid_client_secret);\n\n // Create a client secret string which is invalid\n let invalid_client_secret_because_of_invalid_payment_id =\n format!(r#\"\"{invalid_global_payment_id}_secret_{secret}\"\"#);\n\n // Create a client secret string which is invalid because of invalid secret\n let invalid_client_secret_because_of_invalid_secret =\n format!(r#\"\"{invalid_global_payment_id}\"\"#);\n\n let valid_client_secret = serde_json::from_str::<ClientSecret>(&valid_client_secret)\n .expect(\"Failed to deserialize client_secret_str1\");\n\n let invalid_deser1 = serde_json::from_str::<ClientSecret>(\n &invalid_client_secret_because_of_invalid_payment_id,\n );\n\n dbg!(&invalid_deser1);\n\n let invalid_deser2 = serde_json::from_str::<ClientSecret>(\n &invalid_client_secret_because_of_invalid_secret,\n );\n\n dbg!(&invalid_deser2);\n\n assert_eq!(valid_client_secret.payment_id, valid_payment_global_id);\n\n assert_eq!(valid_client_secret.secret.peek(), &secret);\n\n assert_eq!(\n invalid_deser1.err().unwrap().to_string(),\n \"Incorrect value provided for field: payment_id at line 1 column 70\"\n );\n\n assert_eq!(\n invalid_deser2.err().unwrap().to_string(),\n \"invalid value: string \\\"123_pay_1a961ed9093c48b09781bf8ab17ba6bd\\\", expected a string with '_secret_' at line 1 column 42\"\n );\n }\n }\n}",
|
| 205 |
+
"diff_span": {
|
| 206 |
+
"before": "",
|
| 207 |
+
"after": ""
|
| 208 |
+
},
|
| 209 |
+
"commit_sha": "7aef96ea7ee2604acf7c36a63d1a73d093c14b70",
|
| 210 |
+
"before_imports": [
|
| 211 |
+
"use masking::{ExposeInterface, PeekInterface, Secret};",
|
| 212 |
+
"use thiserror::Error;",
|
| 213 |
+
"use super::*;",
|
| 214 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 215 |
+
"use router_env::logger;",
|
| 216 |
+
"use serde_json;",
|
| 217 |
+
"pub use client_secret_type::ClientSecret;",
|
| 218 |
+
"use crate::id_type::GlobalPaymentId;",
|
| 219 |
+
"use crate::id_type;",
|
| 220 |
+
"use std::fmt;",
|
| 221 |
+
"use masking::PeekInterface;",
|
| 222 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};"
|
| 223 |
+
],
|
| 224 |
+
"after_imports": [
|
| 225 |
+
"use super::*;",
|
| 226 |
+
"use thiserror::Error;",
|
| 227 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 228 |
+
"use router_env::logger;",
|
| 229 |
+
"use masking::{ExposeInterface, PeekInterface};",
|
| 230 |
+
"use serde_json;",
|
| 231 |
+
"pub use client_secret_type::ClientSecret;",
|
| 232 |
+
"use crate::id_type::GlobalPaymentId;",
|
| 233 |
+
"use crate::id_type;",
|
| 234 |
+
"use std::fmt;",
|
| 235 |
+
"use masking::PeekInterface;",
|
| 236 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};"
|
| 237 |
+
]
|
| 238 |
+
},
|
| 239 |
+
{
|
| 240 |
+
"id": "crates/common_utils/src/types.rs::client_secret_type::struct::ClientSecret",
|
| 241 |
+
"file": "crates/common_utils/src/types.rs",
|
| 242 |
+
"kind": "struct_item",
|
| 243 |
+
"status": "modified",
|
| 244 |
+
"code_changed": false,
|
| 245 |
+
"imports_changed": true,
|
| 246 |
+
"before_code": "pub struct ClientSecret {\n /// The payment id of the payment\n pub payment_id: id_type::GlobalPaymentId,\n /// The secret string\n pub secret: masking::Secret<String>,\n }",
|
| 247 |
+
"after_code": "pub struct ClientSecret {\n /// The payment id of the payment\n pub payment_id: id_type::GlobalPaymentId,\n /// The secret string\n pub secret: masking::Secret<String>,\n }",
|
| 248 |
+
"diff_span": {
|
| 249 |
+
"before": "",
|
| 250 |
+
"after": ""
|
| 251 |
+
},
|
| 252 |
+
"commit_sha": "7aef96ea7ee2604acf7c36a63d1a73d093c14b70",
|
| 253 |
+
"before_imports": [
|
| 254 |
+
"use masking::{ExposeInterface, PeekInterface, Secret};",
|
| 255 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 256 |
+
"pub use client_secret_type::ClientSecret;",
|
| 257 |
+
"use crate::id_type::GlobalPaymentId;",
|
| 258 |
+
"use crate::id_type;",
|
| 259 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};"
|
| 260 |
+
],
|
| 261 |
+
"after_imports": [
|
| 262 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 263 |
+
"pub use client_secret_type::ClientSecret;",
|
| 264 |
+
"use crate::id_type::GlobalPaymentId;",
|
| 265 |
+
"use crate::id_type;",
|
| 266 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};"
|
| 267 |
+
]
|
| 268 |
+
},
|
| 269 |
+
{
|
| 270 |
+
"id": "crates/common_utils/src/types.rs::ClientSecretVisitor::function::visit_str",
|
| 271 |
+
"file": "crates/common_utils/src/types.rs",
|
| 272 |
+
"kind": "function_item",
|
| 273 |
+
"status": "modified",
|
| 274 |
+
"code_changed": false,
|
| 275 |
+
"imports_changed": true,
|
| 276 |
+
"before_code": "fn visit_str<E>(self, value: &str) -> Result<ClientSecret, E>\n where\n E: serde::de::Error,\n {\n let (payment_id, secret) = value.rsplit_once(\"_secret_\").ok_or_else(|| {\n E::invalid_value(\n serde::de::Unexpected::Str(value),\n &\"a string with '_secret_'\",\n )\n })?;\n\n let payment_id =\n id_type::GlobalPaymentId::try_from(Cow::Owned(payment_id.to_owned()))\n .map_err(serde::de::Error::custom)?;\n\n Ok(ClientSecret {\n payment_id,\n secret: masking::Secret::new(secret.to_owned()),\n })\n }",
|
| 277 |
+
"after_code": "fn visit_str<E>(self, value: &str) -> Result<ClientSecret, E>\n where\n E: serde::de::Error,\n {\n let (payment_id, secret) = value.rsplit_once(\"_secret_\").ok_or_else(|| {\n E::invalid_value(\n serde::de::Unexpected::Str(value),\n &\"a string with '_secret_'\",\n )\n })?;\n\n let payment_id =\n id_type::GlobalPaymentId::try_from(Cow::Owned(payment_id.to_owned()))\n .map_err(serde::de::Error::custom)?;\n\n Ok(ClientSecret {\n payment_id,\n secret: masking::Secret::new(secret.to_owned()),\n })\n }",
|
| 278 |
+
"diff_span": {
|
| 279 |
+
"before": "",
|
| 280 |
+
"after": ""
|
| 281 |
+
},
|
| 282 |
+
"commit_sha": "7aef96ea7ee2604acf7c36a63d1a73d093c14b70",
|
| 283 |
+
"before_imports": [
|
| 284 |
+
"use masking::{ExposeInterface, PeekInterface, Secret};",
|
| 285 |
+
"use thiserror::Error;",
|
| 286 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 287 |
+
"pub use client_secret_type::ClientSecret;",
|
| 288 |
+
"use crate::id_type::GlobalPaymentId;",
|
| 289 |
+
"use crate::id_type;",
|
| 290 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};"
|
| 291 |
+
],
|
| 292 |
+
"after_imports": [
|
| 293 |
+
"use thiserror::Error;",
|
| 294 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 295 |
+
"pub use client_secret_type::ClientSecret;",
|
| 296 |
+
"use crate::id_type::GlobalPaymentId;",
|
| 297 |
+
"use crate::id_type;",
|
| 298 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};"
|
| 299 |
+
]
|
| 300 |
+
},
|
| 301 |
+
{
|
| 302 |
+
"id": "crates/common_utils/src/types.rs::ClientSecret::function::deserialize",
|
| 303 |
+
"file": "crates/common_utils/src/types.rs",
|
| 304 |
+
"kind": "function_item",
|
| 305 |
+
"status": "modified",
|
| 306 |
+
"code_changed": false,
|
| 307 |
+
"imports_changed": true,
|
| 308 |
+
"before_code": "fn deserialize<D>(deserializer: D) -> Result<Self, D::Error>\n where\n D: Deserializer<'de>,\n {\n struct ClientSecretVisitor;\n\n impl Visitor<'_> for ClientSecretVisitor {\n type Value = ClientSecret;\n\n fn expecting(&self, formatter: &mut fmt::Formatter<'_>) -> fmt::Result {\n formatter.write_str(\"a string in the format '{payment_id}_secret_{secret}'\")\n }\n\n fn visit_str<E>(self, value: &str) -> Result<ClientSecret, E>\n where\n E: serde::de::Error,\n {\n let (payment_id, secret) = value.rsplit_once(\"_secret_\").ok_or_else(|| {\n E::invalid_value(\n serde::de::Unexpected::Str(value),\n &\"a string with '_secret_'\",\n )\n })?;\n\n let payment_id =\n id_type::GlobalPaymentId::try_from(Cow::Owned(payment_id.to_owned()))\n .map_err(serde::de::Error::custom)?;\n\n Ok(ClientSecret {\n payment_id,\n secret: masking::Secret::new(secret.to_owned()),\n })\n }\n }\n\n deserializer.deserialize_str(ClientSecretVisitor)\n }",
|
| 309 |
+
"after_code": "fn deserialize<D>(deserializer: D) -> Result<Self, D::Error>\n where\n D: Deserializer<'de>,\n {\n struct ClientSecretVisitor;\n\n impl Visitor<'_> for ClientSecretVisitor {\n type Value = ClientSecret;\n\n fn expecting(&self, formatter: &mut fmt::Formatter<'_>) -> fmt::Result {\n formatter.write_str(\"a string in the format '{payment_id}_secret_{secret}'\")\n }\n\n fn visit_str<E>(self, value: &str) -> Result<ClientSecret, E>\n where\n E: serde::de::Error,\n {\n let (payment_id, secret) = value.rsplit_once(\"_secret_\").ok_or_else(|| {\n E::invalid_value(\n serde::de::Unexpected::Str(value),\n &\"a string with '_secret_'\",\n )\n })?;\n\n let payment_id =\n id_type::GlobalPaymentId::try_from(Cow::Owned(payment_id.to_owned()))\n .map_err(serde::de::Error::custom)?;\n\n Ok(ClientSecret {\n payment_id,\n secret: masking::Secret::new(secret.to_owned()),\n })\n }\n }\n\n deserializer.deserialize_str(ClientSecretVisitor)\n }",
|
| 310 |
+
"diff_span": {
|
| 311 |
+
"before": "",
|
| 312 |
+
"after": ""
|
| 313 |
+
},
|
| 314 |
+
"commit_sha": "7aef96ea7ee2604acf7c36a63d1a73d093c14b70",
|
| 315 |
+
"before_imports": [
|
| 316 |
+
"use masking::{ExposeInterface, PeekInterface, Secret};",
|
| 317 |
+
"use thiserror::Error;",
|
| 318 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 319 |
+
"pub use client_secret_type::ClientSecret;",
|
| 320 |
+
"use crate::id_type::GlobalPaymentId;",
|
| 321 |
+
"use crate::id_type;",
|
| 322 |
+
"use std::fmt;",
|
| 323 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};"
|
| 324 |
+
],
|
| 325 |
+
"after_imports": [
|
| 326 |
+
"use thiserror::Error;",
|
| 327 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 328 |
+
"pub use client_secret_type::ClientSecret;",
|
| 329 |
+
"use crate::id_type::GlobalPaymentId;",
|
| 330 |
+
"use crate::id_type;",
|
| 331 |
+
"use std::fmt;",
|
| 332 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};"
|
| 333 |
+
]
|
| 334 |
+
},
|
| 335 |
+
{
|
| 336 |
+
"id": "crates/common_utils/src/types.rs::ClientSecret::function::from_str",
|
| 337 |
+
"file": "crates/common_utils/src/types.rs",
|
| 338 |
+
"kind": "function_item",
|
| 339 |
+
"status": "modified",
|
| 340 |
+
"code_changed": false,
|
| 341 |
+
"imports_changed": true,
|
| 342 |
+
"before_code": "fn from_str(str_value: &str) -> Result<Self, Self::Err> {\n let (payment_id, secret) =\n str_value\n .rsplit_once(\"_secret_\")\n .ok_or(ParsingError::EncodeError(\n \"Expected a string in the format '{payment_id}_secret_{secret}'\",\n ))?;\n\n let payment_id = id_type::GlobalPaymentId::try_from(Cow::Owned(payment_id.to_owned()))\n .map_err(|err| {\n logger::error!(global_payment_id_error=?err);\n ParsingError::EncodeError(\"Error while constructing GlobalPaymentId\")\n })?;\n\n Ok(Self {\n payment_id,\n secret: masking::Secret::new(secret.to_owned()),\n })\n }",
|
| 343 |
+
"after_code": "fn from_str(str_value: &str) -> Result<Self, Self::Err> {\n let (payment_id, secret) =\n str_value\n .rsplit_once(\"_secret_\")\n .ok_or(ParsingError::EncodeError(\n \"Expected a string in the format '{payment_id}_secret_{secret}'\",\n ))?;\n\n let payment_id = id_type::GlobalPaymentId::try_from(Cow::Owned(payment_id.to_owned()))\n .map_err(|err| {\n logger::error!(global_payment_id_error=?err);\n ParsingError::EncodeError(\"Error while constructing GlobalPaymentId\")\n })?;\n\n Ok(Self {\n payment_id,\n secret: masking::Secret::new(secret.to_owned()),\n })\n }",
|
| 344 |
+
"diff_span": {
|
| 345 |
+
"before": "",
|
| 346 |
+
"after": ""
|
| 347 |
+
},
|
| 348 |
+
"commit_sha": "7aef96ea7ee2604acf7c36a63d1a73d093c14b70",
|
| 349 |
+
"before_imports": [
|
| 350 |
+
"use masking::{ExposeInterface, PeekInterface, Secret};",
|
| 351 |
+
"use thiserror::Error;",
|
| 352 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 353 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};",
|
| 354 |
+
"use crate::id_type::GlobalPaymentId;",
|
| 355 |
+
"use crate::id_type;",
|
| 356 |
+
"use router_env::logger;"
|
| 357 |
+
],
|
| 358 |
+
"after_imports": [
|
| 359 |
+
"use thiserror::Error;",
|
| 360 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 361 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};",
|
| 362 |
+
"use crate::id_type::GlobalPaymentId;",
|
| 363 |
+
"use crate::id_type;",
|
| 364 |
+
"use router_env::logger;"
|
| 365 |
+
]
|
| 366 |
+
},
|
| 367 |
+
{
|
| 368 |
+
"id": "crates/common_utils/src/types.rs::ClientSecret::impl::ClientSecretVisitor",
|
| 369 |
+
"file": "crates/common_utils/src/types.rs",
|
| 370 |
+
"kind": "impl_item",
|
| 371 |
+
"status": "modified",
|
| 372 |
+
"code_changed": false,
|
| 373 |
+
"imports_changed": true,
|
| 374 |
+
"before_code": "impl Visitor<'_> for ClientSecretVisitor {\n type Value = ClientSecret;\n\n fn expecting(&self, formatter: &mut fmt::Formatter<'_>) -> fmt::Result {\n formatter.write_str(\"a string in the format '{payment_id}_secret_{secret}'\")\n }\n\n fn visit_str<E>(self, value: &str) -> Result<ClientSecret, E>\n where\n E: serde::de::Error,\n {\n let (payment_id, secret) = value.rsplit_once(\"_secret_\").ok_or_else(|| {\n E::invalid_value(\n serde::de::Unexpected::Str(value),\n &\"a string with '_secret_'\",\n )\n })?;\n\n let payment_id =\n id_type::GlobalPaymentId::try_from(Cow::Owned(payment_id.to_owned()))\n .map_err(serde::de::Error::custom)?;\n\n Ok(ClientSecret {\n payment_id,\n secret: masking::Secret::new(secret.to_owned()),\n })\n }\n }",
|
| 375 |
+
"after_code": "impl Visitor<'_> for ClientSecretVisitor {\n type Value = ClientSecret;\n\n fn expecting(&self, formatter: &mut fmt::Formatter<'_>) -> fmt::Result {\n formatter.write_str(\"a string in the format '{payment_id}_secret_{secret}'\")\n }\n\n fn visit_str<E>(self, value: &str) -> Result<ClientSecret, E>\n where\n E: serde::de::Error,\n {\n let (payment_id, secret) = value.rsplit_once(\"_secret_\").ok_or_else(|| {\n E::invalid_value(\n serde::de::Unexpected::Str(value),\n &\"a string with '_secret_'\",\n )\n })?;\n\n let payment_id =\n id_type::GlobalPaymentId::try_from(Cow::Owned(payment_id.to_owned()))\n .map_err(serde::de::Error::custom)?;\n\n Ok(ClientSecret {\n payment_id,\n secret: masking::Secret::new(secret.to_owned()),\n })\n }\n }",
|
| 376 |
+
"diff_span": {
|
| 377 |
+
"before": "",
|
| 378 |
+
"after": ""
|
| 379 |
+
},
|
| 380 |
+
"commit_sha": "7aef96ea7ee2604acf7c36a63d1a73d093c14b70",
|
| 381 |
+
"before_imports": [
|
| 382 |
+
"use masking::{ExposeInterface, PeekInterface, Secret};",
|
| 383 |
+
"use thiserror::Error;",
|
| 384 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 385 |
+
"pub use client_secret_type::ClientSecret;",
|
| 386 |
+
"use crate::id_type::GlobalPaymentId;",
|
| 387 |
+
"use crate::id_type;",
|
| 388 |
+
"use std::fmt;",
|
| 389 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};"
|
| 390 |
+
],
|
| 391 |
+
"after_imports": [
|
| 392 |
+
"use thiserror::Error;",
|
| 393 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 394 |
+
"pub use client_secret_type::ClientSecret;",
|
| 395 |
+
"use crate::id_type::GlobalPaymentId;",
|
| 396 |
+
"use crate::id_type;",
|
| 397 |
+
"use std::fmt;",
|
| 398 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};"
|
| 399 |
+
]
|
| 400 |
+
},
|
| 401 |
+
{
|
| 402 |
+
"id": "crates/common_utils/src/types.rs::client_secret_type::impl::ClientSecret",
|
| 403 |
+
"file": "crates/common_utils/src/types.rs",
|
| 404 |
+
"kind": "impl_item",
|
| 405 |
+
"status": "modified",
|
| 406 |
+
"code_changed": false,
|
| 407 |
+
"imports_changed": true,
|
| 408 |
+
"before_code": "impl<DB> Queryable<sql_types::Text, DB> for ClientSecret\n where\n DB: Backend,\n Self: FromSql<sql_types::Text, DB>,\n {\n type Row = Self;\n\n fn build(row: Self::Row) -> deserialize::Result<Self> {\n Ok(row)\n }\n }",
|
| 409 |
+
"after_code": "impl<DB> Queryable<sql_types::Text, DB> for ClientSecret\n where\n DB: Backend,\n Self: FromSql<sql_types::Text, DB>,\n {\n type Row = Self;\n\n fn build(row: Self::Row) -> deserialize::Result<Self> {\n Ok(row)\n }\n }",
|
| 410 |
+
"diff_span": {
|
| 411 |
+
"before": "",
|
| 412 |
+
"after": ""
|
| 413 |
+
},
|
| 414 |
+
"commit_sha": "7aef96ea7ee2604acf7c36a63d1a73d093c14b70",
|
| 415 |
+
"before_imports": [
|
| 416 |
+
"use masking::{ExposeInterface, PeekInterface, Secret};",
|
| 417 |
+
"pub use client_secret_type::ClientSecret;",
|
| 418 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 419 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};"
|
| 420 |
+
],
|
| 421 |
+
"after_imports": [
|
| 422 |
+
"pub use client_secret_type::ClientSecret;",
|
| 423 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 424 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};"
|
| 425 |
+
]
|
| 426 |
+
},
|
| 427 |
+
{
|
| 428 |
+
"id": "crates/common_utils/src/types.rs::client_secret_tests::function::test_serialize_client_secret",
|
| 429 |
+
"file": "crates/common_utils/src/types.rs",
|
| 430 |
+
"kind": "function_item",
|
| 431 |
+
"status": "modified",
|
| 432 |
+
"code_changed": false,
|
| 433 |
+
"imports_changed": true,
|
| 434 |
+
"before_code": "fn test_serialize_client_secret() {\n let global_payment_id = \"12345_pay_1a961ed9093c48b09781bf8ab17ba6bd\";\n let secret = \"fc34taHLw1ekPgNh92qr\".to_string();\n\n let expected_client_secret_string = format!(\"\\\"{global_payment_id}_secret_{secret}\\\"\");\n\n let client_secret1 = ClientSecret {\n payment_id: GlobalPaymentId::try_from(Cow::Borrowed(global_payment_id)).unwrap(),\n secret: masking::Secret::new(secret),\n };\n\n let parsed_client_secret =\n serde_json::to_string(&client_secret1).expect(\"Failed to serialize client_secret1\");\n\n assert_eq!(expected_client_secret_string, parsed_client_secret);\n }",
|
| 435 |
+
"after_code": "fn test_serialize_client_secret() {\n let global_payment_id = \"12345_pay_1a961ed9093c48b09781bf8ab17ba6bd\";\n let secret = \"fc34taHLw1ekPgNh92qr\".to_string();\n\n let expected_client_secret_string = format!(\"\\\"{global_payment_id}_secret_{secret}\\\"\");\n\n let client_secret1 = ClientSecret {\n payment_id: GlobalPaymentId::try_from(Cow::Borrowed(global_payment_id)).unwrap(),\n secret: masking::Secret::new(secret),\n };\n\n let parsed_client_secret =\n serde_json::to_string(&client_secret1).expect(\"Failed to serialize client_secret1\");\n\n assert_eq!(expected_client_secret_string, parsed_client_secret);\n }",
|
| 436 |
+
"diff_span": {
|
| 437 |
+
"before": "",
|
| 438 |
+
"after": ""
|
| 439 |
+
},
|
| 440 |
+
"commit_sha": "7aef96ea7ee2604acf7c36a63d1a73d093c14b70",
|
| 441 |
+
"before_imports": [
|
| 442 |
+
"use masking::{ExposeInterface, PeekInterface, Secret};",
|
| 443 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 444 |
+
"pub use client_secret_type::ClientSecret;",
|
| 445 |
+
"use crate::id_type::GlobalPaymentId;",
|
| 446 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};"
|
| 447 |
+
],
|
| 448 |
+
"after_imports": [
|
| 449 |
+
"pub use client_secret_type::ClientSecret;",
|
| 450 |
+
"use crate::id_type::GlobalPaymentId;",
|
| 451 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 452 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};"
|
| 453 |
+
]
|
| 454 |
+
},
|
| 455 |
+
{
|
| 456 |
+
"id": "crates/common_utils/src/types.rs::client_secret_type::mod::client_secret_tests",
|
| 457 |
+
"file": "crates/common_utils/src/types.rs",
|
| 458 |
+
"kind": "mod_item",
|
| 459 |
+
"status": "modified",
|
| 460 |
+
"code_changed": false,
|
| 461 |
+
"imports_changed": true,
|
| 462 |
+
"before_code": "mod client_secret_tests {\n #![allow(clippy::expect_used)]\n #![allow(clippy::unwrap_used)]\n\n use serde_json;\n\n use super::*;\n use crate::id_type::GlobalPaymentId;\n\n #[test]\n fn test_serialize_client_secret() {\n let global_payment_id = \"12345_pay_1a961ed9093c48b09781bf8ab17ba6bd\";\n let secret = \"fc34taHLw1ekPgNh92qr\".to_string();\n\n let expected_client_secret_string = format!(\"\\\"{global_payment_id}_secret_{secret}\\\"\");\n\n let client_secret1 = ClientSecret {\n payment_id: GlobalPaymentId::try_from(Cow::Borrowed(global_payment_id)).unwrap(),\n secret: masking::Secret::new(secret),\n };\n\n let parsed_client_secret =\n serde_json::to_string(&client_secret1).expect(\"Failed to serialize client_secret1\");\n\n assert_eq!(expected_client_secret_string, parsed_client_secret);\n }\n\n #[test]\n fn test_deserialize_client_secret() {\n // This is a valid global id\n let global_payment_id_str = \"12345_pay_1a961ed9093c48b09781bf8ab17ba6bd\";\n let secret = \"fc34taHLw1ekPgNh92qr\".to_string();\n\n let valid_payment_global_id =\n GlobalPaymentId::try_from(Cow::Borrowed(global_payment_id_str))\n .expect(\"Failed to create valid global payment id\");\n\n // This is an invalid global id because of the cell id being in invalid length\n let invalid_global_payment_id = \"123_pay_1a961ed9093c48b09781bf8ab17ba6bd\";\n\n // Create a client secret string which is valid\n let valid_client_secret = format!(r#\"\"{global_payment_id_str}_secret_{secret}\"\"#);\n\n dbg!(&valid_client_secret);\n\n // Create a client secret string which is invalid\n let invalid_client_secret_because_of_invalid_payment_id =\n format!(r#\"\"{invalid_global_payment_id}_secret_{secret}\"\"#);\n\n // Create a client secret string which is invalid because of invalid secret\n let invalid_client_secret_because_of_invalid_secret =\n format!(r#\"\"{invalid_global_payment_id}\"\"#);\n\n let valid_client_secret = serde_json::from_str::<ClientSecret>(&valid_client_secret)\n .expect(\"Failed to deserialize client_secret_str1\");\n\n let invalid_deser1 = serde_json::from_str::<ClientSecret>(\n &invalid_client_secret_because_of_invalid_payment_id,\n );\n\n dbg!(&invalid_deser1);\n\n let invalid_deser2 = serde_json::from_str::<ClientSecret>(\n &invalid_client_secret_because_of_invalid_secret,\n );\n\n dbg!(&invalid_deser2);\n\n assert_eq!(valid_client_secret.payment_id, valid_payment_global_id);\n\n assert_eq!(valid_client_secret.secret.peek(), &secret);\n\n assert_eq!(\n invalid_deser1.err().unwrap().to_string(),\n \"Incorrect value provided for field: payment_id at line 1 column 70\"\n );\n\n assert_eq!(\n invalid_deser2.err().unwrap().to_string(),\n \"invalid value: string \\\"123_pay_1a961ed9093c48b09781bf8ab17ba6bd\\\", expected a string with '_secret_' at line 1 column 42\"\n );\n }\n }",
|
| 463 |
+
"after_code": "mod client_secret_tests {\n #![allow(clippy::expect_used)]\n #![allow(clippy::unwrap_used)]\n\n use serde_json;\n\n use super::*;\n use crate::id_type::GlobalPaymentId;\n\n #[test]\n fn test_serialize_client_secret() {\n let global_payment_id = \"12345_pay_1a961ed9093c48b09781bf8ab17ba6bd\";\n let secret = \"fc34taHLw1ekPgNh92qr\".to_string();\n\n let expected_client_secret_string = format!(\"\\\"{global_payment_id}_secret_{secret}\\\"\");\n\n let client_secret1 = ClientSecret {\n payment_id: GlobalPaymentId::try_from(Cow::Borrowed(global_payment_id)).unwrap(),\n secret: masking::Secret::new(secret),\n };\n\n let parsed_client_secret =\n serde_json::to_string(&client_secret1).expect(\"Failed to serialize client_secret1\");\n\n assert_eq!(expected_client_secret_string, parsed_client_secret);\n }\n\n #[test]\n fn test_deserialize_client_secret() {\n // This is a valid global id\n let global_payment_id_str = \"12345_pay_1a961ed9093c48b09781bf8ab17ba6bd\";\n let secret = \"fc34taHLw1ekPgNh92qr\".to_string();\n\n let valid_payment_global_id =\n GlobalPaymentId::try_from(Cow::Borrowed(global_payment_id_str))\n .expect(\"Failed to create valid global payment id\");\n\n // This is an invalid global id because of the cell id being in invalid length\n let invalid_global_payment_id = \"123_pay_1a961ed9093c48b09781bf8ab17ba6bd\";\n\n // Create a client secret string which is valid\n let valid_client_secret = format!(r#\"\"{global_payment_id_str}_secret_{secret}\"\"#);\n\n dbg!(&valid_client_secret);\n\n // Create a client secret string which is invalid\n let invalid_client_secret_because_of_invalid_payment_id =\n format!(r#\"\"{invalid_global_payment_id}_secret_{secret}\"\"#);\n\n // Create a client secret string which is invalid because of invalid secret\n let invalid_client_secret_because_of_invalid_secret =\n format!(r#\"\"{invalid_global_payment_id}\"\"#);\n\n let valid_client_secret = serde_json::from_str::<ClientSecret>(&valid_client_secret)\n .expect(\"Failed to deserialize client_secret_str1\");\n\n let invalid_deser1 = serde_json::from_str::<ClientSecret>(\n &invalid_client_secret_because_of_invalid_payment_id,\n );\n\n dbg!(&invalid_deser1);\n\n let invalid_deser2 = serde_json::from_str::<ClientSecret>(\n &invalid_client_secret_because_of_invalid_secret,\n );\n\n dbg!(&invalid_deser2);\n\n assert_eq!(valid_client_secret.payment_id, valid_payment_global_id);\n\n assert_eq!(valid_client_secret.secret.peek(), &secret);\n\n assert_eq!(\n invalid_deser1.err().unwrap().to_string(),\n \"Incorrect value provided for field: payment_id at line 1 column 70\"\n );\n\n assert_eq!(\n invalid_deser2.err().unwrap().to_string(),\n \"invalid value: string \\\"123_pay_1a961ed9093c48b09781bf8ab17ba6bd\\\", expected a string with '_secret_' at line 1 column 42\"\n );\n }\n }",
|
| 464 |
+
"diff_span": {
|
| 465 |
+
"before": "",
|
| 466 |
+
"after": ""
|
| 467 |
+
},
|
| 468 |
+
"commit_sha": "7aef96ea7ee2604acf7c36a63d1a73d093c14b70",
|
| 469 |
+
"before_imports": [
|
| 470 |
+
"use masking::{ExposeInterface, PeekInterface, Secret};",
|
| 471 |
+
"use super::*;",
|
| 472 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 473 |
+
"use serde_json;",
|
| 474 |
+
"pub use client_secret_type::ClientSecret;",
|
| 475 |
+
"use crate::id_type::GlobalPaymentId;",
|
| 476 |
+
"use crate::id_type;",
|
| 477 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};"
|
| 478 |
+
],
|
| 479 |
+
"after_imports": [
|
| 480 |
+
"use super::*;",
|
| 481 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 482 |
+
"use serde_json;",
|
| 483 |
+
"pub use client_secret_type::ClientSecret;",
|
| 484 |
+
"use crate::id_type::GlobalPaymentId;",
|
| 485 |
+
"use crate::id_type;",
|
| 486 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};"
|
| 487 |
+
]
|
| 488 |
+
},
|
| 489 |
+
{
|
| 490 |
+
"id": "crates/common_utils/src/types.rs::ClientSecretVisitor::type::Value",
|
| 491 |
+
"file": "crates/common_utils/src/types.rs",
|
| 492 |
+
"kind": "type_item",
|
| 493 |
+
"status": "modified",
|
| 494 |
+
"code_changed": false,
|
| 495 |
+
"imports_changed": true,
|
| 496 |
+
"before_code": "type Value = ClientSecret;",
|
| 497 |
+
"after_code": "type Value = ClientSecret;",
|
| 498 |
+
"diff_span": {
|
| 499 |
+
"before": "",
|
| 500 |
+
"after": ""
|
| 501 |
+
},
|
| 502 |
+
"commit_sha": "7aef96ea7ee2604acf7c36a63d1a73d093c14b70",
|
| 503 |
+
"before_imports": [
|
| 504 |
+
"use masking::{ExposeInterface, PeekInterface, Secret};",
|
| 505 |
+
"pub use client_secret_type::ClientSecret;",
|
| 506 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 507 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};"
|
| 508 |
+
],
|
| 509 |
+
"after_imports": [
|
| 510 |
+
"pub use client_secret_type::ClientSecret;",
|
| 511 |
+
"use std::{\n borrow::Cow,\n fmt::Display,\n iter::Sum,\n ops::{Add, Deref, Mul, Sub},\n primitive::i64,\n str::{FromStr, SplitWhitespace},\n};",
|
| 512 |
+
"use rust_decimal::{\n prelude::{FromPrimitive, ToPrimitive},\n Decimal,\n};"
|
| 513 |
+
]
|
| 514 |
+
},
|
| 515 |
+
{
|
| 516 |
+
"id": "crates/common_utils/src/types.rs::impl::masking::Secret<String>",
|
| 517 |
+
"file": "crates/common_utils/src/types.rs",
|
| 518 |
+
"kind": "impl_item",
|
| 519 |
+
"status": "added",
|
| 520 |
+
"before_code": null,
|
| 521 |
+
"after_code": "impl From<&NameType> for masking::Secret<String> {\n fn from(card_holder_name: &NameType) -> Self {\n Self::new(card_holder_name.peek().to_string())\n }\n}",
|
| 522 |
+
"diff_span": null,
|
| 523 |
+
"commit_sha": "7aef96ea7ee2604acf7c36a63d1a73d093c14b70"
|
| 524 |
+
},
|
| 525 |
+
{
|
| 526 |
+
"id": "crates/common_utils/src/types.rs::masking::Secret<String>::function::from",
|
| 527 |
+
"file": "crates/common_utils/src/types.rs",
|
| 528 |
+
"kind": "function_item",
|
| 529 |
+
"status": "added",
|
| 530 |
+
"before_code": null,
|
| 531 |
+
"after_code": "fn from(card_holder_name: &NameType) -> Self {\n Self::new(card_holder_name.peek().to_string())\n }",
|
| 532 |
+
"diff_span": null,
|
| 533 |
+
"commit_sha": "7aef96ea7ee2604acf7c36a63d1a73d093c14b70"
|
| 534 |
+
},
|
| 535 |
+
{
|
| 536 |
+
"id": "crates/common_utils/src/types.rs::impl::Secret<String>",
|
| 537 |
+
"file": "crates/common_utils/src/types.rs",
|
| 538 |
+
"kind": "impl_item",
|
| 539 |
+
"status": "removed",
|
| 540 |
+
"before_code": "impl From<&NameType> for Secret<String> {\n fn from(card_holder_name: &NameType) -> Self {\n Self::new(card_holder_name.peek().to_string())\n }\n}",
|
| 541 |
+
"after_code": null,
|
| 542 |
+
"diff_span": null,
|
| 543 |
+
"commit_sha": "7aef96ea7ee2604acf7c36a63d1a73d093c14b70"
|
| 544 |
+
},
|
| 545 |
+
{
|
| 546 |
+
"id": "crates/common_utils/src/types.rs::Secret<String>::function::from",
|
| 547 |
+
"file": "crates/common_utils/src/types.rs",
|
| 548 |
+
"kind": "function_item",
|
| 549 |
+
"status": "removed",
|
| 550 |
+
"before_code": "fn from(card_holder_name: &NameType) -> Self {\n Self::new(card_holder_name.peek().to_string())\n }",
|
| 551 |
+
"after_code": null,
|
| 552 |
+
"diff_span": null,
|
| 553 |
+
"commit_sha": "7aef96ea7ee2604acf7c36a63d1a73d093c14b70"
|
| 554 |
+
}
|
| 555 |
+
]
|
| 556 |
+
}
|
diffs/pr_6734/8d5c164/diff.json
ADDED
|
@@ -0,0 +1,151 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "8d5c164b2021a63430941d5e8974ce1e43344d67",
|
| 3 |
+
"pr_number": 6734,
|
| 4 |
+
"rust_files": [
|
| 5 |
+
"crates/cards/src/lib.rs",
|
| 6 |
+
"crates/cards/tests/basic.rs"
|
| 7 |
+
],
|
| 8 |
+
"diffs": [
|
| 9 |
+
{
|
| 10 |
+
"id": "crates/cards/src/lib.rs::impl::CardHolderName",
|
| 11 |
+
"file": "crates/cards/src/lib.rs",
|
| 12 |
+
"kind": "impl_item",
|
| 13 |
+
"status": "modified",
|
| 14 |
+
"code_changed": true,
|
| 15 |
+
"imports_changed": true,
|
| 16 |
+
"before_code": "impl<'de> Deserialize<'de> for CardHolderName {\n fn deserialize<D>(deserializer: D) -> Result<Self, D::Error>\n where\n D: serde::Deserializer<'de>,\n {\n let card_holder_name = String::deserialize(deserializer)?;\n card_holder_name.try_into().map_err(de::Error::custom)\n }\n}",
|
| 17 |
+
"after_code": "impl Deref for CardHolderName {\n type Target = StrongSecret<String>;\n fn deref(&self) -> &Self::Target {\n &self.0\n }\n}",
|
| 18 |
+
"diff_span": {
|
| 19 |
+
"before": "impl<'de> Deserialize<'de> for CardHolderName {\n fn deserialize<D>(deserializer: D) -> Result<Self, D::Error>\n where\n D: serde::Deserializer<'de>,\n {\n let card_holder_name = String::deserialize(deserializer)?;\n card_holder_name.try_into().map_err(de::Error::custom)\n }\n}",
|
| 20 |
+
"after": "impl Deref for CardHolderName {\n type Target = StrongSecret<String>;\n fn deref(&self) -> &Self::Target {\n &self.0\n }\n}"
|
| 21 |
+
},
|
| 22 |
+
"commit_sha": "8d5c164b2021a63430941d5e8974ce1e43344d67",
|
| 23 |
+
"before_imports": [
|
| 24 |
+
"use serde::{de, Deserialize, Serialize};"
|
| 25 |
+
],
|
| 26 |
+
"after_imports": [
|
| 27 |
+
"use masking::{PeekInterface, StrongSecret};",
|
| 28 |
+
"use serde::{de, Deserialize, Serialize};",
|
| 29 |
+
"use std::ops::Deref;"
|
| 30 |
+
]
|
| 31 |
+
},
|
| 32 |
+
{
|
| 33 |
+
"id": "crates/cards/tests/basic.rs::function::test_card_security_code",
|
| 34 |
+
"file": "crates/cards/tests/basic.rs",
|
| 35 |
+
"kind": "function_item",
|
| 36 |
+
"status": "modified",
|
| 37 |
+
"code_changed": false,
|
| 38 |
+
"imports_changed": true,
|
| 39 |
+
"before_code": "fn test_card_security_code() {\n // no panic\n let valid_card_security_code = CardSecurityCode::try_from(1234).unwrap();\n\n assert_eq!(*valid_card_security_code.peek(), 1234);\n\n let serialized = serde_json::to_string(&valid_card_security_code).unwrap();\n assert_eq!(serialized, \"1234\");\n\n let derialized = serde_json::from_str::<CardSecurityCode>(&serialized).unwrap();\n assert_eq!(*derialized.peek(), 1234);\n\n let invalid_deserialization = serde_json::from_str::<CardSecurityCode>(\"00\");\n assert!(invalid_deserialization.is_err());\n}",
|
| 40 |
+
"after_code": "fn test_card_security_code() {\n // no panic\n let valid_card_security_code = CardSecurityCode::try_from(1234).unwrap();\n\n assert_eq!(*valid_card_security_code.peek(), 1234);\n\n let serialized = serde_json::to_string(&valid_card_security_code).unwrap();\n assert_eq!(serialized, \"1234\");\n\n let derialized = serde_json::from_str::<CardSecurityCode>(&serialized).unwrap();\n assert_eq!(*derialized.peek(), 1234);\n\n let invalid_deserialization = serde_json::from_str::<CardSecurityCode>(\"00\");\n assert!(invalid_deserialization.is_err());\n}",
|
| 41 |
+
"diff_span": {
|
| 42 |
+
"before": "",
|
| 43 |
+
"after": ""
|
| 44 |
+
},
|
| 45 |
+
"commit_sha": "8d5c164b2021a63430941d5e8974ce1e43344d67",
|
| 46 |
+
"before_imports": [
|
| 47 |
+
"use cards::{CardExpiration, CardExpirationMonth, CardExpirationYear, CardSecurityCode};"
|
| 48 |
+
],
|
| 49 |
+
"after_imports": [
|
| 50 |
+
"use cards::{\n CardExpiration, CardExpirationMonth, CardExpirationYear, CardHolderName, CardSecurityCode,\n};"
|
| 51 |
+
]
|
| 52 |
+
},
|
| 53 |
+
{
|
| 54 |
+
"id": "crates/cards/tests/basic.rs::function::test_card_expiration_year",
|
| 55 |
+
"file": "crates/cards/tests/basic.rs",
|
| 56 |
+
"kind": "function_item",
|
| 57 |
+
"status": "modified",
|
| 58 |
+
"code_changed": false,
|
| 59 |
+
"imports_changed": true,
|
| 60 |
+
"before_code": "fn test_card_expiration_year() {\n let curr_date = date_time::now();\n let curr_year = u16::try_from(curr_date.year()).expect(\"valid year\");\n\n // no panic\n let card_exp_year = CardExpirationYear::try_from(curr_year).unwrap();\n\n // will panic on unwrap\n let invalid_card_exp_year = CardExpirationYear::try_from(curr_year - 1);\n\n assert_eq!(*card_exp_year.peek(), curr_year);\n assert!(invalid_card_exp_year.is_err());\n\n let serialized = serde_json::to_string(&card_exp_year).unwrap();\n assert_eq!(serialized, curr_year.to_string());\n\n let derialized = serde_json::from_str::<CardExpirationYear>(&serialized).unwrap();\n assert_eq!(*derialized.peek(), curr_year);\n\n let invalid_deserialization = serde_json::from_str::<CardExpirationYear>(\"123\");\n assert!(invalid_deserialization.is_err());\n}",
|
| 61 |
+
"after_code": "fn test_card_expiration_year() {\n let curr_date = date_time::now();\n let curr_year = u16::try_from(curr_date.year()).expect(\"valid year\");\n\n // no panic\n let card_exp_year = CardExpirationYear::try_from(curr_year).unwrap();\n\n // will panic on unwrap\n let invalid_card_exp_year = CardExpirationYear::try_from(curr_year - 1);\n\n assert_eq!(*card_exp_year.peek(), curr_year);\n assert!(invalid_card_exp_year.is_err());\n\n let serialized = serde_json::to_string(&card_exp_year).unwrap();\n assert_eq!(serialized, curr_year.to_string());\n\n let derialized = serde_json::from_str::<CardExpirationYear>(&serialized).unwrap();\n assert_eq!(*derialized.peek(), curr_year);\n\n let invalid_deserialization = serde_json::from_str::<CardExpirationYear>(\"123\");\n assert!(invalid_deserialization.is_err());\n}",
|
| 62 |
+
"diff_span": {
|
| 63 |
+
"before": "",
|
| 64 |
+
"after": ""
|
| 65 |
+
},
|
| 66 |
+
"commit_sha": "8d5c164b2021a63430941d5e8974ce1e43344d67",
|
| 67 |
+
"before_imports": [
|
| 68 |
+
"use cards::{CardExpiration, CardExpirationMonth, CardExpirationYear, CardSecurityCode};",
|
| 69 |
+
"use common_utils::date_time;"
|
| 70 |
+
],
|
| 71 |
+
"after_imports": [
|
| 72 |
+
"use cards::{\n CardExpiration, CardExpirationMonth, CardExpirationYear, CardHolderName, CardSecurityCode,\n};",
|
| 73 |
+
"use common_utils::date_time;"
|
| 74 |
+
]
|
| 75 |
+
},
|
| 76 |
+
{
|
| 77 |
+
"id": "crates/cards/tests/basic.rs::function::test_card_expiration_month",
|
| 78 |
+
"file": "crates/cards/tests/basic.rs",
|
| 79 |
+
"kind": "function_item",
|
| 80 |
+
"status": "modified",
|
| 81 |
+
"code_changed": false,
|
| 82 |
+
"imports_changed": true,
|
| 83 |
+
"before_code": "fn test_card_expiration_month() {\n // no panic\n let card_exp_month = CardExpirationMonth::try_from(12).unwrap();\n\n // will panic on unwrap\n let invalid_card_exp_month = CardExpirationMonth::try_from(13);\n\n assert_eq!(*card_exp_month.peek(), 12);\n assert!(invalid_card_exp_month.is_err());\n\n let serialized = serde_json::to_string(&card_exp_month).unwrap();\n assert_eq!(serialized, \"12\");\n\n let derialized = serde_json::from_str::<CardExpirationMonth>(&serialized).unwrap();\n assert_eq!(*derialized.peek(), 12);\n\n let invalid_deserialization = serde_json::from_str::<CardExpirationMonth>(\"13\");\n assert!(invalid_deserialization.is_err());\n}",
|
| 84 |
+
"after_code": "fn test_card_expiration_month() {\n // no panic\n let card_exp_month = CardExpirationMonth::try_from(12).unwrap();\n\n // will panic on unwrap\n let invalid_card_exp_month = CardExpirationMonth::try_from(13);\n\n assert_eq!(*card_exp_month.peek(), 12);\n assert!(invalid_card_exp_month.is_err());\n\n let serialized = serde_json::to_string(&card_exp_month).unwrap();\n assert_eq!(serialized, \"12\");\n\n let derialized = serde_json::from_str::<CardExpirationMonth>(&serialized).unwrap();\n assert_eq!(*derialized.peek(), 12);\n\n let invalid_deserialization = serde_json::from_str::<CardExpirationMonth>(\"13\");\n assert!(invalid_deserialization.is_err());\n}",
|
| 85 |
+
"diff_span": {
|
| 86 |
+
"before": "",
|
| 87 |
+
"after": ""
|
| 88 |
+
},
|
| 89 |
+
"commit_sha": "8d5c164b2021a63430941d5e8974ce1e43344d67",
|
| 90 |
+
"before_imports": [
|
| 91 |
+
"use cards::{CardExpiration, CardExpirationMonth, CardExpirationYear, CardSecurityCode};"
|
| 92 |
+
],
|
| 93 |
+
"after_imports": [
|
| 94 |
+
"use cards::{\n CardExpiration, CardExpirationMonth, CardExpirationYear, CardHolderName, CardSecurityCode,\n};"
|
| 95 |
+
]
|
| 96 |
+
},
|
| 97 |
+
{
|
| 98 |
+
"id": "crates/cards/tests/basic.rs::function::test_card_expiration",
|
| 99 |
+
"file": "crates/cards/tests/basic.rs",
|
| 100 |
+
"kind": "function_item",
|
| 101 |
+
"status": "modified",
|
| 102 |
+
"code_changed": true,
|
| 103 |
+
"imports_changed": true,
|
| 104 |
+
"before_code": "fn test_card_expiration() {\n let curr_date = date_time::now();\n let curr_year = u16::try_from(curr_date.year()).expect(\"valid year\");\n let curr_month = u8::from(curr_date.month());\n\n // no panic\n let card_exp = CardExpiration::try_from((curr_month, curr_year)).unwrap();\n\n // will panic on unwrap\n let invalid_card_exp = CardExpiration::try_from((13, curr_year));\n\n assert_eq!(*card_exp.get_month().peek(), curr_month);\n assert_eq!(*card_exp.get_year().peek(), curr_year);\n assert!(!card_exp.is_expired().unwrap());\n\n assert!(invalid_card_exp.is_err());\n\n let serialized = serde_json::to_string(&card_exp).unwrap();\n let expected_string = format!(r#\"{{\"month\":{},\"year\":{}}}\"#, 3, curr_year);\n assert_eq!(serialized, expected_string);\n\n let derialized = serde_json::from_str::<CardExpiration>(&serialized).unwrap();\n assert_eq!(*derialized.get_month().peek(), 3);\n assert_eq!(*derialized.get_year().peek(), curr_year);\n\n let invalid_serialized_string = r#\"{\"month\":13,\"year\":123}\"#;\n let invalid_deserialization = serde_json::from_str::<CardExpiration>(invalid_serialized_string);\n assert!(invalid_deserialization.is_err());\n}",
|
| 105 |
+
"after_code": "fn test_card_expiration() {\n let curr_date = date_time::now();\n let curr_year = u16::try_from(curr_date.year()).expect(\"valid year\");\n let curr_month = u8::from(curr_date.month());\n\n // no panic\n let card_exp = CardExpiration::try_from((curr_month, curr_year)).unwrap();\n\n // will panic on unwrap\n let invalid_card_exp = CardExpiration::try_from((13, curr_year));\n\n assert_eq!(*card_exp.get_month().peek(), curr_month);\n assert_eq!(*card_exp.get_year().peek(), curr_year);\n assert!(!card_exp.is_expired().unwrap());\n\n assert!(invalid_card_exp.is_err());\n\n let serialized = serde_json::to_string(&card_exp).unwrap();\n let expected_string = format!(r#\"{{\"month\":{},\"year\":{}}}\"#, curr_month, curr_year);\n assert_eq!(serialized, expected_string);\n\n let derialized = serde_json::from_str::<CardExpiration>(&serialized).unwrap();\n assert_eq!(*derialized.get_month().peek(), curr_month);\n assert_eq!(*derialized.get_year().peek(), curr_year);\n\n let invalid_serialized_string = r#\"{\"month\":13,\"year\":123}\"#;\n let invalid_deserialization = serde_json::from_str::<CardExpiration>(invalid_serialized_string);\n assert!(invalid_deserialization.is_err());\n}",
|
| 106 |
+
"diff_span": {
|
| 107 |
+
"before": "\n let serialized = serde_json::to_string(&card_exp).unwrap();\n let expected_string = format!(r#\"{{\"month\":{},\"year\":{}}}\"#, 3, curr_year);\n assert_eq!(serialized, expected_string);\n\n let derialized = serde_json::from_str::<CardExpiration>(&serialized).unwrap();\n assert_eq!(*derialized.get_month().peek(), 3);\n assert_eq!(*derialized.get_year().peek(), curr_year);\n",
|
| 108 |
+
"after": "\n let serialized = serde_json::to_string(&card_exp).unwrap();\n let expected_string = format!(r#\"{{\"month\":{},\"year\":{}}}\"#, curr_month, curr_year);\n assert_eq!(serialized, expected_string);\n\n let derialized = serde_json::from_str::<CardExpiration>(&serialized).unwrap();\n assert_eq!(*derialized.get_month().peek(), curr_month);\n assert_eq!(*derialized.get_year().peek(), curr_year);\n"
|
| 109 |
+
},
|
| 110 |
+
"commit_sha": "8d5c164b2021a63430941d5e8974ce1e43344d67",
|
| 111 |
+
"before_imports": [
|
| 112 |
+
"use cards::{CardExpiration, CardExpirationMonth, CardExpirationYear, CardSecurityCode};",
|
| 113 |
+
"use common_utils::date_time;"
|
| 114 |
+
],
|
| 115 |
+
"after_imports": [
|
| 116 |
+
"use cards::{\n CardExpiration, CardExpirationMonth, CardExpirationYear, CardHolderName, CardSecurityCode,\n};",
|
| 117 |
+
"use common_utils::date_time;"
|
| 118 |
+
]
|
| 119 |
+
},
|
| 120 |
+
{
|
| 121 |
+
"id": "crates/cards/tests/basic.rs::function::test_card_holder_name",
|
| 122 |
+
"file": "crates/cards/tests/basic.rs",
|
| 123 |
+
"kind": "function_item",
|
| 124 |
+
"status": "added",
|
| 125 |
+
"before_code": null,
|
| 126 |
+
"after_code": "fn test_card_holder_name() {\n // no panic\n let card_holder_name = CardHolderName::try_from(\"Sakil O'Neil\".to_string()).unwrap();\n\n // will panic on unwrap\n let invalid_card_holder_name = CardHolderName::try_from(\"$@k!l M*$t@k\".to_string());\n\n assert_eq!(*card_holder_name.peek(), \"Sakil O'Neil\");\n assert!(invalid_card_holder_name.is_err());\n\n let serialized = serde_json::to_string(&card_holder_name).unwrap();\n assert_eq!(&serialized, \"\\\"Sakil O'Neil\\\"\");\n\n let derialized = serde_json::from_str::<CardHolderName>(&serialized).unwrap();\n assert_eq!(*derialized.peek(), \"Sakil O'Neil\".to_string());\n\n let invalid_deserialization = serde_json::from_str::<CardHolderName>(\"$@k!l M*$t@k\");\n assert!(invalid_deserialization.is_err());\n}",
|
| 127 |
+
"diff_span": null,
|
| 128 |
+
"commit_sha": "8d5c164b2021a63430941d5e8974ce1e43344d67"
|
| 129 |
+
},
|
| 130 |
+
{
|
| 131 |
+
"id": "crates/cards/src/lib.rs::CardHolderName::function::deref",
|
| 132 |
+
"file": "crates/cards/src/lib.rs",
|
| 133 |
+
"kind": "function_item",
|
| 134 |
+
"status": "added",
|
| 135 |
+
"before_code": null,
|
| 136 |
+
"after_code": "fn deref(&self) -> &Self::Target {\n &self.0\n }",
|
| 137 |
+
"diff_span": null,
|
| 138 |
+
"commit_sha": "8d5c164b2021a63430941d5e8974ce1e43344d67"
|
| 139 |
+
},
|
| 140 |
+
{
|
| 141 |
+
"id": "crates/cards/src/lib.rs::CardHolderName::type::Target",
|
| 142 |
+
"file": "crates/cards/src/lib.rs",
|
| 143 |
+
"kind": "type_item",
|
| 144 |
+
"status": "added",
|
| 145 |
+
"before_code": null,
|
| 146 |
+
"after_code": "type Target = StrongSecret<String>;",
|
| 147 |
+
"diff_span": null,
|
| 148 |
+
"commit_sha": "8d5c164b2021a63430941d5e8974ce1e43344d67"
|
| 149 |
+
}
|
| 150 |
+
]
|
| 151 |
+
}
|
diffs/pr_6734/998f990/diff.json
ADDED
|
@@ -0,0 +1,101 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "998f9900c6db0976ca0492b0569614fc4e1f3407",
|
| 3 |
+
"pr_number": 6734,
|
| 4 |
+
"rust_files": [
|
| 5 |
+
"crates/api_models/src/payment_methods.rs",
|
| 6 |
+
"crates/router/src/core/payment_methods.rs",
|
| 7 |
+
"crates/router/src/core/payment_methods/transformers.rs"
|
| 8 |
+
],
|
| 9 |
+
"diffs": [
|
| 10 |
+
{
|
| 11 |
+
"id": "crates/api_models/src/payment_methods.rs::struct::CardDetailUpdate",
|
| 12 |
+
"file": "crates/api_models/src/payment_methods.rs",
|
| 13 |
+
"kind": "struct_item",
|
| 14 |
+
"status": "modified",
|
| 15 |
+
"code_changed": true,
|
| 16 |
+
"imports_changed": false,
|
| 17 |
+
"before_code": "pub struct CardDetailUpdate {\n /// Card Holder Name\n #[schema(value_type = String,example = \"John Doe\")]\n pub card_holder_name: Option<NameType>,\n\n /// Card Holder's Nick Name\n #[schema(value_type = Option<String>,example = \"John Doe\")]\n pub nick_name: Option<masking::Secret<String>>,\n}",
|
| 18 |
+
"after_code": "pub struct CardDetailUpdate {\n /// Card Holder Name\n #[schema(value_type = String,example = \"John Doe\")]\n pub card_holder_name: Option<NameType>,\n\n /// Card Holder's Nick Name\n #[schema(value_type = Option<String>,example = \"John Doe\")]\n pub nick_name: Option<NameType>,\n}",
|
| 19 |
+
"diff_span": {
|
| 20 |
+
"before": " /// Card Holder's Nick Name\n #[schema(value_type = Option<String>,example = \"John Doe\")]\n pub nick_name: Option<masking::Secret<String>>,\n}",
|
| 21 |
+
"after": " /// Card Holder's Nick Name\n #[schema(value_type = Option<String>,example = \"John Doe\")]\n pub nick_name: Option<NameType>,\n}"
|
| 22 |
+
},
|
| 23 |
+
"commit_sha": "998f9900c6db0976ca0492b0569614fc4e1f3407"
|
| 24 |
+
},
|
| 25 |
+
{
|
| 26 |
+
"id": "crates/api_models/src/payment_methods.rs::CardDetailUpdate::function::apply",
|
| 27 |
+
"file": "crates/api_models/src/payment_methods.rs",
|
| 28 |
+
"kind": "function_item",
|
| 29 |
+
"status": "modified",
|
| 30 |
+
"code_changed": true,
|
| 31 |
+
"imports_changed": false,
|
| 32 |
+
"before_code": "pub fn apply(&self, card_data_from_locker: Card) -> CardDetail {\n CardDetail {\n card_number: card_data_from_locker.card_number,\n card_exp_month: card_data_from_locker.card_exp_month,\n card_exp_year: card_data_from_locker.card_exp_year,\n card_holder_name: self\n .card_holder_name\n .clone()\n .or(card_data_from_locker.name_on_card),\n nick_name: self\n .nick_name\n .clone()\n .or(card_data_from_locker.nick_name.map(masking::Secret::new)),\n card_issuing_country: None,\n card_network: None,\n card_issuer: None,\n card_type: None,\n }\n }",
|
| 33 |
+
"after_code": "pub fn apply(&self, card_data_from_locker: Card) -> CardDetail {\n CardDetail {\n card_number: card_data_from_locker.card_number,\n card_exp_month: card_data_from_locker.card_exp_month,\n card_exp_year: card_data_from_locker.card_exp_year,\n card_holder_name: self\n .card_holder_name\n .clone()\n .or(card_data_from_locker.name_on_card),\n nick_name: self.nick_name.clone().or(card_data_from_locker.nick_name),\n card_issuing_country: None,\n card_network: None,\n card_issuer: None,\n card_type: None,\n }\n }",
|
| 34 |
+
"diff_span": {
|
| 35 |
+
"before": " .clone()\n .or(card_data_from_locker.name_on_card),\n nick_name: self\n .nick_name\n .clone()\n .or(card_data_from_locker.nick_name.map(masking::Secret::new)),\n card_issuing_country: None,\n card_network: None,",
|
| 36 |
+
"after": " .clone()\n .or(card_data_from_locker.name_on_card),\n nick_name: self.nick_name.clone().or(card_data_from_locker.nick_name),\n card_issuing_country: None,\n card_network: None,"
|
| 37 |
+
},
|
| 38 |
+
"commit_sha": "998f9900c6db0976ca0492b0569614fc4e1f3407"
|
| 39 |
+
},
|
| 40 |
+
{
|
| 41 |
+
"id": "crates/api_models/src/payment_methods.rs::struct::CardDetail",
|
| 42 |
+
"file": "crates/api_models/src/payment_methods.rs",
|
| 43 |
+
"kind": "struct_item",
|
| 44 |
+
"status": "modified",
|
| 45 |
+
"code_changed": true,
|
| 46 |
+
"imports_changed": false,
|
| 47 |
+
"before_code": "pub struct CardDetail {\n /// Card Number\n #[schema(value_type = String,example = \"4111111145551142\")]\n pub card_number: CardNumber,\n\n /// Card Expiry Month\n #[schema(value_type = String,example = \"10\")]\n pub card_exp_month: masking::Secret<String>,\n\n /// Card Expiry Year\n #[schema(value_type = String,example = \"25\")]\n pub card_exp_year: masking::Secret<String>,\n\n /// Card Holder Name\n #[schema(value_type = String,example = \"John Doe\")]\n pub card_holder_name: Option<masking::Secret<String>>,\n\n /// Card Holder's Nick Name\n #[schema(value_type = Option<String>,example = \"John Doe\")]\n pub nick_name: Option<masking::Secret<String>>,\n\n /// Card Issuing Country\n #[schema(value_type = CountryAlpha2)]\n pub card_issuing_country: Option<api_enums::CountryAlpha2>,\n\n /// Card's Network\n #[schema(value_type = Option<CardNetwork>)]\n pub card_network: Option<api_enums::CardNetwork>,\n\n /// Issuer Bank for Card\n pub card_issuer: Option<String>,\n\n /// Card Type\n pub card_type: Option<CardType>,\n}",
|
| 48 |
+
"after_code": "pub struct CardDetail {\n /// Card Number\n #[schema(value_type = String,example = \"4111111145551142\")]\n pub card_number: CardNumber,\n\n /// Card Expiry Month\n #[schema(value_type = String,example = \"10\")]\n pub card_exp_month: masking::Secret<String>,\n\n /// Card Expiry Year\n #[schema(value_type = String,example = \"25\")]\n pub card_exp_year: masking::Secret<String>,\n\n /// Card Holder Name\n #[schema(value_type = String,example = \"John Doe\")]\n pub card_holder_name: Option<NameType>,\n\n /// Card Holder's Nick Name\n #[schema(value_type = Option<String>,example = \"John Doe\")]\n pub nick_name: Option<NameType>,\n\n /// Card Issuing Country\n #[schema(value_type = CountryAlpha2)]\n pub card_issuing_country: Option<api_enums::CountryAlpha2>,\n\n /// Card's Network\n #[schema(value_type = Option<CardNetwork>)]\n pub card_network: Option<api_enums::CardNetwork>,\n\n /// Issuer Bank for Card\n pub card_issuer: Option<String>,\n\n /// Card Type\n pub card_type: Option<CardType>,\n}",
|
| 49 |
+
"diff_span": {
|
| 50 |
+
"before": " /// Card Holder Name\n #[schema(value_type = String,example = \"John Doe\")]\n pub card_holder_name: Option<masking::Secret<String>>,\n\n /// Card Holder's Nick Name\n #[schema(value_type = Option<String>,example = \"John Doe\")]\n pub nick_name: Option<masking::Secret<String>>,\n\n /// Card Issuing Country",
|
| 51 |
+
"after": " /// Card Holder Name\n #[schema(value_type = String,example = \"John Doe\")]\n pub card_holder_name: Option<NameType>,\n\n /// Card Holder's Nick Name\n #[schema(value_type = Option<String>,example = \"John Doe\")]\n pub nick_name: Option<NameType>,\n\n /// Card Issuing Country"
|
| 52 |
+
},
|
| 53 |
+
"commit_sha": "998f9900c6db0976ca0492b0569614fc4e1f3407"
|
| 54 |
+
},
|
| 55 |
+
{
|
| 56 |
+
"id": "crates/api_models/src/payment_methods.rs::struct::CardDetailFromLocker",
|
| 57 |
+
"file": "crates/api_models/src/payment_methods.rs",
|
| 58 |
+
"kind": "struct_item",
|
| 59 |
+
"status": "modified",
|
| 60 |
+
"code_changed": true,
|
| 61 |
+
"imports_changed": false,
|
| 62 |
+
"before_code": "pub struct CardDetailFromLocker {\n #[schema(value_type = Option<CountryAlpha2>)]\n pub issuer_country: Option<api_enums::CountryAlpha2>,\n pub last4_digits: Option<String>,\n #[serde(skip)]\n #[schema(value_type=Option<String>)]\n pub card_number: Option<CardNumber>,\n\n #[schema(value_type=Option<String>)]\n pub expiry_month: Option<masking::Secret<String>>,\n\n #[schema(value_type=Option<String>)]\n pub expiry_year: Option<masking::Secret<String>>,\n\n #[schema(value_type=Option<String>)]\n pub card_holder_name: Option<NameType>,\n\n #[schema(value_type=Option<String>)]\n pub card_fingerprint: Option<masking::Secret<String>>,\n\n #[schema(value_type=Option<String>)]\n pub nick_name: Option<masking::Secret<String>>,\n\n #[schema(value_type = Option<CardNetwork>)]\n pub card_network: Option<api_enums::CardNetwork>,\n\n pub card_isin: Option<String>,\n pub card_issuer: Option<String>,\n pub card_type: Option<String>,\n pub saved_to_locker: bool,\n}",
|
| 63 |
+
"after_code": "pub struct CardDetailFromLocker {\n #[schema(value_type = Option<CountryAlpha2>)]\n pub issuer_country: Option<api_enums::CountryAlpha2>,\n pub last4_digits: Option<String>,\n #[serde(skip)]\n #[schema(value_type=Option<String>)]\n pub card_number: Option<CardNumber>,\n\n #[schema(value_type=Option<String>)]\n pub expiry_month: Option<masking::Secret<String>>,\n\n #[schema(value_type=Option<String>)]\n pub expiry_year: Option<masking::Secret<String>>,\n\n #[schema(value_type=Option<String>)]\n pub card_holder_name: Option<NameType>,\n\n #[schema(value_type=Option<String>)]\n pub card_fingerprint: Option<masking::Secret<String>>,\n\n #[schema(value_type=Option<String>)]\n pub nick_name: Option<NameType>,\n\n #[schema(value_type = Option<CardNetwork>)]\n pub card_network: Option<api_enums::CardNetwork>,\n\n pub card_isin: Option<String>,\n pub card_issuer: Option<String>,\n pub card_type: Option<String>,\n pub saved_to_locker: bool,\n}",
|
| 64 |
+
"diff_span": {
|
| 65 |
+
"before": "\n #[schema(value_type=Option<String>)]\n pub nick_name: Option<masking::Secret<String>>,\n\n #[schema(value_type = Option<CardNetwork>)]",
|
| 66 |
+
"after": "\n #[schema(value_type=Option<String>)]\n pub nick_name: Option<NameType>,\n\n #[schema(value_type = Option<CardNetwork>)]"
|
| 67 |
+
},
|
| 68 |
+
"commit_sha": "998f9900c6db0976ca0492b0569614fc4e1f3407"
|
| 69 |
+
},
|
| 70 |
+
{
|
| 71 |
+
"id": "crates/api_models/src/payment_methods.rs::impl::CardDetailUpdate",
|
| 72 |
+
"file": "crates/api_models/src/payment_methods.rs",
|
| 73 |
+
"kind": "impl_item",
|
| 74 |
+
"status": "modified",
|
| 75 |
+
"code_changed": true,
|
| 76 |
+
"imports_changed": false,
|
| 77 |
+
"before_code": "impl CardDetailUpdate {\n pub fn apply(&self, card_data_from_locker: Card) -> CardDetail {\n CardDetail {\n card_number: card_data_from_locker.card_number,\n card_exp_month: card_data_from_locker.card_exp_month,\n card_exp_year: card_data_from_locker.card_exp_year,\n card_holder_name: self\n .card_holder_name\n .clone()\n .or(card_data_from_locker.name_on_card),\n nick_name: self\n .nick_name\n .clone()\n .or(card_data_from_locker.nick_name.map(masking::Secret::new)),\n card_issuing_country: None,\n card_network: None,\n card_issuer: None,\n card_type: None,\n }\n }\n}",
|
| 78 |
+
"after_code": "impl CardDetailUpdate {\n pub fn apply(&self, card_data_from_locker: Card) -> CardDetail {\n CardDetail {\n card_number: card_data_from_locker.card_number,\n card_exp_month: card_data_from_locker.card_exp_month,\n card_exp_year: card_data_from_locker.card_exp_year,\n card_holder_name: self\n .card_holder_name\n .clone()\n .or(card_data_from_locker.name_on_card),\n nick_name: self.nick_name.clone().or(card_data_from_locker.nick_name),\n card_issuing_country: None,\n card_network: None,\n card_issuer: None,\n card_type: None,\n }\n }\n}",
|
| 79 |
+
"diff_span": {
|
| 80 |
+
"before": " .clone()\n .or(card_data_from_locker.name_on_card),\n nick_name: self\n .nick_name\n .clone()\n .or(card_data_from_locker.nick_name.map(masking::Secret::new)),\n card_issuing_country: None,\n card_network: None,",
|
| 81 |
+
"after": " .clone()\n .or(card_data_from_locker.name_on_card),\n nick_name: self.nick_name.clone().or(card_data_from_locker.nick_name),\n card_issuing_country: None,\n card_network: None,"
|
| 82 |
+
},
|
| 83 |
+
"commit_sha": "998f9900c6db0976ca0492b0569614fc4e1f3407"
|
| 84 |
+
},
|
| 85 |
+
{
|
| 86 |
+
"id": "crates/router/src/core/payment_methods/transformers.rs::function::get_card_detail",
|
| 87 |
+
"file": "crates/router/src/core/payment_methods/transformers.rs",
|
| 88 |
+
"kind": "function_item",
|
| 89 |
+
"status": "modified",
|
| 90 |
+
"code_changed": true,
|
| 91 |
+
"imports_changed": false,
|
| 92 |
+
"before_code": "pub fn get_card_detail(\n _pm: &domain::PaymentMethod,\n response: Card,\n) -> CustomResult<api::CardDetailFromLocker, errors::VaultError> {\n let card_number = response.card_number;\n let last4_digits = card_number.clone().get_last4();\n //fetch form card bin\n\n let card_detail = api::CardDetailFromLocker {\n issuer_country: None,\n last4_digits: Some(last4_digits),\n card_number: Some(card_number),\n expiry_month: Some(response.card_exp_month),\n expiry_year: Some(response.card_exp_year),\n card_fingerprint: None,\n card_holder_name: response.name_on_card,\n nick_name: response.nick_name.map(Secret::new),\n card_isin: None,\n card_issuer: None,\n card_network: None,\n card_type: None,\n saved_to_locker: true,\n };\n Ok(card_detail)\n}",
|
| 93 |
+
"after_code": "pub fn get_card_detail(\n _pm: &domain::PaymentMethod,\n response: Card,\n) -> CustomResult<api::CardDetailFromLocker, errors::VaultError> {\n let card_number = response.card_number;\n let last4_digits = card_number.clone().get_last4();\n //fetch form card bin\n\n let card_detail = api::CardDetailFromLocker {\n issuer_country: None,\n last4_digits: Some(last4_digits),\n card_number: Some(card_number),\n expiry_month: Some(response.card_exp_month),\n expiry_year: Some(response.card_exp_year),\n card_fingerprint: None,\n card_holder_name: response.name_on_card,\n nick_name: response.nick_name,\n card_isin: None,\n card_issuer: None,\n card_network: None,\n card_type: None,\n saved_to_locker: true,\n };\n Ok(card_detail)\n}",
|
| 94 |
+
"diff_span": {
|
| 95 |
+
"before": " card_fingerprint: None,\n card_holder_name: response.name_on_card,\n nick_name: response.nick_name.map(Secret::new),\n card_isin: None,\n card_issuer: None,",
|
| 96 |
+
"after": " card_fingerprint: None,\n card_holder_name: response.name_on_card,\n nick_name: response.nick_name,\n card_isin: None,\n card_issuer: None,"
|
| 97 |
+
},
|
| 98 |
+
"commit_sha": "998f9900c6db0976ca0492b0569614fc4e1f3407"
|
| 99 |
+
}
|
| 100 |
+
]
|
| 101 |
+
}
|
diffs/pr_6734/b830c16/diff.json
ADDED
|
@@ -0,0 +1,24 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "b830c169e95e74884719aa37142fb660a1bc1842",
|
| 3 |
+
"pr_number": 6734,
|
| 4 |
+
"rust_files": [
|
| 5 |
+
"crates/hyperswitch_connectors/src/connectors/trustpay/transformers.rs"
|
| 6 |
+
],
|
| 7 |
+
"diffs": [
|
| 8 |
+
{
|
| 9 |
+
"id": "crates/hyperswitch_connectors/src/connectors/trustpay/transformers.rs::function::get_bank_transfer_debtor_info",
|
| 10 |
+
"file": "crates/hyperswitch_connectors/src/connectors/trustpay/transformers.rs",
|
| 11 |
+
"kind": "function_item",
|
| 12 |
+
"status": "modified",
|
| 13 |
+
"code_changed": true,
|
| 14 |
+
"imports_changed": false,
|
| 15 |
+
"before_code": "fn get_bank_transfer_debtor_info(\n item: &PaymentsAuthorizeRouterData,\n pm: TrustpayBankTransferPaymentMethod,\n params: TrustpayMandatoryParams,\n) -> CustomResult<Option<DebtorInformation>, errors::ConnectorError> {\n let billing_last_name = item\n .get_billing()?\n .address\n .as_ref()\n .and_then(|address| address.last_name.clone());\n Ok(match pm {\n TrustpayBankTransferPaymentMethod::SepaCreditTransfer\n | TrustpayBankTransferPaymentMethod::InstantBankTransfer => Some(DebtorInformation {\n name: get_full_name(params.billing_first_name, billing_last_name),\n email: item.request.get_email()?,\n }),\n })\n}",
|
| 16 |
+
"after_code": "fn get_bank_transfer_debtor_info(\n item: &PaymentsAuthorizeRouterData,\n pm: TrustpayBankTransferPaymentMethod,\n params: TrustpayMandatoryParams,\n) -> CustomResult<Option<DebtorInformation>, errors::ConnectorError> {\n let billing_last_name = item\n .get_billing()?\n .address\n .as_ref()\n .and_then(|address| address.last_name.clone());\n Ok(match pm {\n TrustpayBankTransferPaymentMethod::SepaCreditTransfer\n | TrustpayBankTransferPaymentMethod::InstantBankTransfer => Some(DebtorInformation {\n name: get_full_name(params.billing_first_name, billing_last_name.map(From::from)),\n email: item.request.get_email()?,\n }),\n })\n}",
|
| 17 |
+
"diff_span": {
|
| 18 |
+
"before": " TrustpayBankTransferPaymentMethod::SepaCreditTransfer\n | TrustpayBankTransferPaymentMethod::InstantBankTransfer => Some(DebtorInformation {\n name: get_full_name(params.billing_first_name, billing_last_name),\n email: item.request.get_email()?,\n }),",
|
| 19 |
+
"after": " TrustpayBankTransferPaymentMethod::SepaCreditTransfer\n | TrustpayBankTransferPaymentMethod::InstantBankTransfer => Some(DebtorInformation {\n name: get_full_name(params.billing_first_name, billing_last_name.map(From::from)),\n email: item.request.get_email()?,\n }),"
|
| 20 |
+
},
|
| 21 |
+
"commit_sha": "b830c169e95e74884719aa37142fb660a1bc1842"
|
| 22 |
+
}
|
| 23 |
+
]
|
| 24 |
+
}
|
diffs/pr_6734/e565311/diff.json
ADDED
|
@@ -0,0 +1,57 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "e5653114c2d7f02d62159bf5b7d3a38f9de93f51",
|
| 3 |
+
"pr_number": 6734,
|
| 4 |
+
"rust_files": [
|
| 5 |
+
"crates/common_utils/src/types.rs",
|
| 6 |
+
"crates/hyperswitch_domain_models/src/payment_method_data.rs",
|
| 7 |
+
"crates/router/src/connector/netcetera/netcetera_types.rs",
|
| 8 |
+
"crates/router/src/core/payment_methods/network_tokenization.rs"
|
| 9 |
+
],
|
| 10 |
+
"diffs": [
|
| 11 |
+
{
|
| 12 |
+
"id": "crates/hyperswitch_domain_models/src/payment_method_data.rs::CardDetailsPaymentMethod::function::from",
|
| 13 |
+
"file": "crates/hyperswitch_domain_models/src/payment_method_data.rs",
|
| 14 |
+
"kind": "function_item",
|
| 15 |
+
"status": "modified",
|
| 16 |
+
"code_changed": true,
|
| 17 |
+
"imports_changed": false,
|
| 18 |
+
"before_code": "fn from(item: payment_methods::CardDetail) -> Self {\n Self {\n issuer_country: item.card_issuing_country.map(|c| c.to_string()),\n last4_digits: Some(item.card_number.get_last4()),\n expiry_month: Some(item.card_exp_month),\n expiry_year: Some(item.card_exp_year),\n card_holder_name: item.card_holder_name,\n nick_name: item.nick_name,\n card_isin: None,\n card_issuer: item.card_issuer,\n card_network: item.card_network,\n card_type: item.card_type.map(|card| card.to_string()),\n saved_to_locker: true,\n }\n }",
|
| 19 |
+
"after_code": "fn from(item: payment_methods::CardDetail) -> Self {\n Self {\n issuer_country: item.card_issuing_country.map(|c| c.to_string()),\n last4_digits: Some(item.card_number.get_last4()),\n expiry_month: Some(item.card_exp_month),\n expiry_year: Some(item.card_exp_year),\n card_holder_name: item.card_holder_name.map(From::from),\n nick_name: item.nick_name.map(From::from),\n card_isin: None,\n card_issuer: item.card_issuer,\n card_network: item.card_network,\n card_type: item.card_type.map(|card| card.to_string()),\n saved_to_locker: true,\n }\n }",
|
| 20 |
+
"diff_span": {
|
| 21 |
+
"before": " expiry_month: Some(item.card_exp_month),\n expiry_year: Some(item.card_exp_year),\n card_holder_name: item.card_holder_name,\n nick_name: item.nick_name,\n card_isin: None,\n card_issuer: item.card_issuer,",
|
| 22 |
+
"after": " expiry_month: Some(item.card_exp_month),\n expiry_year: Some(item.card_exp_year),\n card_holder_name: item.card_holder_name.map(From::from),\n nick_name: item.nick_name.map(From::from),\n card_isin: None,\n card_issuer: item.card_issuer,"
|
| 23 |
+
},
|
| 24 |
+
"commit_sha": "e5653114c2d7f02d62159bf5b7d3a38f9de93f51"
|
| 25 |
+
},
|
| 26 |
+
{
|
| 27 |
+
"id": "crates/hyperswitch_domain_models/src/payment_method_data.rs::impl::CardDetailsPaymentMethod",
|
| 28 |
+
"file": "crates/hyperswitch_domain_models/src/payment_method_data.rs",
|
| 29 |
+
"kind": "impl_item",
|
| 30 |
+
"status": "modified",
|
| 31 |
+
"code_changed": true,
|
| 32 |
+
"imports_changed": false,
|
| 33 |
+
"before_code": "impl From<payment_methods::CardDetail> for CardDetailsPaymentMethod {\n fn from(item: payment_methods::CardDetail) -> Self {\n Self {\n issuer_country: item.card_issuing_country.map(|c| c.to_string()),\n last4_digits: Some(item.card_number.get_last4()),\n expiry_month: Some(item.card_exp_month),\n expiry_year: Some(item.card_exp_year),\n card_holder_name: item.card_holder_name,\n nick_name: item.nick_name,\n card_isin: None,\n card_issuer: item.card_issuer,\n card_network: item.card_network,\n card_type: item.card_type.map(|card| card.to_string()),\n saved_to_locker: true,\n }\n }\n}",
|
| 34 |
+
"after_code": "impl From<payment_methods::CardDetail> for CardDetailsPaymentMethod {\n fn from(item: payment_methods::CardDetail) -> Self {\n Self {\n issuer_country: item.card_issuing_country.map(|c| c.to_string()),\n last4_digits: Some(item.card_number.get_last4()),\n expiry_month: Some(item.card_exp_month),\n expiry_year: Some(item.card_exp_year),\n card_holder_name: item.card_holder_name.map(From::from),\n nick_name: item.nick_name.map(From::from),\n card_isin: None,\n card_issuer: item.card_issuer,\n card_network: item.card_network,\n card_type: item.card_type.map(|card| card.to_string()),\n saved_to_locker: true,\n }\n }\n}",
|
| 35 |
+
"diff_span": {
|
| 36 |
+
"before": " expiry_month: Some(item.card_exp_month),\n expiry_year: Some(item.card_exp_year),\n card_holder_name: item.card_holder_name,\n nick_name: item.nick_name,\n card_isin: None,\n card_issuer: item.card_issuer,",
|
| 37 |
+
"after": " expiry_month: Some(item.card_exp_month),\n expiry_year: Some(item.card_exp_year),\n card_holder_name: item.card_holder_name.map(From::from),\n nick_name: item.nick_name.map(From::from),\n card_isin: None,\n card_issuer: item.card_issuer,"
|
| 38 |
+
},
|
| 39 |
+
"commit_sha": "e5653114c2d7f02d62159bf5b7d3a38f9de93f51"
|
| 40 |
+
},
|
| 41 |
+
{
|
| 42 |
+
"id": "crates/router/src/core/payment_methods/network_tokenization.rs::function::make_card_network_tokenization_request",
|
| 43 |
+
"file": "crates/router/src/core/payment_methods/network_tokenization.rs",
|
| 44 |
+
"kind": "function_item",
|
| 45 |
+
"status": "modified",
|
| 46 |
+
"code_changed": true,
|
| 47 |
+
"imports_changed": false,
|
| 48 |
+
"before_code": "pub async fn make_card_network_tokenization_request(\n state: &routes::SessionState,\n card: &api_payment_methods::CardDetail,\n customer_id: &id_type::GlobalCustomerId,\n) -> CustomResult<(NetworkTokenDetails, String), errors::NetworkTokenizationError> {\n let card_data = domain::CardData {\n card_number: card.card_number.clone(),\n exp_month: card.card_exp_month.clone(),\n exp_year: card.card_exp_year.clone(),\n card_security_code: None,\n };\n\n let payload = card_data\n .encode_to_string_of_json()\n .and_then(|x| x.encode_to_string_of_json())\n .change_context(errors::NetworkTokenizationError::RequestEncodingFailed)?;\n\n let payload_bytes = payload.as_bytes();\n let network_tokenization_service = match &state.conf.network_tokenization_service {\n Some(nt_service) => Ok(nt_service.get_inner()),\n None => Err(report!(\n errors::NetworkTokenizationError::NetworkTokenizationServiceNotConfigured\n )),\n }?;\n\n let (resp, network_token_req_ref_id) = record_operation_time(\n async {\n generate_network_token(\n state,\n payload_bytes,\n customer_id.clone(),\n network_tokenization_service,\n )\n .await\n .inspect_err(|e| logger::error!(error=?e, \"Error while making tokenization request\"))\n },\n &metrics::GENERATE_NETWORK_TOKEN_TIME,\n router_env::metric_attributes!((\"locker\", \"rust\")),\n )\n .await?;\n\n let network_token_details = NetworkTokenDetails {\n network_token: resp.token,\n network_token_exp_month: resp.token_expiry_month,\n network_token_exp_year: resp.token_expiry_year,\n card_issuer: card.card_issuer.clone(),\n card_network: Some(resp.card_brand),\n card_type: card.card_type.clone(),\n card_issuing_country: card.card_issuing_country,\n card_holder_name: card.card_holder_name.clone(),\n nick_name: card.nick_name.clone(),\n };\n Ok((network_token_details, network_token_req_ref_id))\n}",
|
| 49 |
+
"after_code": "pub async fn make_card_network_tokenization_request(\n state: &routes::SessionState,\n card: &api_payment_methods::CardDetail,\n customer_id: &id_type::GlobalCustomerId,\n) -> CustomResult<(NetworkTokenDetails, String), errors::NetworkTokenizationError> {\n let card_data = domain::CardData {\n card_number: card.card_number.clone(),\n exp_month: card.card_exp_month.clone(),\n exp_year: card.card_exp_year.clone(),\n card_security_code: None,\n };\n\n let payload = card_data\n .encode_to_string_of_json()\n .and_then(|x| x.encode_to_string_of_json())\n .change_context(errors::NetworkTokenizationError::RequestEncodingFailed)?;\n\n let payload_bytes = payload.as_bytes();\n let network_tokenization_service = match &state.conf.network_tokenization_service {\n Some(nt_service) => Ok(nt_service.get_inner()),\n None => Err(report!(\n errors::NetworkTokenizationError::NetworkTokenizationServiceNotConfigured\n )),\n }?;\n\n let (resp, network_token_req_ref_id) = record_operation_time(\n async {\n generate_network_token(\n state,\n payload_bytes,\n customer_id.clone(),\n network_tokenization_service,\n )\n .await\n .inspect_err(|e| logger::error!(error=?e, \"Error while making tokenization request\"))\n },\n &metrics::GENERATE_NETWORK_TOKEN_TIME,\n router_env::metric_attributes!((\"locker\", \"rust\")),\n )\n .await?;\n\n let network_token_details = NetworkTokenDetails {\n network_token: resp.token,\n network_token_exp_month: resp.token_expiry_month,\n network_token_exp_year: resp.token_expiry_year,\n card_issuer: card.card_issuer.clone(),\n card_network: Some(resp.card_brand),\n card_type: card.card_type.clone(),\n card_issuing_country: card.card_issuing_country,\n card_holder_name: card.card_holder_name.clone().map(From::from),\n nick_name: card.nick_name.clone().map(From::from),\n };\n Ok((network_token_details, network_token_req_ref_id))\n}",
|
| 50 |
+
"diff_span": {
|
| 51 |
+
"before": " card_type: card.card_type.clone(),\n card_issuing_country: card.card_issuing_country,\n card_holder_name: card.card_holder_name.clone(),\n nick_name: card.nick_name.clone(),\n };\n Ok((network_token_details, network_token_req_ref_id))",
|
| 52 |
+
"after": " card_type: card.card_type.clone(),\n card_issuing_country: card.card_issuing_country,\n card_holder_name: card.card_holder_name.clone().map(From::from),\n nick_name: card.nick_name.clone().map(From::from),\n };\n Ok((network_token_details, network_token_req_ref_id))"
|
| 53 |
+
},
|
| 54 |
+
"commit_sha": "e5653114c2d7f02d62159bf5b7d3a38f9de93f51"
|
| 55 |
+
}
|
| 56 |
+
]
|
| 57 |
+
}
|
diffs/pr_6734/f04391a/diff.json
ADDED
|
@@ -0,0 +1,85 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "f04391ac2e720ff3d6ab0ac796fc820bb58960ef",
|
| 3 |
+
"pr_number": 6734,
|
| 4 |
+
"rust_files": [
|
| 5 |
+
"crates/hyperswitch_connectors/src/utils.rs",
|
| 6 |
+
"crates/router/src/core/unified_authentication_service.rs"
|
| 7 |
+
],
|
| 8 |
+
"diffs": [
|
| 9 |
+
{
|
| 10 |
+
"id": "crates/router/src/core/unified_authentication_service.rs::ExternalAuthentication::function::get_pre_authentication_request_data",
|
| 11 |
+
"file": "crates/router/src/core/unified_authentication_service.rs",
|
| 12 |
+
"kind": "function_item",
|
| 13 |
+
"status": "modified",
|
| 14 |
+
"code_changed": true,
|
| 15 |
+
"imports_changed": false,
|
| 16 |
+
"before_code": "fn get_pre_authentication_request_data(\n payment_data: &PaymentData<F>,\n ) -> RouterResult<UasPreAuthenticationRequestData> {\n let payment_method_data = payment_data\n .payment_method_data\n .as_ref()\n .ok_or(ApiErrorResponse::InternalServerError)\n .attach_printable(\"payment_data.payment_method_data is missing\")?;\n let payment_details =\n if let payment_method_data::PaymentMethodData::Card(card) = payment_method_data {\n Some(PaymentDetails {\n pan: card.card_number.clone(),\n digital_card_id: None,\n payment_data_type: None,\n encrypted_src_card_details: None,\n card_expiry_date: card.card_exp_year.clone(),\n cardholder_name: card.card_holder_name.clone(),\n card_token_number: card.card_cvc.clone(),\n account_type: card.card_network.clone(),\n })\n } else {\n None\n };\n Ok(UasPreAuthenticationRequestData {\n service_details: None,\n transaction_details: None,\n payment_details,\n })\n }",
|
| 17 |
+
"after_code": "fn get_pre_authentication_request_data(\n payment_data: &PaymentData<F>,\n ) -> RouterResult<UasPreAuthenticationRequestData> {\n let payment_method_data = payment_data\n .payment_method_data\n .as_ref()\n .ok_or(ApiErrorResponse::InternalServerError)\n .attach_printable(\"payment_data.payment_method_data is missing\")?;\n let payment_details =\n if let payment_method_data::PaymentMethodData::Card(card) = payment_method_data {\n Some(PaymentDetails {\n pan: card.card_number.clone(),\n digital_card_id: None,\n payment_data_type: None,\n encrypted_src_card_details: None,\n card_expiry_date: card.card_exp_year.clone(),\n cardholder_name: card.card_holder_name.clone().map(From::from),\n card_token_number: card.card_cvc.clone(),\n account_type: card.card_network.clone(),\n })\n } else {\n None\n };\n Ok(UasPreAuthenticationRequestData {\n service_details: None,\n transaction_details: None,\n payment_details,\n })\n }",
|
| 18 |
+
"diff_span": {
|
| 19 |
+
"before": " encrypted_src_card_details: None,\n card_expiry_date: card.card_exp_year.clone(),\n cardholder_name: card.card_holder_name.clone(),\n card_token_number: card.card_cvc.clone(),\n account_type: card.card_network.clone(),",
|
| 20 |
+
"after": " encrypted_src_card_details: None,\n card_expiry_date: card.card_exp_year.clone(),\n cardholder_name: card.card_holder_name.clone().map(From::from),\n card_token_number: card.card_cvc.clone(),\n account_type: card.card_network.clone(),"
|
| 21 |
+
},
|
| 22 |
+
"commit_sha": "f04391ac2e720ff3d6ab0ac796fc820bb58960ef"
|
| 23 |
+
},
|
| 24 |
+
{
|
| 25 |
+
"id": "crates/hyperswitch_connectors/src/utils.rs::impl::AddressDetails",
|
| 26 |
+
"file": "crates/hyperswitch_connectors/src/utils.rs",
|
| 27 |
+
"kind": "impl_item",
|
| 28 |
+
"status": "modified",
|
| 29 |
+
"code_changed": true,
|
| 30 |
+
"imports_changed": false,
|
| 31 |
+
"before_code": "impl AddressDetailsData for AddressDetails {\n fn get_first_name(&self) -> Result<Secret<String>, Error> {\n self.first_name\n .clone()\n .map(From::from)\n .ok_or_else(missing_field_err(\"address.first_name\"))\n }\n\n fn get_last_name(&self) -> Result<Secret<String>, Error> {\n self.last_name\n .clone()\n .map(From::from)\n .ok_or_else(missing_field_err(\"address.last_name\"))\n }\n\n fn get_full_name(&self) -> Result<Secret<String>, Error> {\n let first_name = self.get_first_name()?.expose();\n let last_name = self\n .get_last_name()\n .unwrap_or(Secret::new(\"\".to_string()))\n .expose();\n let full_name = format!(\"{} {}\", first_name, last_name).trim().to_string();\n Ok(Secret::new(full_name))\n }\n\n fn get_line1(&self) -> Result<&Secret<String>, Error> {\n self.line1\n .as_ref()\n .ok_or_else(missing_field_err(\"address.line1\"))\n }\n\n fn get_city(&self) -> Result<&String, Error> {\n self.city\n .as_ref()\n .ok_or_else(missing_field_err(\"address.city\"))\n }\n\n fn get_state(&self) -> Result<&Secret<String>, Error> {\n self.state\n .as_ref()\n .ok_or_else(missing_field_err(\"address.state\"))\n }\n\n fn get_line2(&self) -> Result<&Secret<String>, Error> {\n self.line2\n .as_ref()\n .ok_or_else(missing_field_err(\"address.line2\"))\n }\n\n fn get_zip(&self) -> Result<&Secret<String>, Error> {\n self.zip\n .as_ref()\n .ok_or_else(missing_field_err(\"address.zip\"))\n }\n\n fn get_country(&self) -> Result<&api_models::enums::CountryAlpha2, Error> {\n self.country\n .as_ref()\n .ok_or_else(missing_field_err(\"address.country\"))\n }\n\n fn get_combined_address_line(&self) -> Result<Secret<String>, Error> {\n Ok(Secret::new(format!(\n \"{},{}\",\n self.get_line1()?.peek(),\n self.get_line2()?.peek()\n )))\n }\n\n fn to_state_code(&self) -> Result<Secret<String>, Error> {\n let country = self.get_country()?;\n let state = self.get_state()?;\n match country {\n api_models::enums::CountryAlpha2::US => Ok(Secret::new(\n UsStatesAbbreviation::foreign_try_from(state.peek().to_string())?.to_string(),\n )),\n api_models::enums::CountryAlpha2::CA => Ok(Secret::new(\n CanadaStatesAbbreviation::foreign_try_from(state.peek().to_string())?.to_string(),\n )),\n _ => Ok(state.clone()),\n }\n }\n fn to_state_code_as_optional(&self) -> Result<Option<Secret<String>>, Error> {\n self.state\n .as_ref()\n .map(|state| {\n if state.peek().len() == 2 {\n Ok(state.to_owned())\n } else {\n self.to_state_code()\n }\n })\n .transpose()\n }\n\n fn get_optional_city(&self) -> Option<String> {\n self.city.clone()\n }\n\n fn get_optional_line1(&self) -> Option<Secret<String>> {\n self.line1.clone()\n }\n\n fn get_optional_line2(&self) -> Option<Secret<String>> {\n self.line2.clone()\n }\n\n fn get_optional_first_name(&self) -> Option<Secret<String>> {\n self.first_name.clone()\n }\n\n fn get_optional_last_name(&self) -> Option<Secret<String>> {\n self.last_name.clone()\n }\n}",
|
| 32 |
+
"after_code": "impl AddressDetailsData for AddressDetails {\n fn get_first_name(&self) -> Result<Secret<String>, Error> {\n self.first_name\n .clone()\n .map(From::from)\n .ok_or_else(missing_field_err(\"address.first_name\"))\n }\n\n fn get_last_name(&self) -> Result<Secret<String>, Error> {\n self.last_name\n .clone()\n .map(From::from)\n .ok_or_else(missing_field_err(\"address.last_name\"))\n }\n\n fn get_full_name(&self) -> Result<Secret<String>, Error> {\n let first_name = self.get_first_name()?.expose();\n let last_name = self\n .get_last_name()\n .unwrap_or(Secret::new(\"\".to_string()))\n .expose();\n let full_name = format!(\"{} {}\", first_name, last_name).trim().to_string();\n Ok(Secret::new(full_name))\n }\n\n fn get_line1(&self) -> Result<&Secret<String>, Error> {\n self.line1\n .as_ref()\n .ok_or_else(missing_field_err(\"address.line1\"))\n }\n\n fn get_city(&self) -> Result<&String, Error> {\n self.city\n .as_ref()\n .ok_or_else(missing_field_err(\"address.city\"))\n }\n\n fn get_state(&self) -> Result<&Secret<String>, Error> {\n self.state\n .as_ref()\n .ok_or_else(missing_field_err(\"address.state\"))\n }\n\n fn get_line2(&self) -> Result<&Secret<String>, Error> {\n self.line2\n .as_ref()\n .ok_or_else(missing_field_err(\"address.line2\"))\n }\n\n fn get_zip(&self) -> Result<&Secret<String>, Error> {\n self.zip\n .as_ref()\n .ok_or_else(missing_field_err(\"address.zip\"))\n }\n\n fn get_country(&self) -> Result<&api_models::enums::CountryAlpha2, Error> {\n self.country\n .as_ref()\n .ok_or_else(missing_field_err(\"address.country\"))\n }\n\n fn get_combined_address_line(&self) -> Result<Secret<String>, Error> {\n Ok(Secret::new(format!(\n \"{},{}\",\n self.get_line1()?.peek(),\n self.get_line2()?.peek()\n )))\n }\n\n fn to_state_code(&self) -> Result<Secret<String>, Error> {\n let country = self.get_country()?;\n let state = self.get_state()?;\n match country {\n api_models::enums::CountryAlpha2::US => Ok(Secret::new(\n UsStatesAbbreviation::foreign_try_from(state.peek().to_string())?.to_string(),\n )),\n api_models::enums::CountryAlpha2::CA => Ok(Secret::new(\n CanadaStatesAbbreviation::foreign_try_from(state.peek().to_string())?.to_string(),\n )),\n _ => Ok(state.clone()),\n }\n }\n fn to_state_code_as_optional(&self) -> Result<Option<Secret<String>>, Error> {\n self.state\n .as_ref()\n .map(|state| {\n if state.peek().len() == 2 {\n Ok(state.to_owned())\n } else {\n self.to_state_code()\n }\n })\n .transpose()\n }\n\n fn get_optional_city(&self) -> Option<String> {\n self.city.clone()\n }\n\n fn get_optional_line1(&self) -> Option<Secret<String>> {\n self.line1.clone()\n }\n\n fn get_optional_line2(&self) -> Option<Secret<String>> {\n self.line2.clone()\n }\n\n fn get_optional_first_name(&self) -> Option<Secret<String>> {\n self.first_name.clone().map(From::from)\n }\n\n fn get_optional_last_name(&self) -> Option<Secret<String>> {\n self.last_name.clone().map(From::from)\n }\n}",
|
| 33 |
+
"diff_span": {
|
| 34 |
+
"before": "\n fn get_optional_first_name(&self) -> Option<Secret<String>> {\n self.first_name.clone()\n }\n\n fn get_optional_last_name(&self) -> Option<Secret<String>> {\n self.last_name.clone()\n }\n}",
|
| 35 |
+
"after": "\n fn get_optional_first_name(&self) -> Option<Secret<String>> {\n self.first_name.clone().map(From::from)\n }\n\n fn get_optional_last_name(&self) -> Option<Secret<String>> {\n self.last_name.clone().map(From::from)\n }\n}"
|
| 36 |
+
},
|
| 37 |
+
"commit_sha": "f04391ac2e720ff3d6ab0ac796fc820bb58960ef"
|
| 38 |
+
},
|
| 39 |
+
{
|
| 40 |
+
"id": "crates/router/src/core/unified_authentication_service.rs::impl::ExternalAuthentication",
|
| 41 |
+
"file": "crates/router/src/core/unified_authentication_service.rs",
|
| 42 |
+
"kind": "impl_item",
|
| 43 |
+
"status": "modified",
|
| 44 |
+
"code_changed": true,
|
| 45 |
+
"imports_changed": false,
|
| 46 |
+
"before_code": "impl<F: Clone + Sync> UnifiedAuthenticationService<F> for ExternalAuthentication {\n fn get_pre_authentication_request_data(\n payment_data: &PaymentData<F>,\n ) -> RouterResult<UasPreAuthenticationRequestData> {\n let payment_method_data = payment_data\n .payment_method_data\n .as_ref()\n .ok_or(ApiErrorResponse::InternalServerError)\n .attach_printable(\"payment_data.payment_method_data is missing\")?;\n let payment_details =\n if let payment_method_data::PaymentMethodData::Card(card) = payment_method_data {\n Some(PaymentDetails {\n pan: card.card_number.clone(),\n digital_card_id: None,\n payment_data_type: None,\n encrypted_src_card_details: None,\n card_expiry_date: card.card_exp_year.clone(),\n cardholder_name: card.card_holder_name.clone(),\n card_token_number: card.card_cvc.clone(),\n account_type: card.card_network.clone(),\n })\n } else {\n None\n };\n Ok(UasPreAuthenticationRequestData {\n service_details: None,\n transaction_details: None,\n payment_details,\n })\n }\n\n #[allow(clippy::too_many_arguments)]\n async fn pre_authentication(\n state: &SessionState,\n _key_store: &domain::MerchantKeyStore,\n _business_profile: &domain::Profile,\n payment_data: &PaymentData<F>,\n merchant_connector_account: &MerchantConnectorAccountType,\n connector_name: &str,\n authentication_id: &str,\n payment_method: common_enums::PaymentMethod,\n ) -> RouterResult<UasPreAuthenticationRouterData> {\n let pre_authentication_data = Self::get_pre_authentication_request_data(payment_data)?;\n\n let pre_auth_router_data: UasPreAuthenticationRouterData =\n utils::construct_uas_router_data(\n state,\n connector_name.to_string(),\n payment_method,\n payment_data.payment_attempt.merchant_id.clone(),\n None,\n pre_authentication_data,\n merchant_connector_account,\n Some(authentication_id.to_owned()),\n )?;\n\n utils::do_auth_connector_call(\n state,\n UNIFIED_AUTHENTICATION_SERVICE.to_string(),\n pre_auth_router_data,\n )\n .await\n }\n\n fn get_authentication_request_data(\n payment_method_data: domain::PaymentMethodData,\n billing_address: hyperswitch_domain_models::address::Address,\n shipping_address: Option<hyperswitch_domain_models::address::Address>,\n browser_details: Option<BrowserInformation>,\n amount: Option<common_utils::types::MinorUnit>,\n currency: Option<common_enums::Currency>,\n message_category: MessageCategory,\n device_channel: payments::DeviceChannel,\n authentication: Authentication,\n return_url: Option<String>,\n sdk_information: Option<payments::SdkInformation>,\n threeds_method_comp_ind: payments::ThreeDsCompletionIndicator,\n email: Option<common_utils::pii::Email>,\n webhook_url: String,\n three_ds_requestor_url: String,\n ) -> RouterResult<UasAuthenticationRequestData> {\n Ok(UasAuthenticationRequestData {\n payment_method_data,\n billing_address,\n shipping_address,\n browser_details,\n transaction_details: TransactionDetails {\n amount,\n currency,\n device_channel: Some(device_channel),\n message_category: Some(message_category),\n },\n pre_authentication_data: PreAuthenticationData {\n threeds_server_transaction_id: authentication.threeds_server_transaction_id.ok_or(\n ApiErrorResponse::MissingRequiredField {\n field_name: \"authentication.threeds_server_transaction_id\",\n },\n )?,\n message_version: authentication.message_version.ok_or(\n ApiErrorResponse::MissingRequiredField {\n field_name: \"authentication.message_version\",\n },\n )?,\n acquirer_bin: authentication.acquirer_bin,\n acquirer_merchant_id: authentication.acquirer_merchant_id,\n acquirer_country_code: authentication.acquirer_country_code,\n connector_metadata: authentication.connector_metadata,\n },\n return_url,\n sdk_information,\n email,\n threeds_method_comp_ind,\n three_ds_requestor_url,\n webhook_url,\n })\n }\n\n #[allow(clippy::too_many_arguments)]\n async fn authentication(\n state: &SessionState,\n business_profile: &domain::Profile,\n payment_method: common_enums::PaymentMethod,\n payment_method_data: domain::PaymentMethodData,\n billing_address: hyperswitch_domain_models::address::Address,\n shipping_address: Option<hyperswitch_domain_models::address::Address>,\n browser_details: Option<BrowserInformation>,\n amount: Option<common_utils::types::MinorUnit>,\n currency: Option<common_enums::Currency>,\n message_category: MessageCategory,\n device_channel: payments::DeviceChannel,\n authentication: Authentication,\n return_url: Option<String>,\n sdk_information: Option<payments::SdkInformation>,\n threeds_method_comp_ind: payments::ThreeDsCompletionIndicator,\n email: Option<common_utils::pii::Email>,\n webhook_url: String,\n three_ds_requestor_url: String,\n merchant_connector_account: &MerchantConnectorAccountType,\n connector_name: &str,\n ) -> RouterResult<UasAuthenticationRouterData> {\n let authentication_data =\n <Self as UnifiedAuthenticationService<F>>::get_authentication_request_data(\n payment_method_data,\n billing_address,\n shipping_address,\n browser_details,\n amount,\n currency,\n message_category,\n device_channel,\n authentication.clone(),\n return_url,\n sdk_information,\n threeds_method_comp_ind,\n email,\n webhook_url,\n three_ds_requestor_url,\n )?;\n let auth_router_data: UasAuthenticationRouterData = utils::construct_uas_router_data(\n state,\n connector_name.to_string(),\n payment_method,\n business_profile.merchant_id.clone(),\n None,\n authentication_data,\n merchant_connector_account,\n Some(authentication.authentication_id.to_owned()),\n )?;\n\n Box::pin(utils::do_auth_connector_call(\n state,\n UNIFIED_AUTHENTICATION_SERVICE.to_string(),\n auth_router_data,\n ))\n .await\n }\n\n fn get_post_authentication_request_data(\n authentication: Option<Authentication>,\n ) -> RouterResult<UasPostAuthenticationRequestData> {\n Ok(UasPostAuthenticationRequestData {\n // authentication.threeds_server_transaction_id is mandatory for post-authentication in ExternalAuthentication\n threeds_server_transaction_id: Some(\n authentication\n .and_then(|auth| auth.threeds_server_transaction_id)\n .ok_or(ApiErrorResponse::MissingRequiredField {\n field_name: \"authentication.threeds_server_transaction_id\",\n })?,\n ),\n })\n }\n\n async fn post_authentication(\n state: &SessionState,\n _key_store: &domain::MerchantKeyStore,\n business_profile: &domain::Profile,\n _payment_data: &PaymentData<F>,\n merchant_connector_account: &MerchantConnectorAccountType,\n connector_name: &str,\n payment_method: common_enums::PaymentMethod,\n authentication: Option<Authentication>,\n ) -> RouterResult<UasPostAuthenticationRouterData> {\n let authentication_data =\n <Self as UnifiedAuthenticationService<F>>::get_post_authentication_request_data(\n authentication.clone(),\n )?;\n let auth_router_data: UasPostAuthenticationRouterData = utils::construct_uas_router_data(\n state,\n connector_name.to_string(),\n payment_method,\n business_profile.merchant_id.clone(),\n None,\n authentication_data,\n merchant_connector_account,\n authentication.map(|auth| auth.authentication_id),\n )?;\n\n utils::do_auth_connector_call(\n state,\n UNIFIED_AUTHENTICATION_SERVICE.to_string(),\n auth_router_data,\n )\n .await\n }\n\n fn confirmation(\n _state: &SessionState,\n _key_store: &domain::MerchantKeyStore,\n _business_profile: &domain::Profile,\n _merchant_connector_account: &MerchantConnectorAccountType,\n ) -> RouterResult<()> {\n Ok(())\n }\n}",
|
| 47 |
+
"after_code": "impl<F: Clone + Sync> UnifiedAuthenticationService<F> for ExternalAuthentication {\n fn get_pre_authentication_request_data(\n payment_data: &PaymentData<F>,\n ) -> RouterResult<UasPreAuthenticationRequestData> {\n let payment_method_data = payment_data\n .payment_method_data\n .as_ref()\n .ok_or(ApiErrorResponse::InternalServerError)\n .attach_printable(\"payment_data.payment_method_data is missing\")?;\n let payment_details =\n if let payment_method_data::PaymentMethodData::Card(card) = payment_method_data {\n Some(PaymentDetails {\n pan: card.card_number.clone(),\n digital_card_id: None,\n payment_data_type: None,\n encrypted_src_card_details: None,\n card_expiry_date: card.card_exp_year.clone(),\n cardholder_name: card.card_holder_name.clone().map(From::from),\n card_token_number: card.card_cvc.clone(),\n account_type: card.card_network.clone(),\n })\n } else {\n None\n };\n Ok(UasPreAuthenticationRequestData {\n service_details: None,\n transaction_details: None,\n payment_details,\n })\n }\n\n #[allow(clippy::too_many_arguments)]\n async fn pre_authentication(\n state: &SessionState,\n _key_store: &domain::MerchantKeyStore,\n _business_profile: &domain::Profile,\n payment_data: &PaymentData<F>,\n merchant_connector_account: &MerchantConnectorAccountType,\n connector_name: &str,\n authentication_id: &str,\n payment_method: common_enums::PaymentMethod,\n ) -> RouterResult<UasPreAuthenticationRouterData> {\n let pre_authentication_data = Self::get_pre_authentication_request_data(payment_data)?;\n\n let pre_auth_router_data: UasPreAuthenticationRouterData =\n utils::construct_uas_router_data(\n state,\n connector_name.to_string(),\n payment_method,\n payment_data.payment_attempt.merchant_id.clone(),\n None,\n pre_authentication_data,\n merchant_connector_account,\n Some(authentication_id.to_owned()),\n )?;\n\n utils::do_auth_connector_call(\n state,\n UNIFIED_AUTHENTICATION_SERVICE.to_string(),\n pre_auth_router_data,\n )\n .await\n }\n\n fn get_authentication_request_data(\n payment_method_data: domain::PaymentMethodData,\n billing_address: hyperswitch_domain_models::address::Address,\n shipping_address: Option<hyperswitch_domain_models::address::Address>,\n browser_details: Option<BrowserInformation>,\n amount: Option<common_utils::types::MinorUnit>,\n currency: Option<common_enums::Currency>,\n message_category: MessageCategory,\n device_channel: payments::DeviceChannel,\n authentication: Authentication,\n return_url: Option<String>,\n sdk_information: Option<payments::SdkInformation>,\n threeds_method_comp_ind: payments::ThreeDsCompletionIndicator,\n email: Option<common_utils::pii::Email>,\n webhook_url: String,\n three_ds_requestor_url: String,\n ) -> RouterResult<UasAuthenticationRequestData> {\n Ok(UasAuthenticationRequestData {\n payment_method_data,\n billing_address,\n shipping_address,\n browser_details,\n transaction_details: TransactionDetails {\n amount,\n currency,\n device_channel: Some(device_channel),\n message_category: Some(message_category),\n },\n pre_authentication_data: PreAuthenticationData {\n threeds_server_transaction_id: authentication.threeds_server_transaction_id.ok_or(\n ApiErrorResponse::MissingRequiredField {\n field_name: \"authentication.threeds_server_transaction_id\",\n },\n )?,\n message_version: authentication.message_version.ok_or(\n ApiErrorResponse::MissingRequiredField {\n field_name: \"authentication.message_version\",\n },\n )?,\n acquirer_bin: authentication.acquirer_bin,\n acquirer_merchant_id: authentication.acquirer_merchant_id,\n acquirer_country_code: authentication.acquirer_country_code,\n connector_metadata: authentication.connector_metadata,\n },\n return_url,\n sdk_information,\n email,\n threeds_method_comp_ind,\n three_ds_requestor_url,\n webhook_url,\n })\n }\n\n #[allow(clippy::too_many_arguments)]\n async fn authentication(\n state: &SessionState,\n business_profile: &domain::Profile,\n payment_method: common_enums::PaymentMethod,\n payment_method_data: domain::PaymentMethodData,\n billing_address: hyperswitch_domain_models::address::Address,\n shipping_address: Option<hyperswitch_domain_models::address::Address>,\n browser_details: Option<BrowserInformation>,\n amount: Option<common_utils::types::MinorUnit>,\n currency: Option<common_enums::Currency>,\n message_category: MessageCategory,\n device_channel: payments::DeviceChannel,\n authentication: Authentication,\n return_url: Option<String>,\n sdk_information: Option<payments::SdkInformation>,\n threeds_method_comp_ind: payments::ThreeDsCompletionIndicator,\n email: Option<common_utils::pii::Email>,\n webhook_url: String,\n three_ds_requestor_url: String,\n merchant_connector_account: &MerchantConnectorAccountType,\n connector_name: &str,\n ) -> RouterResult<UasAuthenticationRouterData> {\n let authentication_data =\n <Self as UnifiedAuthenticationService<F>>::get_authentication_request_data(\n payment_method_data,\n billing_address,\n shipping_address,\n browser_details,\n amount,\n currency,\n message_category,\n device_channel,\n authentication.clone(),\n return_url,\n sdk_information,\n threeds_method_comp_ind,\n email,\n webhook_url,\n three_ds_requestor_url,\n )?;\n let auth_router_data: UasAuthenticationRouterData = utils::construct_uas_router_data(\n state,\n connector_name.to_string(),\n payment_method,\n business_profile.merchant_id.clone(),\n None,\n authentication_data,\n merchant_connector_account,\n Some(authentication.authentication_id.to_owned()),\n )?;\n\n Box::pin(utils::do_auth_connector_call(\n state,\n UNIFIED_AUTHENTICATION_SERVICE.to_string(),\n auth_router_data,\n ))\n .await\n }\n\n fn get_post_authentication_request_data(\n authentication: Option<Authentication>,\n ) -> RouterResult<UasPostAuthenticationRequestData> {\n Ok(UasPostAuthenticationRequestData {\n // authentication.threeds_server_transaction_id is mandatory for post-authentication in ExternalAuthentication\n threeds_server_transaction_id: Some(\n authentication\n .and_then(|auth| auth.threeds_server_transaction_id)\n .ok_or(ApiErrorResponse::MissingRequiredField {\n field_name: \"authentication.threeds_server_transaction_id\",\n })?,\n ),\n })\n }\n\n async fn post_authentication(\n state: &SessionState,\n _key_store: &domain::MerchantKeyStore,\n business_profile: &domain::Profile,\n _payment_data: &PaymentData<F>,\n merchant_connector_account: &MerchantConnectorAccountType,\n connector_name: &str,\n payment_method: common_enums::PaymentMethod,\n authentication: Option<Authentication>,\n ) -> RouterResult<UasPostAuthenticationRouterData> {\n let authentication_data =\n <Self as UnifiedAuthenticationService<F>>::get_post_authentication_request_data(\n authentication.clone(),\n )?;\n let auth_router_data: UasPostAuthenticationRouterData = utils::construct_uas_router_data(\n state,\n connector_name.to_string(),\n payment_method,\n business_profile.merchant_id.clone(),\n None,\n authentication_data,\n merchant_connector_account,\n authentication.map(|auth| auth.authentication_id),\n )?;\n\n utils::do_auth_connector_call(\n state,\n UNIFIED_AUTHENTICATION_SERVICE.to_string(),\n auth_router_data,\n )\n .await\n }\n\n fn confirmation(\n _state: &SessionState,\n _key_store: &domain::MerchantKeyStore,\n _business_profile: &domain::Profile,\n _merchant_connector_account: &MerchantConnectorAccountType,\n ) -> RouterResult<()> {\n Ok(())\n }\n}",
|
| 48 |
+
"diff_span": {
|
| 49 |
+
"before": " encrypted_src_card_details: None,\n card_expiry_date: card.card_exp_year.clone(),\n cardholder_name: card.card_holder_name.clone(),\n card_token_number: card.card_cvc.clone(),\n account_type: card.card_network.clone(),",
|
| 50 |
+
"after": " encrypted_src_card_details: None,\n card_expiry_date: card.card_exp_year.clone(),\n cardholder_name: card.card_holder_name.clone().map(From::from),\n card_token_number: card.card_cvc.clone(),\n account_type: card.card_network.clone(),"
|
| 51 |
+
},
|
| 52 |
+
"commit_sha": "f04391ac2e720ff3d6ab0ac796fc820bb58960ef"
|
| 53 |
+
},
|
| 54 |
+
{
|
| 55 |
+
"id": "crates/hyperswitch_connectors/src/utils.rs::AddressDetails::function::get_optional_last_name",
|
| 56 |
+
"file": "crates/hyperswitch_connectors/src/utils.rs",
|
| 57 |
+
"kind": "function_item",
|
| 58 |
+
"status": "modified",
|
| 59 |
+
"code_changed": true,
|
| 60 |
+
"imports_changed": false,
|
| 61 |
+
"before_code": "fn get_optional_last_name(&self) -> Option<Secret<String>> {\n self.last_name.clone()\n }",
|
| 62 |
+
"after_code": "fn get_optional_last_name(&self) -> Option<Secret<String>> {\n self.last_name.clone().map(From::from)\n }",
|
| 63 |
+
"diff_span": {
|
| 64 |
+
"before": "fn get_optional_last_name(&self) -> Option<Secret<String>> {\n self.last_name.clone()\n }",
|
| 65 |
+
"after": "fn get_optional_last_name(&self) -> Option<Secret<String>> {\n self.last_name.clone().map(From::from)\n }"
|
| 66 |
+
},
|
| 67 |
+
"commit_sha": "f04391ac2e720ff3d6ab0ac796fc820bb58960ef"
|
| 68 |
+
},
|
| 69 |
+
{
|
| 70 |
+
"id": "crates/hyperswitch_connectors/src/utils.rs::AddressDetails::function::get_optional_first_name",
|
| 71 |
+
"file": "crates/hyperswitch_connectors/src/utils.rs",
|
| 72 |
+
"kind": "function_item",
|
| 73 |
+
"status": "modified",
|
| 74 |
+
"code_changed": true,
|
| 75 |
+
"imports_changed": false,
|
| 76 |
+
"before_code": "fn get_optional_first_name(&self) -> Option<Secret<String>> {\n self.first_name.clone()\n }",
|
| 77 |
+
"after_code": "fn get_optional_first_name(&self) -> Option<Secret<String>> {\n self.first_name.clone().map(From::from)\n }",
|
| 78 |
+
"diff_span": {
|
| 79 |
+
"before": "fn get_optional_first_name(&self) -> Option<Secret<String>> {\n self.first_name.clone()\n }",
|
| 80 |
+
"after": "fn get_optional_first_name(&self) -> Option<Secret<String>> {\n self.first_name.clone().map(From::from)\n }"
|
| 81 |
+
},
|
| 82 |
+
"commit_sha": "f04391ac2e720ff3d6ab0ac796fc820bb58960ef"
|
| 83 |
+
}
|
| 84 |
+
]
|
| 85 |
+
}
|
diffs/pr_6734/f8980db/diff.json
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
diffs/pr_6752/b02793b/diff.json
ADDED
|
@@ -0,0 +1,6 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "b02793b319ab563ca369bd2c61d536e551bc0f57",
|
| 3 |
+
"pr_number": 6752,
|
| 4 |
+
"rust_files": [],
|
| 5 |
+
"diffs": []
|
| 6 |
+
}
|
diffs/pr_8219/07bbeba/diff.json
ADDED
|
@@ -0,0 +1,85 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "07bbeba67d9357d8d24a465b274246eeedf7a1d1",
|
| 3 |
+
"pr_number": 8219,
|
| 4 |
+
"rust_files": [
|
| 5 |
+
"crates/hyperswitch_connectors/src/connectors/worldpayvantiv.rs",
|
| 6 |
+
"crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs"
|
| 7 |
+
],
|
| 8 |
+
"diffs": [
|
| 9 |
+
{
|
| 10 |
+
"id": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv.rs::Worldpayvantiv::function::common_get_content_type",
|
| 11 |
+
"file": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv.rs",
|
| 12 |
+
"kind": "function_item",
|
| 13 |
+
"status": "modified",
|
| 14 |
+
"code_changed": true,
|
| 15 |
+
"imports_changed": false,
|
| 16 |
+
"before_code": "fn common_get_content_type(&self) -> &'static str {\n \"application/xml\"\n }",
|
| 17 |
+
"after_code": "fn common_get_content_type(&self) -> &'static str {\n \"text/xml\"\n }",
|
| 18 |
+
"diff_span": {
|
| 19 |
+
"before": "fn common_get_content_type(&self) -> &'static str {\n \"application/xml\"\n }",
|
| 20 |
+
"after": "fn common_get_content_type(&self) -> &'static str {\n \"text/xml\"\n }"
|
| 21 |
+
},
|
| 22 |
+
"commit_sha": "07bbeba67d9357d8d24a465b274246eeedf7a1d1"
|
| 23 |
+
},
|
| 24 |
+
{
|
| 25 |
+
"id": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv.rs::Worldpayvantiv::function::build_request",
|
| 26 |
+
"file": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv.rs",
|
| 27 |
+
"kind": "function_item",
|
| 28 |
+
"status": "modified",
|
| 29 |
+
"code_changed": true,
|
| 30 |
+
"imports_changed": false,
|
| 31 |
+
"before_code": "fn build_request(\n &self,\n req: &RefundSyncRouterData,\n connectors: &Connectors,\n ) -> CustomResult<Option<Request>, errors::ConnectorError> {\n Ok(Some(\n RequestBuilder::new()\n .method(Method::Get)\n .url(&types::RefundSyncType::get_url(self, req, connectors)?)\n .attach_default_headers()\n .headers(types::RefundSyncType::get_headers(self, req, connectors)?)\n .set_body(types::RefundSyncType::get_request_body(\n self, req, connectors,\n )?)\n .build(),\n ))\n }",
|
| 32 |
+
"after_code": "fn build_request(\n &self,\n req: &RefundSyncRouterData,\n connectors: &Connectors,\n ) -> CustomResult<Option<Request>, errors::ConnectorError> {\n Ok(Some(\n RequestBuilder::new()\n .method(Method::Post)\n .url(&types::RefundSyncType::get_url(self, req, connectors)?)\n .attach_default_headers()\n .headers(types::RefundSyncType::get_headers(self, req, connectors)?)\n .set_body(types::RefundSyncType::get_request_body(\n self, req, connectors,\n )?)\n .build(),\n ))\n }",
|
| 33 |
+
"diff_span": {
|
| 34 |
+
"before": " Ok(Some(\n RequestBuilder::new()\n .method(Method::Get)\n .url(&types::RefundSyncType::get_url(self, req, connectors)?)\n .attach_default_headers()",
|
| 35 |
+
"after": " Ok(Some(\n RequestBuilder::new()\n .method(Method::Post)\n .url(&types::RefundSyncType::get_url(self, req, connectors)?)\n .attach_default_headers()"
|
| 36 |
+
},
|
| 37 |
+
"commit_sha": "07bbeba67d9357d8d24a465b274246eeedf7a1d1"
|
| 38 |
+
},
|
| 39 |
+
{
|
| 40 |
+
"id": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv.rs::Worldpayvantiv::function::get_request_body",
|
| 41 |
+
"file": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv.rs",
|
| 42 |
+
"kind": "function_item",
|
| 43 |
+
"status": "modified",
|
| 44 |
+
"code_changed": true,
|
| 45 |
+
"imports_changed": false,
|
| 46 |
+
"before_code": "fn get_request_body(\n &self,\n req: &RefundSyncRouterData,\n _connectors: &Connectors,\n ) -> CustomResult<RequestContent, errors::ConnectorError> {\n let connector_req_object = worldpayvantiv::CnpOnlineRequest::try_from(req)?;\n\n let connector_req = connector_utils::XmlSerializer::serialize_to_xml_bytes(\n &connector_req_object,\n worldpayvantiv::worldpayvantiv_constants::XML_VERSION,\n Some(worldpayvantiv::worldpayvantiv_constants::XML_ENCODING),\n None,\n None,\n )?;\n\n Ok(RequestContent::RawBytes(connector_req))\n }",
|
| 47 |
+
"after_code": "fn get_request_body(\n &self,\n req: &RefundSyncRouterData,\n _connectors: &Connectors,\n ) -> CustomResult<RequestContent, errors::ConnectorError> {\n let connector_req_object = worldpayvantiv::CnpOnlineRequest::try_from(req)?;\n router_env::logger::info!(raw_connector_request=?connector_req_object);\n\n let connector_req = connector_utils::XmlSerializer::serialize_to_xml_bytes(\n &connector_req_object,\n worldpayvantiv::worldpayvantiv_constants::XML_VERSION,\n Some(worldpayvantiv::worldpayvantiv_constants::XML_ENCODING),\n None,\n None,\n )?;\n\n Ok(RequestContent::RawBytes(connector_req))\n }",
|
| 48 |
+
"diff_span": {
|
| 49 |
+
"before": "",
|
| 50 |
+
"after": " ) -> CustomResult<RequestContent, errors::ConnectorError> {\n let connector_req_object = worldpayvantiv::CnpOnlineRequest::try_from(req)?;\n router_env::logger::info!(raw_connector_request=?connector_req_object);\n\n let connector_req = connector_utils::XmlSerializer::serialize_to_xml_bytes("
|
| 51 |
+
},
|
| 52 |
+
"commit_sha": "07bbeba67d9357d8d24a465b274246eeedf7a1d1"
|
| 53 |
+
},
|
| 54 |
+
{
|
| 55 |
+
"id": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs::worldpayvantiv_constants::const::WORLDPAYVANTIV_VERSION",
|
| 56 |
+
"file": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs",
|
| 57 |
+
"kind": "const_item",
|
| 58 |
+
"status": "modified",
|
| 59 |
+
"code_changed": true,
|
| 60 |
+
"imports_changed": false,
|
| 61 |
+
"before_code": "pub const WORLDPAYVANTIV_VERSION: &str = \"12.1\";",
|
| 62 |
+
"after_code": "pub const WORLDPAYVANTIV_VERSION: &str = \"12.23\";",
|
| 63 |
+
"diff_span": {
|
| 64 |
+
"before": "pub const WORLDPAYVANTIV_VERSION: &str = \"12.1\";",
|
| 65 |
+
"after": "pub const WORLDPAYVANTIV_VERSION: &str = \"12.23\";"
|
| 66 |
+
},
|
| 67 |
+
"commit_sha": "07bbeba67d9357d8d24a465b274246eeedf7a1d1"
|
| 68 |
+
},
|
| 69 |
+
{
|
| 70 |
+
"id": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs::mod::worldpayvantiv_constants",
|
| 71 |
+
"file": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs",
|
| 72 |
+
"kind": "mod_item",
|
| 73 |
+
"status": "modified",
|
| 74 |
+
"code_changed": true,
|
| 75 |
+
"imports_changed": false,
|
| 76 |
+
"before_code": "pub mod worldpayvantiv_constants {\n pub const WORLDPAYVANTIV_VERSION: &str = \"12.1\";\n pub const XML_VERSION: &str = \"1.0\";\n pub const XML_ENCODING: &str = \"UTF-8\";\n pub const XMLNS: &str = \"http://www.vantivcnp.com/schema\";\n}",
|
| 77 |
+
"after_code": "pub mod worldpayvantiv_constants {\n pub const WORLDPAYVANTIV_VERSION: &str = \"12.23\";\n pub const XML_VERSION: &str = \"1.0\";\n pub const XML_ENCODING: &str = \"UTF-8\";\n pub const XMLNS: &str = \"http://www.vantivcnp.com/schema\";\n}",
|
| 78 |
+
"diff_span": {
|
| 79 |
+
"before": "pub mod worldpayvantiv_constants {\n pub const WORLDPAYVANTIV_VERSION: &str = \"12.1\";\n pub const XML_VERSION: &str = \"1.0\";\n pub const XML_ENCODING: &str = \"UTF-8\";",
|
| 80 |
+
"after": "pub mod worldpayvantiv_constants {\n pub const WORLDPAYVANTIV_VERSION: &str = \"12.23\";\n pub const XML_VERSION: &str = \"1.0\";\n pub const XML_ENCODING: &str = \"UTF-8\";"
|
| 81 |
+
},
|
| 82 |
+
"commit_sha": "07bbeba67d9357d8d24a465b274246eeedf7a1d1"
|
| 83 |
+
}
|
| 84 |
+
]
|
| 85 |
+
}
|
diffs/pr_8219/0e6e5e4/diff.json
ADDED
|
@@ -0,0 +1,6 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "0e6e5e4544cbcc8c6d703dbaf12caf7911b9cbd7",
|
| 3 |
+
"pr_number": 8219,
|
| 4 |
+
"rust_files": [],
|
| 5 |
+
"diffs": []
|
| 6 |
+
}
|
diffs/pr_8219/254e79a/diff.json
ADDED
|
@@ -0,0 +1,6 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "254e79a0663ae76de49aaeca9fe10e5254cd7000",
|
| 3 |
+
"pr_number": 8219,
|
| 4 |
+
"rust_files": [],
|
| 5 |
+
"diffs": []
|
| 6 |
+
}
|
diffs/pr_8219/2ab8927/diff.json
ADDED
|
@@ -0,0 +1,54 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "2ab89279ee45a6fd9d68d2eeb381e8cec53e21e2",
|
| 3 |
+
"pr_number": 8219,
|
| 4 |
+
"rust_files": [
|
| 5 |
+
"crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs"
|
| 6 |
+
],
|
| 7 |
+
"diffs": [
|
| 8 |
+
{
|
| 9 |
+
"id": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs::CnpOnlineRequest::function::try_from",
|
| 10 |
+
"file": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs",
|
| 11 |
+
"kind": "function_item",
|
| 12 |
+
"status": "modified",
|
| 13 |
+
"code_changed": true,
|
| 14 |
+
"imports_changed": false,
|
| 15 |
+
"before_code": "fn try_from(item: &PaymentsCancelRouterData) -> Result<Self, Self::Error> {\n let report_group_metadata: WorldpayvantivPaymentMetadata =\n connector_utils::to_connector_meta(item.request.connector_meta.clone())?;\n let report_group = report_group_metadata.report_group.clone()\n .ok_or( errors::ConnectorError::RequestEncodingFailedWithReason(\n \"Failed to obtain report_group from metadata\".to_string(),\n ))?;\n let api_call_id = format!(\"void_{:?}\", connector_utils::generate_12_digit_number());\n let void = Some(Void {\n id: api_call_id,\n report_group,\n cnp_txn_id: item.request.connector_transaction_id.clone(),\n });\n\n let worldpayvantiv_auth_type = WorldpayvantivAuthType::try_from(&item.connector_auth_type)?;\n let authentication = Authentication {\n user: worldpayvantiv_auth_type.user,\n password: worldpayvantiv_auth_type.password,\n };\n\n Ok(Self {\n version: worldpayvantiv_constants::WORLDPAYVANTIV_VERSION.to_string(),\n xmlns: worldpayvantiv_constants::XMLNS.to_string(),\n merchant_id: worldpayvantiv_auth_type.merchant_id,\n authentication,\n authorization: None,\n sale: None,\n capture: None,\n void,\n credit: None,\n query_transaction: None,\n })\n }",
|
| 16 |
+
"after_code": "fn try_from(item: &PaymentsCancelRouterData) -> Result<Self, Self::Error> {\n let report_group_metadata: WorldpayvantivPaymentMetadata =\n connector_utils::to_connector_meta(item.request.connector_meta.clone())?;\n let report_group = report_group_metadata.report_group.clone().ok_or(\n errors::ConnectorError::RequestEncodingFailedWithReason(\n \"Failed to obtain report_group from metadata\".to_string(),\n ),\n )?;\n let api_call_id = format!(\"void_{:?}\", connector_utils::generate_12_digit_number());\n let void = Some(Void {\n id: api_call_id,\n report_group,\n cnp_txn_id: item.request.connector_transaction_id.clone(),\n });\n\n let worldpayvantiv_auth_type = WorldpayvantivAuthType::try_from(&item.connector_auth_type)?;\n let authentication = Authentication {\n user: worldpayvantiv_auth_type.user,\n password: worldpayvantiv_auth_type.password,\n };\n\n Ok(Self {\n version: worldpayvantiv_constants::WORLDPAYVANTIV_VERSION.to_string(),\n xmlns: worldpayvantiv_constants::XMLNS.to_string(),\n merchant_id: worldpayvantiv_auth_type.merchant_id,\n authentication,\n authorization: None,\n sale: None,\n capture: None,\n void,\n credit: None,\n query_transaction: None,\n })\n }",
|
| 17 |
+
"diff_span": {
|
| 18 |
+
"before": " let report_group_metadata: WorldpayvantivPaymentMetadata =\n connector_utils::to_connector_meta(item.request.connector_meta.clone())?;\n let report_group = report_group_metadata.report_group.clone()\n .ok_or( errors::ConnectorError::RequestEncodingFailedWithReason(\n \"Failed to obtain report_group from metadata\".to_string(),\n ))?;\n let api_call_id = format!(\"void_{:?}\", connector_utils::generate_12_digit_number());\n let void = Some(Void {",
|
| 19 |
+
"after": " let report_group_metadata: WorldpayvantivPaymentMetadata =\n connector_utils::to_connector_meta(item.request.connector_meta.clone())?;\n let report_group = report_group_metadata.report_group.clone().ok_or(\n errors::ConnectorError::RequestEncodingFailedWithReason(\n \"Failed to obtain report_group from metadata\".to_string(),\n ),\n )?;\n let api_call_id = format!(\"void_{:?}\", connector_utils::generate_12_digit_number());\n let void = Some(Void {"
|
| 20 |
+
},
|
| 21 |
+
"commit_sha": "2ab89279ee45a6fd9d68d2eeb381e8cec53e21e2"
|
| 22 |
+
},
|
| 23 |
+
{
|
| 24 |
+
"id": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs::struct::WorldpayvantivPaymentMetadata",
|
| 25 |
+
"file": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs",
|
| 26 |
+
"kind": "struct_item",
|
| 27 |
+
"status": "modified",
|
| 28 |
+
"code_changed": true,
|
| 29 |
+
"imports_changed": false,
|
| 30 |
+
"before_code": "pub struct WorldpayvantivPaymentMetadata {\n pub report_group: Option<String>, \n}",
|
| 31 |
+
"after_code": "pub struct WorldpayvantivPaymentMetadata {\n pub report_group: Option<String>,\n}",
|
| 32 |
+
"diff_span": {
|
| 33 |
+
"before": "pub struct WorldpayvantivPaymentMetadata {\n pub report_group: Option<String>, \n}",
|
| 34 |
+
"after": "pub struct WorldpayvantivPaymentMetadata {\n pub report_group: Option<String>,\n}"
|
| 35 |
+
},
|
| 36 |
+
"commit_sha": "2ab89279ee45a6fd9d68d2eeb381e8cec53e21e2"
|
| 37 |
+
},
|
| 38 |
+
{
|
| 39 |
+
"id": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs::impl::CnpOnlineRequest",
|
| 40 |
+
"file": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs",
|
| 41 |
+
"kind": "impl_item",
|
| 42 |
+
"status": "modified",
|
| 43 |
+
"code_changed": true,
|
| 44 |
+
"imports_changed": false,
|
| 45 |
+
"before_code": "impl TryFrom<&PaymentsCancelRouterData> for CnpOnlineRequest {\n type Error = error_stack::Report<errors::ConnectorError>;\n fn try_from(item: &PaymentsCancelRouterData) -> Result<Self, Self::Error> {\n let report_group_metadata: WorldpayvantivPaymentMetadata =\n connector_utils::to_connector_meta(item.request.connector_meta.clone())?;\n let report_group = report_group_metadata.report_group.clone()\n .ok_or( errors::ConnectorError::RequestEncodingFailedWithReason(\n \"Failed to obtain report_group from metadata\".to_string(),\n ))?;\n let api_call_id = format!(\"void_{:?}\", connector_utils::generate_12_digit_number());\n let void = Some(Void {\n id: api_call_id,\n report_group,\n cnp_txn_id: item.request.connector_transaction_id.clone(),\n });\n\n let worldpayvantiv_auth_type = WorldpayvantivAuthType::try_from(&item.connector_auth_type)?;\n let authentication = Authentication {\n user: worldpayvantiv_auth_type.user,\n password: worldpayvantiv_auth_type.password,\n };\n\n Ok(Self {\n version: worldpayvantiv_constants::WORLDPAYVANTIV_VERSION.to_string(),\n xmlns: worldpayvantiv_constants::XMLNS.to_string(),\n merchant_id: worldpayvantiv_auth_type.merchant_id,\n authentication,\n authorization: None,\n sale: None,\n capture: None,\n void,\n credit: None,\n query_transaction: None,\n })\n }\n}",
|
| 46 |
+
"after_code": "impl TryFrom<&PaymentsCancelRouterData> for CnpOnlineRequest {\n type Error = error_stack::Report<errors::ConnectorError>;\n fn try_from(item: &PaymentsCancelRouterData) -> Result<Self, Self::Error> {\n let report_group_metadata: WorldpayvantivPaymentMetadata =\n connector_utils::to_connector_meta(item.request.connector_meta.clone())?;\n let report_group = report_group_metadata.report_group.clone().ok_or(\n errors::ConnectorError::RequestEncodingFailedWithReason(\n \"Failed to obtain report_group from metadata\".to_string(),\n ),\n )?;\n let api_call_id = format!(\"void_{:?}\", connector_utils::generate_12_digit_number());\n let void = Some(Void {\n id: api_call_id,\n report_group,\n cnp_txn_id: item.request.connector_transaction_id.clone(),\n });\n\n let worldpayvantiv_auth_type = WorldpayvantivAuthType::try_from(&item.connector_auth_type)?;\n let authentication = Authentication {\n user: worldpayvantiv_auth_type.user,\n password: worldpayvantiv_auth_type.password,\n };\n\n Ok(Self {\n version: worldpayvantiv_constants::WORLDPAYVANTIV_VERSION.to_string(),\n xmlns: worldpayvantiv_constants::XMLNS.to_string(),\n merchant_id: worldpayvantiv_auth_type.merchant_id,\n authentication,\n authorization: None,\n sale: None,\n capture: None,\n void,\n credit: None,\n query_transaction: None,\n })\n }\n}",
|
| 47 |
+
"diff_span": {
|
| 48 |
+
"before": " let report_group_metadata: WorldpayvantivPaymentMetadata =\n connector_utils::to_connector_meta(item.request.connector_meta.clone())?;\n let report_group = report_group_metadata.report_group.clone()\n .ok_or( errors::ConnectorError::RequestEncodingFailedWithReason(\n \"Failed to obtain report_group from metadata\".to_string(),\n ))?;\n let api_call_id = format!(\"void_{:?}\", connector_utils::generate_12_digit_number());\n let void = Some(Void {",
|
| 49 |
+
"after": " let report_group_metadata: WorldpayvantivPaymentMetadata =\n connector_utils::to_connector_meta(item.request.connector_meta.clone())?;\n let report_group = report_group_metadata.report_group.clone().ok_or(\n errors::ConnectorError::RequestEncodingFailedWithReason(\n \"Failed to obtain report_group from metadata\".to_string(),\n ),\n )?;\n let api_call_id = format!(\"void_{:?}\", connector_utils::generate_12_digit_number());\n let void = Some(Void {"
|
| 50 |
+
},
|
| 51 |
+
"commit_sha": "2ab89279ee45a6fd9d68d2eeb381e8cec53e21e2"
|
| 52 |
+
}
|
| 53 |
+
]
|
| 54 |
+
}
|
diffs/pr_8219/2efd31e/diff.json
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
diffs/pr_8219/394b229/diff.json
ADDED
|
@@ -0,0 +1,6 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "394b2291a4161d0b390e0b7ac663f6e5223db150",
|
| 3 |
+
"pr_number": 8219,
|
| 4 |
+
"rust_files": [],
|
| 5 |
+
"diffs": []
|
| 6 |
+
}
|
diffs/pr_8219/3f188d3/diff.json
ADDED
|
@@ -0,0 +1,57 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "3f188d34bf43e0d26ae9434135b2f5a9be12d689",
|
| 3 |
+
"pr_number": 8219,
|
| 4 |
+
"rust_files": [
|
| 5 |
+
"crates/hyperswitch_connectors/src/connectors/worldpayvantiv.rs",
|
| 6 |
+
"crates/router/src/connector.rs",
|
| 7 |
+
"crates/router/src/types/transformers.rs",
|
| 8 |
+
"crates/router/tests/connectors/main.rs"
|
| 9 |
+
],
|
| 10 |
+
"diffs": [
|
| 11 |
+
{
|
| 12 |
+
"id": "crates/router/src/types/transformers.rs::common_enums::RoutableConnectors::function::foreign_try_from",
|
| 13 |
+
"file": "crates/router/src/types/transformers.rs",
|
| 14 |
+
"kind": "function_item",
|
| 15 |
+
"status": "modified",
|
| 16 |
+
"code_changed": true,
|
| 17 |
+
"imports_changed": false,
|
| 18 |
+
"before_code": "fn foreign_try_from(from: api_enums::Connector) -> Result<Self, Self::Error> {\n Ok(match from {\n api_enums::Connector::Aci => Self::Aci,\n api_enums::Connector::Adyen => Self::Adyen,\n api_enums::Connector::Adyenplatform => Self::Adyenplatform,\n api_enums::Connector::Airwallex => Self::Airwallex,\n // api_enums::Connector::Amazonpay => Self::Amazonpay,\n api_enums::Connector::Archipel => Self::Archipel,\n api_enums::Connector::Authorizedotnet => Self::Authorizedotnet,\n api_enums::Connector::Bambora => Self::Bambora,\n api_enums::Connector::Bamboraapac => Self::Bamboraapac,\n api_enums::Connector::Bankofamerica => Self::Bankofamerica,\n api_enums::Connector::Barclaycard => Self::Barclaycard,\n api_enums::Connector::Billwerk => Self::Billwerk,\n api_enums::Connector::Bitpay => Self::Bitpay,\n api_enums::Connector::Bluesnap => Self::Bluesnap,\n api_enums::Connector::Boku => Self::Boku,\n api_enums::Connector::Braintree => Self::Braintree,\n api_enums::Connector::Cashtocode => Self::Cashtocode,\n api_enums::Connector::Chargebee => Self::Chargebee,\n api_enums::Connector::Checkout => Self::Checkout,\n api_enums::Connector::Coinbase => Self::Coinbase,\n api_enums::Connector::Coingate => Self::Coingate,\n api_enums::Connector::Cryptopay => Self::Cryptopay,\n api_enums::Connector::CtpVisa => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"ctp visa is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::CtpMastercard => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"ctp mastercard is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::Cybersource => Self::Cybersource,\n api_enums::Connector::Datatrans => Self::Datatrans,\n api_enums::Connector::Deutschebank => Self::Deutschebank,\n api_enums::Connector::Digitalvirgo => Self::Digitalvirgo,\n api_enums::Connector::Dlocal => Self::Dlocal,\n api_enums::Connector::Ebanx => Self::Ebanx,\n api_enums::Connector::Elavon => Self::Elavon,\n api_enums::Connector::Facilitapay => Self::Facilitapay,\n api_enums::Connector::Fiserv => Self::Fiserv,\n api_enums::Connector::Fiservemea => Self::Fiservemea,\n api_enums::Connector::Fiuu => Self::Fiuu,\n api_enums::Connector::Forte => Self::Forte,\n api_enums::Connector::Getnet => Self::Getnet,\n api_enums::Connector::Globalpay => Self::Globalpay,\n api_enums::Connector::Globepay => Self::Globepay,\n api_enums::Connector::Gocardless => Self::Gocardless,\n api_enums::Connector::Gpayments => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"gpayments is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::Hipay => Self::Hipay,\n api_enums::Connector::Helcim => Self::Helcim,\n api_enums::Connector::Iatapay => Self::Iatapay,\n api_enums::Connector::Inespay => Self::Inespay,\n api_enums::Connector::Itaubank => Self::Itaubank,\n api_enums::Connector::Jpmorgan => Self::Jpmorgan,\n api_enums::Connector::Juspaythreedsserver => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"juspaythreedsserver is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::Klarna => Self::Klarna,\n api_enums::Connector::Mifinity => Self::Mifinity,\n api_enums::Connector::Mollie => Self::Mollie,\n api_enums::Connector::Moneris => Self::Moneris,\n api_enums::Connector::Multisafepay => Self::Multisafepay,\n api_enums::Connector::Netcetera => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"netcetera is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::Nexinets => Self::Nexinets,\n api_enums::Connector::Nexixpay => Self::Nexixpay,\n api_enums::Connector::Nmi => Self::Nmi,\n api_enums::Connector::Nomupay => Self::Nomupay,\n api_enums::Connector::Noon => Self::Noon,\n // api_enums::Connector::Nordea => Self::Nordea,\n api_enums::Connector::Novalnet => Self::Novalnet,\n api_enums::Connector::Nuvei => Self::Nuvei,\n api_enums::Connector::Opennode => Self::Opennode,\n api_enums::Connector::Paybox => Self::Paybox,\n api_enums::Connector::Payme => Self::Payme,\n api_enums::Connector::Payone => Self::Payone,\n api_enums::Connector::Paypal => Self::Paypal,\n api_enums::Connector::Paystack => Self::Paystack,\n api_enums::Connector::Payu => Self::Payu,\n api_models::enums::Connector::Placetopay => Self::Placetopay,\n api_enums::Connector::Plaid => Self::Plaid,\n api_enums::Connector::Powertranz => Self::Powertranz,\n api_enums::Connector::Prophetpay => Self::Prophetpay,\n api_enums::Connector::Rapyd => Self::Rapyd,\n api_enums::Connector::Razorpay => Self::Razorpay,\n api_enums::Connector::Recurly => Self::Recurly,\n api_enums::Connector::Redsys => Self::Redsys,\n api_enums::Connector::Shift4 => Self::Shift4,\n api_enums::Connector::Signifyd => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"signifyd is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::Riskified => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"riskified is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::Square => Self::Square,\n api_enums::Connector::Stax => Self::Stax,\n api_enums::Connector::Stripe => Self::Stripe,\n api_enums::Connector::Stripebilling => Self::Stripebilling,\n // api_enums::Connector::Taxjar => Self::Taxjar,\n // api_enums::Connector::Thunes => Self::Thunes,\n // api_enums::Connector::Tokenio => Self::Tokenio,\n api_enums::Connector::Trustpay => Self::Trustpay,\n api_enums::Connector::Tsys => Self::Tsys,\n // api_enums::Connector::UnifiedAuthenticationService => {\n // Self::UnifiedAuthenticationService\n // }\n api_enums::Connector::Vgs => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"Vgs is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::Volt => Self::Volt,\n api_enums::Connector::Wellsfargo => Self::Wellsfargo,\n // api_enums::Connector::Wellsfargopayout => Self::Wellsfargopayout,\n api_enums::Connector::Wise => Self::Wise,\n api_enums::Connector::Worldline => Self::Worldline,\n api_enums::Connector::Worldpay => Self::Worldpay,\n\t\t\t// api_enums::Connector::Worldpayvantiv => Self::Worldpayvantiv,\n api_enums::Connector::Worldpayxml => Self::Worldpayxml,\n api_enums::Connector::Xendit => Self::Xendit,\n api_enums::Connector::Zen => Self::Zen,\n api_enums::Connector::Zsl => Self::Zsl,\n #[cfg(feature = \"dummy_connector\")]\n api_enums::Connector::DummyBillingConnector => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"stripe_billing_test is not a routable connector\".to_string(),\n })?\n }\n #[cfg(feature = \"dummy_connector\")]\n api_enums::Connector::DummyConnector1 => Self::DummyConnector1,\n #[cfg(feature = \"dummy_connector\")]\n api_enums::Connector::DummyConnector2 => Self::DummyConnector2,\n #[cfg(feature = \"dummy_connector\")]\n api_enums::Connector::DummyConnector3 => Self::DummyConnector3,\n #[cfg(feature = \"dummy_connector\")]\n api_enums::Connector::DummyConnector4 => Self::DummyConnector4,\n #[cfg(feature = \"dummy_connector\")]\n api_enums::Connector::DummyConnector5 => Self::DummyConnector5,\n #[cfg(feature = \"dummy_connector\")]\n api_enums::Connector::DummyConnector6 => Self::DummyConnector6,\n #[cfg(feature = \"dummy_connector\")]\n api_enums::Connector::DummyConnector7 => Self::DummyConnector7,\n api_enums::Connector::Threedsecureio => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"threedsecureio is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::Taxjar => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"Taxjar is not a routable connector\".to_string(),\n })?\n }\n })\n }",
|
| 19 |
+
"after_code": "fn foreign_try_from(from: api_enums::Connector) -> Result<Self, Self::Error> {\n Ok(match from {\n api_enums::Connector::Aci => Self::Aci,\n api_enums::Connector::Adyen => Self::Adyen,\n api_enums::Connector::Adyenplatform => Self::Adyenplatform,\n api_enums::Connector::Airwallex => Self::Airwallex,\n // api_enums::Connector::Amazonpay => Self::Amazonpay,\n api_enums::Connector::Archipel => Self::Archipel,\n api_enums::Connector::Authorizedotnet => Self::Authorizedotnet,\n api_enums::Connector::Bambora => Self::Bambora,\n api_enums::Connector::Bamboraapac => Self::Bamboraapac,\n api_enums::Connector::Bankofamerica => Self::Bankofamerica,\n api_enums::Connector::Barclaycard => Self::Barclaycard,\n api_enums::Connector::Billwerk => Self::Billwerk,\n api_enums::Connector::Bitpay => Self::Bitpay,\n api_enums::Connector::Bluesnap => Self::Bluesnap,\n api_enums::Connector::Boku => Self::Boku,\n api_enums::Connector::Braintree => Self::Braintree,\n api_enums::Connector::Cashtocode => Self::Cashtocode,\n api_enums::Connector::Chargebee => Self::Chargebee,\n api_enums::Connector::Checkout => Self::Checkout,\n api_enums::Connector::Coinbase => Self::Coinbase,\n api_enums::Connector::Coingate => Self::Coingate,\n api_enums::Connector::Cryptopay => Self::Cryptopay,\n api_enums::Connector::CtpVisa => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"ctp visa is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::CtpMastercard => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"ctp mastercard is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::Cybersource => Self::Cybersource,\n api_enums::Connector::Datatrans => Self::Datatrans,\n api_enums::Connector::Deutschebank => Self::Deutschebank,\n api_enums::Connector::Digitalvirgo => Self::Digitalvirgo,\n api_enums::Connector::Dlocal => Self::Dlocal,\n api_enums::Connector::Ebanx => Self::Ebanx,\n api_enums::Connector::Elavon => Self::Elavon,\n api_enums::Connector::Facilitapay => Self::Facilitapay,\n api_enums::Connector::Fiserv => Self::Fiserv,\n api_enums::Connector::Fiservemea => Self::Fiservemea,\n api_enums::Connector::Fiuu => Self::Fiuu,\n api_enums::Connector::Forte => Self::Forte,\n api_enums::Connector::Getnet => Self::Getnet,\n api_enums::Connector::Globalpay => Self::Globalpay,\n api_enums::Connector::Globepay => Self::Globepay,\n api_enums::Connector::Gocardless => Self::Gocardless,\n api_enums::Connector::Gpayments => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"gpayments is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::Hipay => Self::Hipay,\n api_enums::Connector::Helcim => Self::Helcim,\n api_enums::Connector::Iatapay => Self::Iatapay,\n api_enums::Connector::Inespay => Self::Inespay,\n api_enums::Connector::Itaubank => Self::Itaubank,\n api_enums::Connector::Jpmorgan => Self::Jpmorgan,\n api_enums::Connector::Juspaythreedsserver => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"juspaythreedsserver is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::Klarna => Self::Klarna,\n api_enums::Connector::Mifinity => Self::Mifinity,\n api_enums::Connector::Mollie => Self::Mollie,\n api_enums::Connector::Moneris => Self::Moneris,\n api_enums::Connector::Multisafepay => Self::Multisafepay,\n api_enums::Connector::Netcetera => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"netcetera is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::Nexinets => Self::Nexinets,\n api_enums::Connector::Nexixpay => Self::Nexixpay,\n api_enums::Connector::Nmi => Self::Nmi,\n api_enums::Connector::Nomupay => Self::Nomupay,\n api_enums::Connector::Noon => Self::Noon,\n // api_enums::Connector::Nordea => Self::Nordea,\n api_enums::Connector::Novalnet => Self::Novalnet,\n api_enums::Connector::Nuvei => Self::Nuvei,\n api_enums::Connector::Opennode => Self::Opennode,\n api_enums::Connector::Paybox => Self::Paybox,\n api_enums::Connector::Payme => Self::Payme,\n api_enums::Connector::Payone => Self::Payone,\n api_enums::Connector::Paypal => Self::Paypal,\n api_enums::Connector::Paystack => Self::Paystack,\n api_enums::Connector::Payu => Self::Payu,\n api_models::enums::Connector::Placetopay => Self::Placetopay,\n api_enums::Connector::Plaid => Self::Plaid,\n api_enums::Connector::Powertranz => Self::Powertranz,\n api_enums::Connector::Prophetpay => Self::Prophetpay,\n api_enums::Connector::Rapyd => Self::Rapyd,\n api_enums::Connector::Razorpay => Self::Razorpay,\n api_enums::Connector::Recurly => Self::Recurly,\n api_enums::Connector::Redsys => Self::Redsys,\n api_enums::Connector::Shift4 => Self::Shift4,\n api_enums::Connector::Signifyd => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"signifyd is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::Riskified => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"riskified is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::Square => Self::Square,\n api_enums::Connector::Stax => Self::Stax,\n api_enums::Connector::Stripe => Self::Stripe,\n api_enums::Connector::Stripebilling => Self::Stripebilling,\n // api_enums::Connector::Taxjar => Self::Taxjar,\n // api_enums::Connector::Thunes => Self::Thunes,\n // api_enums::Connector::Tokenio => Self::Tokenio,\n api_enums::Connector::Trustpay => Self::Trustpay,\n api_enums::Connector::Tsys => Self::Tsys,\n // api_enums::Connector::UnifiedAuthenticationService => {\n // Self::UnifiedAuthenticationService\n // }\n api_enums::Connector::Vgs => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"Vgs is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::Volt => Self::Volt,\n api_enums::Connector::Wellsfargo => Self::Wellsfargo,\n // api_enums::Connector::Wellsfargopayout => Self::Wellsfargopayout,\n api_enums::Connector::Wise => Self::Wise,\n api_enums::Connector::Worldline => Self::Worldline,\n api_enums::Connector::Worldpay => Self::Worldpay,\n // api_enums::Connector::Worldpayvantiv => Self::Worldpayvantiv,\n api_enums::Connector::Worldpayxml => Self::Worldpayxml,\n api_enums::Connector::Xendit => Self::Xendit,\n api_enums::Connector::Zen => Self::Zen,\n api_enums::Connector::Zsl => Self::Zsl,\n #[cfg(feature = \"dummy_connector\")]\n api_enums::Connector::DummyBillingConnector => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"stripe_billing_test is not a routable connector\".to_string(),\n })?\n }\n #[cfg(feature = \"dummy_connector\")]\n api_enums::Connector::DummyConnector1 => Self::DummyConnector1,\n #[cfg(feature = \"dummy_connector\")]\n api_enums::Connector::DummyConnector2 => Self::DummyConnector2,\n #[cfg(feature = \"dummy_connector\")]\n api_enums::Connector::DummyConnector3 => Self::DummyConnector3,\n #[cfg(feature = \"dummy_connector\")]\n api_enums::Connector::DummyConnector4 => Self::DummyConnector4,\n #[cfg(feature = \"dummy_connector\")]\n api_enums::Connector::DummyConnector5 => Self::DummyConnector5,\n #[cfg(feature = \"dummy_connector\")]\n api_enums::Connector::DummyConnector6 => Self::DummyConnector6,\n #[cfg(feature = \"dummy_connector\")]\n api_enums::Connector::DummyConnector7 => Self::DummyConnector7,\n api_enums::Connector::Threedsecureio => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"threedsecureio is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::Taxjar => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"Taxjar is not a routable connector\".to_string(),\n })?\n }\n })\n }",
|
| 20 |
+
"diff_span": {
|
| 21 |
+
"before": " api_enums::Connector::Worldline => Self::Worldline,\n api_enums::Connector::Worldpay => Self::Worldpay,\n\t\t\t// api_enums::Connector::Worldpayvantiv => Self::Worldpayvantiv,\n api_enums::Connector::Worldpayxml => Self::Worldpayxml,\n api_enums::Connector::Xendit => Self::Xendit,",
|
| 22 |
+
"after": " api_enums::Connector::Worldline => Self::Worldline,\n api_enums::Connector::Worldpay => Self::Worldpay,\n // api_enums::Connector::Worldpayvantiv => Self::Worldpayvantiv,\n api_enums::Connector::Worldpayxml => Self::Worldpayxml,\n api_enums::Connector::Xendit => Self::Xendit,"
|
| 23 |
+
},
|
| 24 |
+
"commit_sha": "3f188d34bf43e0d26ae9434135b2f5a9be12d689"
|
| 25 |
+
},
|
| 26 |
+
{
|
| 27 |
+
"id": "crates/router/src/types/transformers.rs::impl::common_enums::RoutableConnectors",
|
| 28 |
+
"file": "crates/router/src/types/transformers.rs",
|
| 29 |
+
"kind": "impl_item",
|
| 30 |
+
"status": "modified",
|
| 31 |
+
"code_changed": true,
|
| 32 |
+
"imports_changed": false,
|
| 33 |
+
"before_code": "impl ForeignTryFrom<api_enums::Connector> for common_enums::RoutableConnectors {\n type Error = error_stack::Report<common_utils::errors::ValidationError>;\n\n fn foreign_try_from(from: api_enums::Connector) -> Result<Self, Self::Error> {\n Ok(match from {\n api_enums::Connector::Aci => Self::Aci,\n api_enums::Connector::Adyen => Self::Adyen,\n api_enums::Connector::Adyenplatform => Self::Adyenplatform,\n api_enums::Connector::Airwallex => Self::Airwallex,\n // api_enums::Connector::Amazonpay => Self::Amazonpay,\n api_enums::Connector::Archipel => Self::Archipel,\n api_enums::Connector::Authorizedotnet => Self::Authorizedotnet,\n api_enums::Connector::Bambora => Self::Bambora,\n api_enums::Connector::Bamboraapac => Self::Bamboraapac,\n api_enums::Connector::Bankofamerica => Self::Bankofamerica,\n api_enums::Connector::Barclaycard => Self::Barclaycard,\n api_enums::Connector::Billwerk => Self::Billwerk,\n api_enums::Connector::Bitpay => Self::Bitpay,\n api_enums::Connector::Bluesnap => Self::Bluesnap,\n api_enums::Connector::Boku => Self::Boku,\n api_enums::Connector::Braintree => Self::Braintree,\n api_enums::Connector::Cashtocode => Self::Cashtocode,\n api_enums::Connector::Chargebee => Self::Chargebee,\n api_enums::Connector::Checkout => Self::Checkout,\n api_enums::Connector::Coinbase => Self::Coinbase,\n api_enums::Connector::Coingate => Self::Coingate,\n api_enums::Connector::Cryptopay => Self::Cryptopay,\n api_enums::Connector::CtpVisa => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"ctp visa is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::CtpMastercard => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"ctp mastercard is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::Cybersource => Self::Cybersource,\n api_enums::Connector::Datatrans => Self::Datatrans,\n api_enums::Connector::Deutschebank => Self::Deutschebank,\n api_enums::Connector::Digitalvirgo => Self::Digitalvirgo,\n api_enums::Connector::Dlocal => Self::Dlocal,\n api_enums::Connector::Ebanx => Self::Ebanx,\n api_enums::Connector::Elavon => Self::Elavon,\n api_enums::Connector::Facilitapay => Self::Facilitapay,\n api_enums::Connector::Fiserv => Self::Fiserv,\n api_enums::Connector::Fiservemea => Self::Fiservemea,\n api_enums::Connector::Fiuu => Self::Fiuu,\n api_enums::Connector::Forte => Self::Forte,\n api_enums::Connector::Getnet => Self::Getnet,\n api_enums::Connector::Globalpay => Self::Globalpay,\n api_enums::Connector::Globepay => Self::Globepay,\n api_enums::Connector::Gocardless => Self::Gocardless,\n api_enums::Connector::Gpayments => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"gpayments is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::Hipay => Self::Hipay,\n api_enums::Connector::Helcim => Self::Helcim,\n api_enums::Connector::Iatapay => Self::Iatapay,\n api_enums::Connector::Inespay => Self::Inespay,\n api_enums::Connector::Itaubank => Self::Itaubank,\n api_enums::Connector::Jpmorgan => Self::Jpmorgan,\n api_enums::Connector::Juspaythreedsserver => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"juspaythreedsserver is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::Klarna => Self::Klarna,\n api_enums::Connector::Mifinity => Self::Mifinity,\n api_enums::Connector::Mollie => Self::Mollie,\n api_enums::Connector::Moneris => Self::Moneris,\n api_enums::Connector::Multisafepay => Self::Multisafepay,\n api_enums::Connector::Netcetera => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"netcetera is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::Nexinets => Self::Nexinets,\n api_enums::Connector::Nexixpay => Self::Nexixpay,\n api_enums::Connector::Nmi => Self::Nmi,\n api_enums::Connector::Nomupay => Self::Nomupay,\n api_enums::Connector::Noon => Self::Noon,\n // api_enums::Connector::Nordea => Self::Nordea,\n api_enums::Connector::Novalnet => Self::Novalnet,\n api_enums::Connector::Nuvei => Self::Nuvei,\n api_enums::Connector::Opennode => Self::Opennode,\n api_enums::Connector::Paybox => Self::Paybox,\n api_enums::Connector::Payme => Self::Payme,\n api_enums::Connector::Payone => Self::Payone,\n api_enums::Connector::Paypal => Self::Paypal,\n api_enums::Connector::Paystack => Self::Paystack,\n api_enums::Connector::Payu => Self::Payu,\n api_models::enums::Connector::Placetopay => Self::Placetopay,\n api_enums::Connector::Plaid => Self::Plaid,\n api_enums::Connector::Powertranz => Self::Powertranz,\n api_enums::Connector::Prophetpay => Self::Prophetpay,\n api_enums::Connector::Rapyd => Self::Rapyd,\n api_enums::Connector::Razorpay => Self::Razorpay,\n api_enums::Connector::Recurly => Self::Recurly,\n api_enums::Connector::Redsys => Self::Redsys,\n api_enums::Connector::Shift4 => Self::Shift4,\n api_enums::Connector::Signifyd => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"signifyd is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::Riskified => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"riskified is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::Square => Self::Square,\n api_enums::Connector::Stax => Self::Stax,\n api_enums::Connector::Stripe => Self::Stripe,\n api_enums::Connector::Stripebilling => Self::Stripebilling,\n // api_enums::Connector::Taxjar => Self::Taxjar,\n // api_enums::Connector::Thunes => Self::Thunes,\n // api_enums::Connector::Tokenio => Self::Tokenio,\n api_enums::Connector::Trustpay => Self::Trustpay,\n api_enums::Connector::Tsys => Self::Tsys,\n // api_enums::Connector::UnifiedAuthenticationService => {\n // Self::UnifiedAuthenticationService\n // }\n api_enums::Connector::Vgs => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"Vgs is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::Volt => Self::Volt,\n api_enums::Connector::Wellsfargo => Self::Wellsfargo,\n // api_enums::Connector::Wellsfargopayout => Self::Wellsfargopayout,\n api_enums::Connector::Wise => Self::Wise,\n api_enums::Connector::Worldline => Self::Worldline,\n api_enums::Connector::Worldpay => Self::Worldpay,\n\t\t\t// api_enums::Connector::Worldpayvantiv => Self::Worldpayvantiv,\n api_enums::Connector::Worldpayxml => Self::Worldpayxml,\n api_enums::Connector::Xendit => Self::Xendit,\n api_enums::Connector::Zen => Self::Zen,\n api_enums::Connector::Zsl => Self::Zsl,\n #[cfg(feature = \"dummy_connector\")]\n api_enums::Connector::DummyBillingConnector => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"stripe_billing_test is not a routable connector\".to_string(),\n })?\n }\n #[cfg(feature = \"dummy_connector\")]\n api_enums::Connector::DummyConnector1 => Self::DummyConnector1,\n #[cfg(feature = \"dummy_connector\")]\n api_enums::Connector::DummyConnector2 => Self::DummyConnector2,\n #[cfg(feature = \"dummy_connector\")]\n api_enums::Connector::DummyConnector3 => Self::DummyConnector3,\n #[cfg(feature = \"dummy_connector\")]\n api_enums::Connector::DummyConnector4 => Self::DummyConnector4,\n #[cfg(feature = \"dummy_connector\")]\n api_enums::Connector::DummyConnector5 => Self::DummyConnector5,\n #[cfg(feature = \"dummy_connector\")]\n api_enums::Connector::DummyConnector6 => Self::DummyConnector6,\n #[cfg(feature = \"dummy_connector\")]\n api_enums::Connector::DummyConnector7 => Self::DummyConnector7,\n api_enums::Connector::Threedsecureio => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"threedsecureio is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::Taxjar => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"Taxjar is not a routable connector\".to_string(),\n })?\n }\n })\n }\n}",
|
| 34 |
+
"after_code": "impl ForeignTryFrom<api_enums::Connector> for common_enums::RoutableConnectors {\n type Error = error_stack::Report<common_utils::errors::ValidationError>;\n\n fn foreign_try_from(from: api_enums::Connector) -> Result<Self, Self::Error> {\n Ok(match from {\n api_enums::Connector::Aci => Self::Aci,\n api_enums::Connector::Adyen => Self::Adyen,\n api_enums::Connector::Adyenplatform => Self::Adyenplatform,\n api_enums::Connector::Airwallex => Self::Airwallex,\n // api_enums::Connector::Amazonpay => Self::Amazonpay,\n api_enums::Connector::Archipel => Self::Archipel,\n api_enums::Connector::Authorizedotnet => Self::Authorizedotnet,\n api_enums::Connector::Bambora => Self::Bambora,\n api_enums::Connector::Bamboraapac => Self::Bamboraapac,\n api_enums::Connector::Bankofamerica => Self::Bankofamerica,\n api_enums::Connector::Barclaycard => Self::Barclaycard,\n api_enums::Connector::Billwerk => Self::Billwerk,\n api_enums::Connector::Bitpay => Self::Bitpay,\n api_enums::Connector::Bluesnap => Self::Bluesnap,\n api_enums::Connector::Boku => Self::Boku,\n api_enums::Connector::Braintree => Self::Braintree,\n api_enums::Connector::Cashtocode => Self::Cashtocode,\n api_enums::Connector::Chargebee => Self::Chargebee,\n api_enums::Connector::Checkout => Self::Checkout,\n api_enums::Connector::Coinbase => Self::Coinbase,\n api_enums::Connector::Coingate => Self::Coingate,\n api_enums::Connector::Cryptopay => Self::Cryptopay,\n api_enums::Connector::CtpVisa => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"ctp visa is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::CtpMastercard => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"ctp mastercard is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::Cybersource => Self::Cybersource,\n api_enums::Connector::Datatrans => Self::Datatrans,\n api_enums::Connector::Deutschebank => Self::Deutschebank,\n api_enums::Connector::Digitalvirgo => Self::Digitalvirgo,\n api_enums::Connector::Dlocal => Self::Dlocal,\n api_enums::Connector::Ebanx => Self::Ebanx,\n api_enums::Connector::Elavon => Self::Elavon,\n api_enums::Connector::Facilitapay => Self::Facilitapay,\n api_enums::Connector::Fiserv => Self::Fiserv,\n api_enums::Connector::Fiservemea => Self::Fiservemea,\n api_enums::Connector::Fiuu => Self::Fiuu,\n api_enums::Connector::Forte => Self::Forte,\n api_enums::Connector::Getnet => Self::Getnet,\n api_enums::Connector::Globalpay => Self::Globalpay,\n api_enums::Connector::Globepay => Self::Globepay,\n api_enums::Connector::Gocardless => Self::Gocardless,\n api_enums::Connector::Gpayments => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"gpayments is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::Hipay => Self::Hipay,\n api_enums::Connector::Helcim => Self::Helcim,\n api_enums::Connector::Iatapay => Self::Iatapay,\n api_enums::Connector::Inespay => Self::Inespay,\n api_enums::Connector::Itaubank => Self::Itaubank,\n api_enums::Connector::Jpmorgan => Self::Jpmorgan,\n api_enums::Connector::Juspaythreedsserver => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"juspaythreedsserver is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::Klarna => Self::Klarna,\n api_enums::Connector::Mifinity => Self::Mifinity,\n api_enums::Connector::Mollie => Self::Mollie,\n api_enums::Connector::Moneris => Self::Moneris,\n api_enums::Connector::Multisafepay => Self::Multisafepay,\n api_enums::Connector::Netcetera => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"netcetera is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::Nexinets => Self::Nexinets,\n api_enums::Connector::Nexixpay => Self::Nexixpay,\n api_enums::Connector::Nmi => Self::Nmi,\n api_enums::Connector::Nomupay => Self::Nomupay,\n api_enums::Connector::Noon => Self::Noon,\n // api_enums::Connector::Nordea => Self::Nordea,\n api_enums::Connector::Novalnet => Self::Novalnet,\n api_enums::Connector::Nuvei => Self::Nuvei,\n api_enums::Connector::Opennode => Self::Opennode,\n api_enums::Connector::Paybox => Self::Paybox,\n api_enums::Connector::Payme => Self::Payme,\n api_enums::Connector::Payone => Self::Payone,\n api_enums::Connector::Paypal => Self::Paypal,\n api_enums::Connector::Paystack => Self::Paystack,\n api_enums::Connector::Payu => Self::Payu,\n api_models::enums::Connector::Placetopay => Self::Placetopay,\n api_enums::Connector::Plaid => Self::Plaid,\n api_enums::Connector::Powertranz => Self::Powertranz,\n api_enums::Connector::Prophetpay => Self::Prophetpay,\n api_enums::Connector::Rapyd => Self::Rapyd,\n api_enums::Connector::Razorpay => Self::Razorpay,\n api_enums::Connector::Recurly => Self::Recurly,\n api_enums::Connector::Redsys => Self::Redsys,\n api_enums::Connector::Shift4 => Self::Shift4,\n api_enums::Connector::Signifyd => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"signifyd is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::Riskified => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"riskified is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::Square => Self::Square,\n api_enums::Connector::Stax => Self::Stax,\n api_enums::Connector::Stripe => Self::Stripe,\n api_enums::Connector::Stripebilling => Self::Stripebilling,\n // api_enums::Connector::Taxjar => Self::Taxjar,\n // api_enums::Connector::Thunes => Self::Thunes,\n // api_enums::Connector::Tokenio => Self::Tokenio,\n api_enums::Connector::Trustpay => Self::Trustpay,\n api_enums::Connector::Tsys => Self::Tsys,\n // api_enums::Connector::UnifiedAuthenticationService => {\n // Self::UnifiedAuthenticationService\n // }\n api_enums::Connector::Vgs => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"Vgs is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::Volt => Self::Volt,\n api_enums::Connector::Wellsfargo => Self::Wellsfargo,\n // api_enums::Connector::Wellsfargopayout => Self::Wellsfargopayout,\n api_enums::Connector::Wise => Self::Wise,\n api_enums::Connector::Worldline => Self::Worldline,\n api_enums::Connector::Worldpay => Self::Worldpay,\n // api_enums::Connector::Worldpayvantiv => Self::Worldpayvantiv,\n api_enums::Connector::Worldpayxml => Self::Worldpayxml,\n api_enums::Connector::Xendit => Self::Xendit,\n api_enums::Connector::Zen => Self::Zen,\n api_enums::Connector::Zsl => Self::Zsl,\n #[cfg(feature = \"dummy_connector\")]\n api_enums::Connector::DummyBillingConnector => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"stripe_billing_test is not a routable connector\".to_string(),\n })?\n }\n #[cfg(feature = \"dummy_connector\")]\n api_enums::Connector::DummyConnector1 => Self::DummyConnector1,\n #[cfg(feature = \"dummy_connector\")]\n api_enums::Connector::DummyConnector2 => Self::DummyConnector2,\n #[cfg(feature = \"dummy_connector\")]\n api_enums::Connector::DummyConnector3 => Self::DummyConnector3,\n #[cfg(feature = \"dummy_connector\")]\n api_enums::Connector::DummyConnector4 => Self::DummyConnector4,\n #[cfg(feature = \"dummy_connector\")]\n api_enums::Connector::DummyConnector5 => Self::DummyConnector5,\n #[cfg(feature = \"dummy_connector\")]\n api_enums::Connector::DummyConnector6 => Self::DummyConnector6,\n #[cfg(feature = \"dummy_connector\")]\n api_enums::Connector::DummyConnector7 => Self::DummyConnector7,\n api_enums::Connector::Threedsecureio => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"threedsecureio is not a routable connector\".to_string(),\n })?\n }\n api_enums::Connector::Taxjar => {\n Err(common_utils::errors::ValidationError::InvalidValue {\n message: \"Taxjar is not a routable connector\".to_string(),\n })?\n }\n })\n }\n}",
|
| 35 |
+
"diff_span": {
|
| 36 |
+
"before": " api_enums::Connector::Worldline => Self::Worldline,\n api_enums::Connector::Worldpay => Self::Worldpay,\n\t\t\t// api_enums::Connector::Worldpayvantiv => Self::Worldpayvantiv,\n api_enums::Connector::Worldpayxml => Self::Worldpayxml,\n api_enums::Connector::Xendit => Self::Xendit,",
|
| 37 |
+
"after": " api_enums::Connector::Worldline => Self::Worldline,\n api_enums::Connector::Worldpay => Self::Worldpay,\n // api_enums::Connector::Worldpayvantiv => Self::Worldpayvantiv,\n api_enums::Connector::Worldpayxml => Self::Worldpayxml,\n api_enums::Connector::Xendit => Self::Xendit,"
|
| 38 |
+
},
|
| 39 |
+
"commit_sha": "3f188d34bf43e0d26ae9434135b2f5a9be12d689"
|
| 40 |
+
},
|
| 41 |
+
{
|
| 42 |
+
"id": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv.rs::Worldpayvantiv::function::build_error_response",
|
| 43 |
+
"file": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv.rs",
|
| 44 |
+
"kind": "function_item",
|
| 45 |
+
"status": "modified",
|
| 46 |
+
"code_changed": true,
|
| 47 |
+
"imports_changed": false,
|
| 48 |
+
"before_code": "fn build_error_response(\n &self,\n res: Response,\n event_builder: Option<&mut ConnectorEvent>,\n ) -> CustomResult<ErrorResponse, errors::ConnectorError> {\n let response: worldpayvantiv::WorldpayvantivErrorResponse = res\n .response\n .parse_struct(\"WorldpayvantivErrorResponse\")\n .change_context(errors::ConnectorError::ResponseDeserializationFailed)?;\n\n event_builder.map(|i| i.set_response_body(&response));\n router_env::logger::info!(connector_response=?response);\n\n Ok(ErrorResponse {\n status_code: res.status_code,\n code: response.code,\n message: response.message,\n reason: response.reason,\n attempt_status: None,\n connector_transaction_id: None,\n network_decline_code: None,\n network_advice_code: None,\n network_error_message: None\n })\n }",
|
| 49 |
+
"after_code": "fn build_error_response(\n &self,\n res: Response,\n event_builder: Option<&mut ConnectorEvent>,\n ) -> CustomResult<ErrorResponse, errors::ConnectorError> {\n let response: worldpayvantiv::WorldpayvantivErrorResponse = res\n .response\n .parse_struct(\"WorldpayvantivErrorResponse\")\n .change_context(errors::ConnectorError::ResponseDeserializationFailed)?;\n\n event_builder.map(|i| i.set_response_body(&response));\n router_env::logger::info!(connector_response=?response);\n\n Ok(ErrorResponse {\n status_code: res.status_code,\n code: response.code,\n message: response.message,\n reason: response.reason,\n attempt_status: None,\n connector_transaction_id: None,\n network_decline_code: None,\n network_advice_code: None,\n network_error_message: None,\n })\n }",
|
| 50 |
+
"diff_span": {
|
| 51 |
+
"before": " network_decline_code: None,\n network_advice_code: None,\n network_error_message: None\n })\n }",
|
| 52 |
+
"after": " network_decline_code: None,\n network_advice_code: None,\n network_error_message: None,\n })\n }"
|
| 53 |
+
},
|
| 54 |
+
"commit_sha": "3f188d34bf43e0d26ae9434135b2f5a9be12d689"
|
| 55 |
+
}
|
| 56 |
+
]
|
| 57 |
+
}
|
diffs/pr_8219/42463c8/diff.json
ADDED
|
@@ -0,0 +1,6 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "42463c872a79222bbfd7905bc9ce9f8e05fcf0f6",
|
| 3 |
+
"pr_number": 8219,
|
| 4 |
+
"rust_files": [],
|
| 5 |
+
"diffs": []
|
| 6 |
+
}
|
diffs/pr_8219/4823363/diff.json
ADDED
|
@@ -0,0 +1,8 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "4823363e1a3b336099cd44d3a4d5effafd1a2641",
|
| 3 |
+
"pr_number": 8219,
|
| 4 |
+
"rust_files": [
|
| 5 |
+
"crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs"
|
| 6 |
+
],
|
| 7 |
+
"diffs": []
|
| 8 |
+
}
|
diffs/pr_8219/5acc8d2/diff.json
ADDED
|
@@ -0,0 +1,70 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "5acc8d2cd43b98ade0e832062dd0d476bab726fe",
|
| 3 |
+
"pr_number": 8219,
|
| 4 |
+
"rust_files": [
|
| 5 |
+
"crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs",
|
| 6 |
+
"crates/payment_methods/src/configs/payment_connector_required_fields.rs"
|
| 7 |
+
],
|
| 8 |
+
"diffs": [
|
| 9 |
+
{
|
| 10 |
+
"id": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs::RouterData<F, PaymentsAuthorizeData, PaymentsResponseData>::function::try_from",
|
| 11 |
+
"file": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs",
|
| 12 |
+
"kind": "function_item",
|
| 13 |
+
"status": "modified",
|
| 14 |
+
"code_changed": true,
|
| 15 |
+
"imports_changed": false,
|
| 16 |
+
"before_code": "fn try_from(\n item: ResponseRouterData<F, CnpOnlineResponse, PaymentsAuthorizeData, PaymentsResponseData>,\n ) -> Result<Self, Self::Error> {\n match (item.response.sale_response, item.response.authorization_response) {\n (Some(sale_response), None) => {\n let status = get_attempt_status(WorldpayvantivPaymentFlow::Sale, sale_response.response_code)?;\n if connector_utils::is_payment_failure(status) {\n Ok(Self {\n status,\n response: Err(ErrorResponse {\n code: sale_response.response_code.to_string(),\n message: sale_response.message.clone(),\n reason: Some(sale_response.message.clone()),\n status_code: item.http_code,\n attempt_status: None,\n connector_transaction_id: Some(sale_response.order_id),\n network_advice_code: None,\n network_decline_code: None,\n network_error_message: None,\n }),\n ..item.data\n })\n } else {\n let report_group = WorldpayvantivMetadataObject {\n report_group: sale_response.report_group.clone(),\n };\n let connector_metadata = Some(report_group.encode_to_value()\n .change_context(errors::ConnectorError::ResponseHandlingFailed)?);\n\n Ok(Self {\n status,\n response: Ok(PaymentsResponseData::TransactionResponse {\n resource_id: ResponseId::ConnectorTransactionId(sale_response.cnp_txn_id),\n redirection_data: Box::new(None),\n mandate_reference: Box::new(None),\n connector_metadata,\n network_txn_id: None,\n connector_response_reference_id: Some(sale_response.order_id),\n incremental_authorization_allowed: None,\n charges: None,\n }),\n ..item.data\n })\n }\n },\n (None, Some(auth_response)) => {\n let status = get_attempt_status(WorldpayvantivPaymentFlow::Auth, auth_response.response_code)?;\n if connector_utils::is_payment_failure(status) {\n Ok(Self {\n status,\n response: Err(ErrorResponse {\n code: auth_response.response_code.to_string(),\n message: auth_response.message.clone(),\n reason: Some(auth_response.message.clone()),\n status_code: item.http_code,\n attempt_status: None,\n connector_transaction_id: Some(auth_response.order_id),\n network_advice_code: None,\n network_decline_code: None,\n network_error_message: None,\n }),\n ..item.data\n })\n } else {\n let report_group = WorldpayvantivMetadataObject {\n report_group: auth_response.report_group.clone(),\n };\n let connector_metadata = Some(report_group.encode_to_value()\n .change_context(errors::ConnectorError::ResponseHandlingFailed)?);\n\n Ok(Self {\n status,\n response: Ok(PaymentsResponseData::TransactionResponse {\n resource_id: ResponseId::ConnectorTransactionId(auth_response.cnp_txn_id),\n redirection_data: Box::new(None),\n mandate_reference: Box::new(None),\n connector_metadata,\n network_txn_id: None,\n connector_response_reference_id: Some(auth_response.order_id),\n incremental_authorization_allowed: None,\n charges: None,\n }),\n ..item.data\n })\n }\n },\n (None, None) => { Ok(Self {\n status: common_enums::AttemptStatus::Failure,\n response: Err(ErrorResponse {\n code: item.response.response_code.clone(),\n message: item.response.message.clone(),\n reason: Some(item.response.message.clone()),\n status_code: item.http_code,\n attempt_status: None,\n connector_transaction_id: None,\n network_advice_code: None,\n network_decline_code: None,\n network_error_message: None,\n }),\n ..item.data\n })},\n (_, _) => { Err(errors::ConnectorError::UnexpectedResponseError(\n bytes::Bytes::from(\"Only one of 'sale_response' or 'authorisation_response' is expected, but both were recieved\".to_string()), \n ))?\n },\n }\n }",
|
| 17 |
+
"after_code": "fn try_from(\n item: ResponseRouterData<F, CnpOnlineResponse, PaymentsAuthorizeData, PaymentsResponseData>,\n ) -> Result<Self, Self::Error> {\n match (item.response.sale_response, item.response.authorization_response) {\n (Some(sale_response), None) => {\n let status = get_attempt_status(WorldpayvantivPaymentFlow::Sale, sale_response.response_code)?;\n if connector_utils::is_payment_failure(status) {\n Ok(Self {\n status,\n response: Err(ErrorResponse {\n code: sale_response.response_code.to_string(),\n message: sale_response.message.clone(),\n reason: Some(sale_response.message.clone()),\n status_code: item.http_code,\n attempt_status: None,\n connector_transaction_id: Some(sale_response.order_id),\n network_advice_code: None,\n network_decline_code: None,\n network_error_message: None,\n }),\n ..item.data\n })\n } else {\n let report_group = WorldpayvantivPaymentMetadata {\n report_group: Some(sale_response.report_group.clone()),\n };\n let connector_metadata = Some(report_group.encode_to_value()\n .change_context(errors::ConnectorError::ResponseHandlingFailed)?);\n\n Ok(Self {\n status,\n response: Ok(PaymentsResponseData::TransactionResponse {\n resource_id: ResponseId::ConnectorTransactionId(sale_response.cnp_txn_id),\n redirection_data: Box::new(None),\n mandate_reference: Box::new(None),\n connector_metadata,\n network_txn_id: None,\n connector_response_reference_id: Some(sale_response.order_id),\n incremental_authorization_allowed: None,\n charges: None,\n }),\n ..item.data\n })\n }\n },\n (None, Some(auth_response)) => {\n let status = get_attempt_status(WorldpayvantivPaymentFlow::Auth, auth_response.response_code)?;\n if connector_utils::is_payment_failure(status) {\n Ok(Self {\n status,\n response: Err(ErrorResponse {\n code: auth_response.response_code.to_string(),\n message: auth_response.message.clone(),\n reason: Some(auth_response.message.clone()),\n status_code: item.http_code,\n attempt_status: None,\n connector_transaction_id: Some(auth_response.order_id),\n network_advice_code: None,\n network_decline_code: None,\n network_error_message: None,\n }),\n ..item.data\n })\n } else {\n let report_group = WorldpayvantivPaymentMetadata {\n report_group: Some(auth_response.report_group.clone()),\n };\n let connector_metadata = Some(report_group.encode_to_value()\n .change_context(errors::ConnectorError::ResponseHandlingFailed)?);\n\n Ok(Self {\n status,\n response: Ok(PaymentsResponseData::TransactionResponse {\n resource_id: ResponseId::ConnectorTransactionId(auth_response.cnp_txn_id),\n redirection_data: Box::new(None),\n mandate_reference: Box::new(None),\n connector_metadata,\n network_txn_id: None,\n connector_response_reference_id: Some(auth_response.order_id),\n incremental_authorization_allowed: None,\n charges: None,\n }),\n ..item.data\n })\n }\n },\n (None, None) => { Ok(Self {\n status: common_enums::AttemptStatus::Failure,\n response: Err(ErrorResponse {\n code: item.response.response_code.clone(),\n message: item.response.message.clone(),\n reason: Some(item.response.message.clone()),\n status_code: item.http_code,\n attempt_status: None,\n connector_transaction_id: None,\n network_advice_code: None,\n network_decline_code: None,\n network_error_message: None,\n }),\n ..item.data\n })},\n (_, _) => { Err(errors::ConnectorError::UnexpectedResponseError(\n bytes::Bytes::from(\"Only one of 'sale_response' or 'authorisation_response' is expected, but both were recieved\".to_string()), \n ))?\n },\n }\n }",
|
| 18 |
+
"diff_span": {
|
| 19 |
+
"before": " })\n } else {\n let report_group = WorldpayvantivMetadataObject {\n report_group: sale_response.report_group.clone(),\n };\n let connector_metadata = Some(report_group.encode_to_value()\n .change_context(errors::ConnectorError::ResponseHandlingFailed)?);\n\n Ok(Self {\n status,\n response: Ok(PaymentsResponseData::TransactionResponse {\n resource_id: ResponseId::ConnectorTransactionId(sale_response.cnp_txn_id),\n redirection_data: Box::new(None),\n mandate_reference: Box::new(None),\n connector_metadata,\n network_txn_id: None,\n connector_response_reference_id: Some(sale_response.order_id),\n incremental_authorization_allowed: None,\n charges: None,\n }),\n ..item.data\n })\n }\n },\n (None, Some(auth_response)) => {\n let status = get_attempt_status(WorldpayvantivPaymentFlow::Auth, auth_response.response_code)?;\n if connector_utils::is_payment_failure(status) {\n Ok(Self {\n status,\n response: Err(ErrorResponse {\n code: auth_response.response_code.to_string(),\n message: auth_response.message.clone(),\n reason: Some(auth_response.message.clone()),\n status_code: item.http_code,\n attempt_status: None,\n connector_transaction_id: Some(auth_response.order_id),\n network_advice_code: None,\n network_decline_code: None,\n network_error_message: None,\n }),\n ..item.data\n })\n } else {\n let report_group = WorldpayvantivMetadataObject {\n report_group: auth_response.report_group.clone(),\n };\n let connector_metadata = Some(report_group.encode_to_value()",
|
| 20 |
+
"after": " })\n } else {\n let report_group = WorldpayvantivPaymentMetadata {\n report_group: Some(sale_response.report_group.clone()),\n };\n let connector_metadata = Some(report_group.encode_to_value()\n .change_context(errors::ConnectorError::ResponseHandlingFailed)?);\n\n Ok(Self {\n status,\n response: Ok(PaymentsResponseData::TransactionResponse {\n resource_id: ResponseId::ConnectorTransactionId(sale_response.cnp_txn_id),\n redirection_data: Box::new(None),\n mandate_reference: Box::new(None),\n connector_metadata,\n network_txn_id: None,\n connector_response_reference_id: Some(sale_response.order_id),\n incremental_authorization_allowed: None,\n charges: None,\n }),\n ..item.data\n })\n }\n },\n (None, Some(auth_response)) => {\n let status = get_attempt_status(WorldpayvantivPaymentFlow::Auth, auth_response.response_code)?;\n if connector_utils::is_payment_failure(status) {\n Ok(Self {\n status,\n response: Err(ErrorResponse {\n code: auth_response.response_code.to_string(),\n message: auth_response.message.clone(),\n reason: Some(auth_response.message.clone()),\n status_code: item.http_code,\n attempt_status: None,\n connector_transaction_id: Some(auth_response.order_id),\n network_advice_code: None,\n network_decline_code: None,\n network_error_message: None,\n }),\n ..item.data\n })\n } else {\n let report_group = WorldpayvantivPaymentMetadata {\n report_group: Some(auth_response.report_group.clone()),\n };\n let connector_metadata = Some(report_group.encode_to_value()"
|
| 21 |
+
},
|
| 22 |
+
"commit_sha": "5acc8d2cd43b98ade0e832062dd0d476bab726fe"
|
| 23 |
+
},
|
| 24 |
+
{
|
| 25 |
+
"id": "crates/payment_methods/src/configs/payment_connector_required_fields.rs::function::get_cards_required_fields",
|
| 26 |
+
"file": "crates/payment_methods/src/configs/payment_connector_required_fields.rs",
|
| 27 |
+
"kind": "function_item",
|
| 28 |
+
"status": "modified",
|
| 29 |
+
"code_changed": true,
|
| 30 |
+
"imports_changed": false,
|
| 31 |
+
"before_code": "fn get_cards_required_fields() -> HashMap<Connector, RequiredFieldFinal> {\n HashMap::from([\n (Connector::Aci, fields(vec![], vec![], card_with_name())),\n (Connector::Adyen, fields(vec![], vec![], card_with_name())),\n (Connector::Airwallex, fields(vec![], card_basic(), vec![])),\n (\n Connector::Authorizedotnet,\n fields(vec![], vec![], card_basic()),\n ),\n (\n Connector::Bambora,\n fields(vec![], [card_with_name(), billing_email()].concat(), vec![]),\n ),\n (\n Connector::Bankofamerica,\n fields(\n vec![],\n vec![],\n [card_basic(), email(), full_name(), billing_address()].concat(),\n ),\n ),\n (Connector::Billwerk, fields(vec![], vec![], card_basic())),\n (\n Connector::Bluesnap,\n fields(\n vec![],\n [card_basic(), email(), full_name()].concat(),\n vec![],\n ),\n ),\n (Connector::Boku, fields(vec![], vec![], card_basic())),\n (Connector::Braintree, fields(vec![], vec![], card_basic())),\n (Connector::Checkout, fields(vec![], card_basic(), vec![])),\n (\n Connector::Coinbase,\n fields(vec![], vec![RequiredField::BillingUserFirstName], vec![]),\n ),\n (\n Connector::Cybersource,\n fields(\n vec![],\n vec![],\n [card_with_name(), billing_email(), billing_address()].concat(),\n ),\n ),\n (\n Connector::Datatrans,\n fields(vec![], vec![], [billing_email(), card_with_name()].concat()),\n ),\n (\n Connector::Deutschebank,\n fields(\n vec![],\n [\n card_basic(),\n email(),\n billing_address(),\n vec![\n RequiredField::BillingFirstName(\"first_name\", FieldType::UserFullName),\n RequiredField::BillingLastName(\"last_name\", FieldType::UserFullName),\n ],\n ]\n .concat(),\n vec![],\n ),\n ),\n (\n Connector::Dlocal,\n fields(\n vec![],\n [\n card_with_name(),\n vec![RequiredField::BillingAddressCountries(vec![\"ALL\"])],\n ]\n .concat(),\n vec![],\n ),\n ),\n #[cfg(feature = \"dummy_connector\")]\n (\n Connector::DummyConnector1,\n fields(vec![], vec![], card_basic()),\n ),\n #[cfg(feature = \"dummy_connector\")]\n (\n Connector::DummyConnector2,\n fields(vec![], vec![], card_basic()),\n ),\n #[cfg(feature = \"dummy_connector\")]\n (\n Connector::DummyConnector3,\n fields(vec![], vec![], card_basic()),\n ),\n #[cfg(feature = \"dummy_connector\")]\n (\n Connector::DummyConnector4,\n fields(vec![], vec![], card_basic()),\n ),\n #[cfg(feature = \"dummy_connector\")]\n (\n Connector::DummyConnector5,\n fields(vec![], vec![], card_basic()),\n ),\n #[cfg(feature = \"dummy_connector\")]\n (\n Connector::DummyConnector6,\n fields(vec![], vec![], card_basic()),\n ),\n #[cfg(feature = \"dummy_connector\")]\n (\n Connector::DummyConnector7,\n fields(vec![], vec![], card_basic()),\n ),\n (\n Connector::Elavon,\n fields(vec![], [card_basic(), billing_email()].concat(), vec![]),\n ),\n (Connector::Fiserv, fields(vec![], card_basic(), vec![])),\n (\n Connector::Fiuu,\n fields(\n vec![\n RequiredField::BillingEmail,\n RequiredField::BillingUserFirstName,\n ],\n vec![],\n card_basic(),\n ),\n ),\n (Connector::Forte, fields(vec![], card_with_name(), vec![])),\n (Connector::Globalpay, fields(vec![], vec![], card_basic())),\n (\n Connector::Hipay,\n fields(\n vec![],\n vec![],\n [\n vec![RequiredField::BillingEmail],\n billing_address(),\n card_with_name(),\n ]\n .concat(),\n ),\n ),\n (\n Connector::Helcim,\n fields(\n vec![],\n [\n card_with_name(),\n vec![\n RequiredField::BillingAddressZip,\n RequiredField::BillingAddressLine1,\n ],\n ]\n .concat(),\n vec![],\n ),\n ),\n (Connector::Iatapay, fields(vec![], vec![], vec![])),\n (Connector::Mollie, fields(vec![], card_with_name(), vec![])),\n (Connector::Moneris, fields(vec![], card_basic(), vec![])),\n (\n Connector::Multisafepay,\n fields(\n vec![],\n vec![],\n [\n card_with_name(),\n vec![\n RequiredField::BillingAddressLine1,\n RequiredField::BillingAddressLine2,\n RequiredField::BillingAddressCity,\n RequiredField::BillingAddressZip,\n RequiredField::BillingAddressCountries(vec![\"ALL\"]),\n ],\n ]\n .concat(),\n ),\n ),\n (Connector::Nexinets, fields(vec![], vec![], card_basic())),\n (\n Connector::Nexixpay,\n RequiredFieldFinal {\n mandate: HashMap::new(),\n non_mandate: HashMap::new(),\n common: HashMap::from([\n RequiredField::CardNumber.to_tuple(),\n RequiredField::CardExpMonth.to_tuple(),\n RequiredField::CardExpYear.to_tuple(),\n RequiredField::BillingFirstName(\"first_name\", FieldType::UserFullName)\n .to_tuple(),\n RequiredField::BillingLastName(\"last_name\", FieldType::UserFullName).to_tuple(),\n ]),\n },\n ),\n (\n Connector::Nmi,\n fields(\n vec![],\n [card_with_name(), vec![RequiredField::BillingAddressZip]].concat(),\n vec![],\n ),\n ),\n (Connector::Noon, fields(vec![], vec![], card_with_name())),\n (\n Connector::Novalnet,\n fields(\n vec![],\n vec![],\n [\n vec![\n RequiredField::BillingFirstName(\"first_name\", FieldType::UserFullName),\n RequiredField::BillingLastName(\"last_name\", FieldType::UserFullName),\n ],\n billing_email(),\n ]\n .concat(),\n ),\n ),\n (Connector::Nuvei, fields(vec![], vec![], card_basic())),\n (\n Connector::Paybox,\n fields(\n vec![],\n vec![],\n [\n email(),\n card_with_name(),\n vec![\n RequiredField::BillingAddressLine1,\n RequiredField::BillingAddressCity,\n RequiredField::BillingAddressZip,\n RequiredField::BillingAddressCountries(vec![\"ALL\"]),\n ],\n ]\n .concat(),\n ),\n ),\n (\n Connector::Payme,\n fields(vec![], vec![], [email(), card_with_name()].concat()),\n ),\n (Connector::Paypal, fields(vec![], card_basic(), vec![])),\n (Connector::Payu, fields(vec![], card_basic(), vec![])),\n (\n Connector::Powertranz,\n fields(vec![], card_with_name(), vec![]),\n ),\n (Connector::Rapyd, fields(vec![], card_with_name(), vec![])),\n (Connector::Redsys, fields(vec![], card_basic(), vec![])),\n (Connector::Shift4, fields(vec![], card_basic(), vec![])),\n (Connector::Square, fields(vec![], vec![], card_basic())),\n (Connector::Stax, fields(vec![], card_with_name(), vec![])),\n (Connector::Stripe, fields(vec![], vec![], card_basic())),\n (\n Connector::Trustpay,\n fields(\n vec![],\n [\n card_with_name(),\n vec![\n RequiredField::BillingAddressLine1,\n RequiredField::BillingAddressCity,\n RequiredField::BillingAddressZip,\n RequiredField::BillingAddressCountries(vec![\"ALL\"]),\n ],\n ]\n .concat(),\n vec![],\n ),\n ),\n (Connector::Tsys, fields(vec![], card_basic(), vec![])),\n (\n Connector::Wellsfargo,\n fields(\n vec![],\n vec![],\n [card_with_name(), email(), billing_address()].concat(),\n ),\n ),\n (\n Connector::Worldline,\n fields(\n vec![],\n [\n card_basic(),\n vec![RequiredField::BillingAddressCountries(vec![\"ALL\"])],\n ]\n .concat(),\n vec![],\n ),\n ),\n (\n Connector::Worldpay,\n fields(\n vec![],\n vec![],\n vec![\n RequiredField::CardNumber,\n RequiredField::CardExpMonth,\n RequiredField::CardExpYear,\n RequiredField::BillingUserFirstName,\n ],\n ),\n ),\n (\n Connector::Xendit,\n fields(\n vec![],\n vec![],\n [\n card_basic(),\n vec![RequiredField::BillingEmail, RequiredField::BillingPhone],\n ]\n .concat(),\n ),\n ),\n (\n Connector::Zen,\n RequiredFieldFinal {\n mandate: HashMap::new(),\n non_mandate: HashMap::from([\n RequiredField::CardNumber.to_tuple(),\n RequiredField::CardExpMonth.to_tuple(),\n RequiredField::CardExpYear.to_tuple(),\n RequiredField::Email.to_tuple(),\n ]),\n common: HashMap::new(),\n },\n ),\n ])\n}",
|
| 32 |
+
"after_code": "fn get_cards_required_fields() -> HashMap<Connector, RequiredFieldFinal> {\n HashMap::from([\n (Connector::Aci, fields(vec![], vec![], card_with_name())),\n (Connector::Adyen, fields(vec![], vec![], card_with_name())),\n (Connector::Airwallex, fields(vec![], card_basic(), vec![])),\n (\n Connector::Authorizedotnet,\n fields(vec![], vec![], card_basic()),\n ),\n (\n Connector::Bambora,\n fields(vec![], [card_with_name(), billing_email()].concat(), vec![]),\n ),\n (\n Connector::Bankofamerica,\n fields(\n vec![],\n vec![],\n [card_basic(), email(), full_name(), billing_address()].concat(),\n ),\n ),\n (Connector::Billwerk, fields(vec![], vec![], card_basic())),\n (\n Connector::Bluesnap,\n fields(\n vec![],\n [card_basic(), email(), full_name()].concat(),\n vec![],\n ),\n ),\n (Connector::Boku, fields(vec![], vec![], card_basic())),\n (Connector::Braintree, fields(vec![], vec![], card_basic())),\n (Connector::Checkout, fields(vec![], card_basic(), vec![])),\n (\n Connector::Coinbase,\n fields(vec![], vec![RequiredField::BillingUserFirstName], vec![]),\n ),\n (\n Connector::Cybersource,\n fields(\n vec![],\n vec![],\n [card_with_name(), billing_email(), billing_address()].concat(),\n ),\n ),\n (\n Connector::Datatrans,\n fields(vec![], vec![], [billing_email(), card_with_name()].concat()),\n ),\n (\n Connector::Deutschebank,\n fields(\n vec![],\n [\n card_basic(),\n email(),\n billing_address(),\n vec![\n RequiredField::BillingFirstName(\"first_name\", FieldType::UserFullName),\n RequiredField::BillingLastName(\"last_name\", FieldType::UserFullName),\n ],\n ]\n .concat(),\n vec![],\n ),\n ),\n (\n Connector::Dlocal,\n fields(\n vec![],\n [\n card_with_name(),\n vec![RequiredField::BillingAddressCountries(vec![\"ALL\"])],\n ]\n .concat(),\n vec![],\n ),\n ),\n #[cfg(feature = \"dummy_connector\")]\n (\n Connector::DummyConnector1,\n fields(vec![], vec![], card_basic()),\n ),\n #[cfg(feature = \"dummy_connector\")]\n (\n Connector::DummyConnector2,\n fields(vec![], vec![], card_basic()),\n ),\n #[cfg(feature = \"dummy_connector\")]\n (\n Connector::DummyConnector3,\n fields(vec![], vec![], card_basic()),\n ),\n #[cfg(feature = \"dummy_connector\")]\n (\n Connector::DummyConnector4,\n fields(vec![], vec![], card_basic()),\n ),\n #[cfg(feature = \"dummy_connector\")]\n (\n Connector::DummyConnector5,\n fields(vec![], vec![], card_basic()),\n ),\n #[cfg(feature = \"dummy_connector\")]\n (\n Connector::DummyConnector6,\n fields(vec![], vec![], card_basic()),\n ),\n #[cfg(feature = \"dummy_connector\")]\n (\n Connector::DummyConnector7,\n fields(vec![], vec![], card_basic()),\n ),\n (\n Connector::Elavon,\n fields(vec![], [card_basic(), billing_email()].concat(), vec![]),\n ),\n (Connector::Fiserv, fields(vec![], card_basic(), vec![])),\n (\n Connector::Fiuu,\n fields(\n vec![\n RequiredField::BillingEmail,\n RequiredField::BillingUserFirstName,\n ],\n vec![],\n card_basic(),\n ),\n ),\n (Connector::Forte, fields(vec![], card_with_name(), vec![])),\n (Connector::Globalpay, fields(vec![], vec![], card_basic())),\n (\n Connector::Hipay,\n fields(\n vec![],\n vec![],\n [\n vec![RequiredField::BillingEmail],\n billing_address(),\n card_with_name(),\n ]\n .concat(),\n ),\n ),\n (\n Connector::Helcim,\n fields(\n vec![],\n [\n card_with_name(),\n vec![\n RequiredField::BillingAddressZip,\n RequiredField::BillingAddressLine1,\n ],\n ]\n .concat(),\n vec![],\n ),\n ),\n (Connector::Iatapay, fields(vec![], vec![], vec![])),\n (Connector::Mollie, fields(vec![], card_with_name(), vec![])),\n (Connector::Moneris, fields(vec![], card_basic(), vec![])),\n (\n Connector::Multisafepay,\n fields(\n vec![],\n vec![],\n [\n card_with_name(),\n vec![\n RequiredField::BillingAddressLine1,\n RequiredField::BillingAddressLine2,\n RequiredField::BillingAddressCity,\n RequiredField::BillingAddressZip,\n RequiredField::BillingAddressCountries(vec![\"ALL\"]),\n ],\n ]\n .concat(),\n ),\n ),\n (Connector::Nexinets, fields(vec![], vec![], card_basic())),\n (\n Connector::Nexixpay,\n RequiredFieldFinal {\n mandate: HashMap::new(),\n non_mandate: HashMap::new(),\n common: HashMap::from([\n RequiredField::CardNumber.to_tuple(),\n RequiredField::CardExpMonth.to_tuple(),\n RequiredField::CardExpYear.to_tuple(),\n RequiredField::BillingFirstName(\"first_name\", FieldType::UserFullName)\n .to_tuple(),\n RequiredField::BillingLastName(\"last_name\", FieldType::UserFullName).to_tuple(),\n ]),\n },\n ),\n (\n Connector::Nmi,\n fields(\n vec![],\n [card_with_name(), vec![RequiredField::BillingAddressZip]].concat(),\n vec![],\n ),\n ),\n (Connector::Noon, fields(vec![], vec![], card_with_name())),\n (\n Connector::Novalnet,\n fields(\n vec![],\n vec![],\n [\n vec![\n RequiredField::BillingFirstName(\"first_name\", FieldType::UserFullName),\n RequiredField::BillingLastName(\"last_name\", FieldType::UserFullName),\n ],\n billing_email(),\n ]\n .concat(),\n ),\n ),\n (Connector::Nuvei, fields(vec![], vec![], card_basic())),\n (\n Connector::Paybox,\n fields(\n vec![],\n vec![],\n [\n email(),\n card_with_name(),\n vec![\n RequiredField::BillingAddressLine1,\n RequiredField::BillingAddressCity,\n RequiredField::BillingAddressZip,\n RequiredField::BillingAddressCountries(vec![\"ALL\"]),\n ],\n ]\n .concat(),\n ),\n ),\n (\n Connector::Payme,\n fields(vec![], vec![], [email(), card_with_name()].concat()),\n ),\n (Connector::Paypal, fields(vec![], card_basic(), vec![])),\n (Connector::Payu, fields(vec![], card_basic(), vec![])),\n (\n Connector::Powertranz,\n fields(vec![], card_with_name(), vec![]),\n ),\n (Connector::Rapyd, fields(vec![], card_with_name(), vec![])),\n (Connector::Redsys, fields(vec![], card_basic(), vec![])),\n (Connector::Shift4, fields(vec![], card_basic(), vec![])),\n (Connector::Square, fields(vec![], vec![], card_basic())),\n (Connector::Stax, fields(vec![], card_with_name(), vec![])),\n (Connector::Stripe, fields(vec![], vec![], card_basic())),\n (\n Connector::Trustpay,\n fields(\n vec![],\n [\n card_with_name(),\n vec![\n RequiredField::BillingAddressLine1,\n RequiredField::BillingAddressCity,\n RequiredField::BillingAddressZip,\n RequiredField::BillingAddressCountries(vec![\"ALL\"]),\n ],\n ]\n .concat(),\n vec![],\n ),\n ),\n (Connector::Tsys, fields(vec![], card_basic(), vec![])),\n (\n Connector::Wellsfargo,\n fields(\n vec![],\n vec![],\n [card_with_name(), email(), billing_address()].concat(),\n ),\n ),\n (\n Connector::Worldline,\n fields(\n vec![],\n [\n card_basic(),\n vec![RequiredField::BillingAddressCountries(vec![\"ALL\"])],\n ]\n .concat(),\n vec![],\n ),\n ),\n (\n Connector::Worldpay,\n fields(\n vec![],\n vec![],\n vec![\n RequiredField::CardNumber,\n RequiredField::CardExpMonth,\n RequiredField::CardExpYear,\n RequiredField::BillingUserFirstName,\n ],\n ),\n ),\n (Connector::Worldpayvantiv, fields(vec![], card_basic(), vec![])),\n (\n Connector::Xendit,\n fields(\n vec![],\n vec![],\n [\n card_basic(),\n vec![RequiredField::BillingEmail, RequiredField::BillingPhone],\n ]\n .concat(),\n ),\n ),\n (\n Connector::Zen,\n RequiredFieldFinal {\n mandate: HashMap::new(),\n non_mandate: HashMap::from([\n RequiredField::CardNumber.to_tuple(),\n RequiredField::CardExpMonth.to_tuple(),\n RequiredField::CardExpYear.to_tuple(),\n RequiredField::Email.to_tuple(),\n ]),\n common: HashMap::new(),\n },\n ),\n ])\n}",
|
| 33 |
+
"diff_span": {
|
| 34 |
+
"before": "",
|
| 35 |
+
"after": " ),\n ),\n (Connector::Worldpayvantiv, fields(vec![], card_basic(), vec![])),\n (\n Connector::Xendit,"
|
| 36 |
+
},
|
| 37 |
+
"commit_sha": "5acc8d2cd43b98ade0e832062dd0d476bab726fe"
|
| 38 |
+
},
|
| 39 |
+
{
|
| 40 |
+
"id": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs::struct::WorldpayvantivMetadataObject",
|
| 41 |
+
"file": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs",
|
| 42 |
+
"kind": "struct_item",
|
| 43 |
+
"status": "modified",
|
| 44 |
+
"code_changed": true,
|
| 45 |
+
"imports_changed": false,
|
| 46 |
+
"before_code": "pub struct WorldpayvantivMetadataObject {\n pub report_group: String,\n}",
|
| 47 |
+
"after_code": "pub struct WorldpayvantivMetadataObject {\n pub report_group: String,\n pub merchant_config_currency: common_enums::Currency,\n}",
|
| 48 |
+
"diff_span": {
|
| 49 |
+
"before": "",
|
| 50 |
+
"after": "pub struct WorldpayvantivMetadataObject {\n pub report_group: String,\n pub merchant_config_currency: common_enums::Currency,\n}"
|
| 51 |
+
},
|
| 52 |
+
"commit_sha": "5acc8d2cd43b98ade0e832062dd0d476bab726fe"
|
| 53 |
+
},
|
| 54 |
+
{
|
| 55 |
+
"id": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs::impl::RouterData<F, PaymentsAuthorizeData, PaymentsResponseData>",
|
| 56 |
+
"file": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs",
|
| 57 |
+
"kind": "impl_item",
|
| 58 |
+
"status": "modified",
|
| 59 |
+
"code_changed": true,
|
| 60 |
+
"imports_changed": false,
|
| 61 |
+
"before_code": "impl<F>\n TryFrom<ResponseRouterData<F, CnpOnlineResponse, PaymentsAuthorizeData, PaymentsResponseData>>\n for RouterData<F, PaymentsAuthorizeData, PaymentsResponseData>\n{\n type Error = error_stack::Report<errors::ConnectorError>;\n fn try_from(\n item: ResponseRouterData<F, CnpOnlineResponse, PaymentsAuthorizeData, PaymentsResponseData>,\n ) -> Result<Self, Self::Error> {\n match (item.response.sale_response, item.response.authorization_response) {\n (Some(sale_response), None) => {\n let status = get_attempt_status(WorldpayvantivPaymentFlow::Sale, sale_response.response_code)?;\n if connector_utils::is_payment_failure(status) {\n Ok(Self {\n status,\n response: Err(ErrorResponse {\n code: sale_response.response_code.to_string(),\n message: sale_response.message.clone(),\n reason: Some(sale_response.message.clone()),\n status_code: item.http_code,\n attempt_status: None,\n connector_transaction_id: Some(sale_response.order_id),\n network_advice_code: None,\n network_decline_code: None,\n network_error_message: None,\n }),\n ..item.data\n })\n } else {\n let report_group = WorldpayvantivMetadataObject {\n report_group: sale_response.report_group.clone(),\n };\n let connector_metadata = Some(report_group.encode_to_value()\n .change_context(errors::ConnectorError::ResponseHandlingFailed)?);\n\n Ok(Self {\n status,\n response: Ok(PaymentsResponseData::TransactionResponse {\n resource_id: ResponseId::ConnectorTransactionId(sale_response.cnp_txn_id),\n redirection_data: Box::new(None),\n mandate_reference: Box::new(None),\n connector_metadata,\n network_txn_id: None,\n connector_response_reference_id: Some(sale_response.order_id),\n incremental_authorization_allowed: None,\n charges: None,\n }),\n ..item.data\n })\n }\n },\n (None, Some(auth_response)) => {\n let status = get_attempt_status(WorldpayvantivPaymentFlow::Auth, auth_response.response_code)?;\n if connector_utils::is_payment_failure(status) {\n Ok(Self {\n status,\n response: Err(ErrorResponse {\n code: auth_response.response_code.to_string(),\n message: auth_response.message.clone(),\n reason: Some(auth_response.message.clone()),\n status_code: item.http_code,\n attempt_status: None,\n connector_transaction_id: Some(auth_response.order_id),\n network_advice_code: None,\n network_decline_code: None,\n network_error_message: None,\n }),\n ..item.data\n })\n } else {\n let report_group = WorldpayvantivMetadataObject {\n report_group: auth_response.report_group.clone(),\n };\n let connector_metadata = Some(report_group.encode_to_value()\n .change_context(errors::ConnectorError::ResponseHandlingFailed)?);\n\n Ok(Self {\n status,\n response: Ok(PaymentsResponseData::TransactionResponse {\n resource_id: ResponseId::ConnectorTransactionId(auth_response.cnp_txn_id),\n redirection_data: Box::new(None),\n mandate_reference: Box::new(None),\n connector_metadata,\n network_txn_id: None,\n connector_response_reference_id: Some(auth_response.order_id),\n incremental_authorization_allowed: None,\n charges: None,\n }),\n ..item.data\n })\n }\n },\n (None, None) => { Ok(Self {\n status: common_enums::AttemptStatus::Failure,\n response: Err(ErrorResponse {\n code: item.response.response_code.clone(),\n message: item.response.message.clone(),\n reason: Some(item.response.message.clone()),\n status_code: item.http_code,\n attempt_status: None,\n connector_transaction_id: None,\n network_advice_code: None,\n network_decline_code: None,\n network_error_message: None,\n }),\n ..item.data\n })},\n (_, _) => { Err(errors::ConnectorError::UnexpectedResponseError(\n bytes::Bytes::from(\"Only one of 'sale_response' or 'authorisation_response' is expected, but both were recieved\".to_string()), \n ))?\n },\n }\n }\n}",
|
| 62 |
+
"after_code": "impl<F>\n TryFrom<ResponseRouterData<F, CnpOnlineResponse, PaymentsAuthorizeData, PaymentsResponseData>>\n for RouterData<F, PaymentsAuthorizeData, PaymentsResponseData>\n{\n type Error = error_stack::Report<errors::ConnectorError>;\n fn try_from(\n item: ResponseRouterData<F, CnpOnlineResponse, PaymentsAuthorizeData, PaymentsResponseData>,\n ) -> Result<Self, Self::Error> {\n match (item.response.sale_response, item.response.authorization_response) {\n (Some(sale_response), None) => {\n let status = get_attempt_status(WorldpayvantivPaymentFlow::Sale, sale_response.response_code)?;\n if connector_utils::is_payment_failure(status) {\n Ok(Self {\n status,\n response: Err(ErrorResponse {\n code: sale_response.response_code.to_string(),\n message: sale_response.message.clone(),\n reason: Some(sale_response.message.clone()),\n status_code: item.http_code,\n attempt_status: None,\n connector_transaction_id: Some(sale_response.order_id),\n network_advice_code: None,\n network_decline_code: None,\n network_error_message: None,\n }),\n ..item.data\n })\n } else {\n let report_group = WorldpayvantivPaymentMetadata {\n report_group: Some(sale_response.report_group.clone()),\n };\n let connector_metadata = Some(report_group.encode_to_value()\n .change_context(errors::ConnectorError::ResponseHandlingFailed)?);\n\n Ok(Self {\n status,\n response: Ok(PaymentsResponseData::TransactionResponse {\n resource_id: ResponseId::ConnectorTransactionId(sale_response.cnp_txn_id),\n redirection_data: Box::new(None),\n mandate_reference: Box::new(None),\n connector_metadata,\n network_txn_id: None,\n connector_response_reference_id: Some(sale_response.order_id),\n incremental_authorization_allowed: None,\n charges: None,\n }),\n ..item.data\n })\n }\n },\n (None, Some(auth_response)) => {\n let status = get_attempt_status(WorldpayvantivPaymentFlow::Auth, auth_response.response_code)?;\n if connector_utils::is_payment_failure(status) {\n Ok(Self {\n status,\n response: Err(ErrorResponse {\n code: auth_response.response_code.to_string(),\n message: auth_response.message.clone(),\n reason: Some(auth_response.message.clone()),\n status_code: item.http_code,\n attempt_status: None,\n connector_transaction_id: Some(auth_response.order_id),\n network_advice_code: None,\n network_decline_code: None,\n network_error_message: None,\n }),\n ..item.data\n })\n } else {\n let report_group = WorldpayvantivPaymentMetadata {\n report_group: Some(auth_response.report_group.clone()),\n };\n let connector_metadata = Some(report_group.encode_to_value()\n .change_context(errors::ConnectorError::ResponseHandlingFailed)?);\n\n Ok(Self {\n status,\n response: Ok(PaymentsResponseData::TransactionResponse {\n resource_id: ResponseId::ConnectorTransactionId(auth_response.cnp_txn_id),\n redirection_data: Box::new(None),\n mandate_reference: Box::new(None),\n connector_metadata,\n network_txn_id: None,\n connector_response_reference_id: Some(auth_response.order_id),\n incremental_authorization_allowed: None,\n charges: None,\n }),\n ..item.data\n })\n }\n },\n (None, None) => { Ok(Self {\n status: common_enums::AttemptStatus::Failure,\n response: Err(ErrorResponse {\n code: item.response.response_code.clone(),\n message: item.response.message.clone(),\n reason: Some(item.response.message.clone()),\n status_code: item.http_code,\n attempt_status: None,\n connector_transaction_id: None,\n network_advice_code: None,\n network_decline_code: None,\n network_error_message: None,\n }),\n ..item.data\n })},\n (_, _) => { Err(errors::ConnectorError::UnexpectedResponseError(\n bytes::Bytes::from(\"Only one of 'sale_response' or 'authorisation_response' is expected, but both were recieved\".to_string()), \n ))?\n },\n }\n }\n}",
|
| 63 |
+
"diff_span": {
|
| 64 |
+
"before": " })\n } else {\n let report_group = WorldpayvantivMetadataObject {\n report_group: sale_response.report_group.clone(),\n };\n let connector_metadata = Some(report_group.encode_to_value()\n .change_context(errors::ConnectorError::ResponseHandlingFailed)?);\n\n Ok(Self {\n status,\n response: Ok(PaymentsResponseData::TransactionResponse {\n resource_id: ResponseId::ConnectorTransactionId(sale_response.cnp_txn_id),\n redirection_data: Box::new(None),\n mandate_reference: Box::new(None),\n connector_metadata,\n network_txn_id: None,\n connector_response_reference_id: Some(sale_response.order_id),\n incremental_authorization_allowed: None,\n charges: None,\n }),\n ..item.data\n })\n }\n },\n (None, Some(auth_response)) => {\n let status = get_attempt_status(WorldpayvantivPaymentFlow::Auth, auth_response.response_code)?;\n if connector_utils::is_payment_failure(status) {\n Ok(Self {\n status,\n response: Err(ErrorResponse {\n code: auth_response.response_code.to_string(),\n message: auth_response.message.clone(),\n reason: Some(auth_response.message.clone()),\n status_code: item.http_code,\n attempt_status: None,\n connector_transaction_id: Some(auth_response.order_id),\n network_advice_code: None,\n network_decline_code: None,\n network_error_message: None,\n }),\n ..item.data\n })\n } else {\n let report_group = WorldpayvantivMetadataObject {\n report_group: auth_response.report_group.clone(),\n };\n let connector_metadata = Some(report_group.encode_to_value()",
|
| 65 |
+
"after": " })\n } else {\n let report_group = WorldpayvantivPaymentMetadata {\n report_group: Some(sale_response.report_group.clone()),\n };\n let connector_metadata = Some(report_group.encode_to_value()\n .change_context(errors::ConnectorError::ResponseHandlingFailed)?);\n\n Ok(Self {\n status,\n response: Ok(PaymentsResponseData::TransactionResponse {\n resource_id: ResponseId::ConnectorTransactionId(sale_response.cnp_txn_id),\n redirection_data: Box::new(None),\n mandate_reference: Box::new(None),\n connector_metadata,\n network_txn_id: None,\n connector_response_reference_id: Some(sale_response.order_id),\n incremental_authorization_allowed: None,\n charges: None,\n }),\n ..item.data\n })\n }\n },\n (None, Some(auth_response)) => {\n let status = get_attempt_status(WorldpayvantivPaymentFlow::Auth, auth_response.response_code)?;\n if connector_utils::is_payment_failure(status) {\n Ok(Self {\n status,\n response: Err(ErrorResponse {\n code: auth_response.response_code.to_string(),\n message: auth_response.message.clone(),\n reason: Some(auth_response.message.clone()),\n status_code: item.http_code,\n attempt_status: None,\n connector_transaction_id: Some(auth_response.order_id),\n network_advice_code: None,\n network_decline_code: None,\n network_error_message: None,\n }),\n ..item.data\n })\n } else {\n let report_group = WorldpayvantivPaymentMetadata {\n report_group: Some(auth_response.report_group.clone()),\n };\n let connector_metadata = Some(report_group.encode_to_value()"
|
| 66 |
+
},
|
| 67 |
+
"commit_sha": "5acc8d2cd43b98ade0e832062dd0d476bab726fe"
|
| 68 |
+
}
|
| 69 |
+
]
|
| 70 |
+
}
|
diffs/pr_8219/621fb90/diff.json
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
diffs/pr_8219/8b42528/diff.json
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
diffs/pr_8219/8d3dc9f/diff.json
ADDED
|
@@ -0,0 +1,6 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "8d3dc9f60c2ae5d81b62d056035aec59cd7b04ff",
|
| 3 |
+
"pr_number": 8219,
|
| 4 |
+
"rust_files": [],
|
| 5 |
+
"diffs": []
|
| 6 |
+
}
|
diffs/pr_8219/a3db16f/diff.json
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
diffs/pr_8219/b59a3eb/diff.json
ADDED
|
@@ -0,0 +1,24 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "b59a3ebeea6ae41c9994347c999304763dac54ff",
|
| 3 |
+
"pr_number": 8219,
|
| 4 |
+
"rust_files": [
|
| 5 |
+
"crates/hyperswitch_connectors/src/connectors/worldpayvantiv.rs"
|
| 6 |
+
],
|
| 7 |
+
"diffs": [
|
| 8 |
+
{
|
| 9 |
+
"id": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv.rs::Worldpayvantiv::function::get_currency_unit",
|
| 10 |
+
"file": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv.rs",
|
| 11 |
+
"kind": "function_item",
|
| 12 |
+
"status": "modified",
|
| 13 |
+
"code_changed": true,
|
| 14 |
+
"imports_changed": false,
|
| 15 |
+
"before_code": "fn get_currency_unit(&self) -> api::CurrencyUnit {\n todo!()\n // TODO! Check connector documentation, on which unit they are processing the currency.\n // If the connector accepts amount in lower unit ( i.e cents for USD) then return api::CurrencyUnit::Minor,\n // if connector accepts amount in base unit (i.e dollars for USD) then return api::CurrencyUnit::Base\n }",
|
| 16 |
+
"after_code": "fn get_currency_unit(&self) -> api::CurrencyUnit {\n api::CurrencyUnit::Minor\n }",
|
| 17 |
+
"diff_span": {
|
| 18 |
+
"before": "fn get_currency_unit(&self) -> api::CurrencyUnit {\n todo!()\n // TODO! Check connector documentation, on which unit they are processing the currency.\n // If the connector accepts amount in lower unit ( i.e cents for USD) then return api::CurrencyUnit::Minor,\n // if connector accepts amount in base unit (i.e dollars for USD) then return api::CurrencyUnit::Base\n }",
|
| 19 |
+
"after": "fn get_currency_unit(&self) -> api::CurrencyUnit {\n api::CurrencyUnit::Minor\n }"
|
| 20 |
+
},
|
| 21 |
+
"commit_sha": "b59a3ebeea6ae41c9994347c999304763dac54ff"
|
| 22 |
+
}
|
| 23 |
+
]
|
| 24 |
+
}
|
diffs/pr_8219/bd1ce27/diff.json
ADDED
|
@@ -0,0 +1,64 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "bd1ce277fa8783d5d05558f05e608b0057b6e9b8",
|
| 3 |
+
"pr_number": 8219,
|
| 4 |
+
"rust_files": [
|
| 5 |
+
"crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs"
|
| 6 |
+
],
|
| 7 |
+
"diffs": [
|
| 8 |
+
{
|
| 9 |
+
"id": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs::function::get_attempt_status",
|
| 10 |
+
"file": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs",
|
| 11 |
+
"kind": "function_item",
|
| 12 |
+
"status": "modified",
|
| 13 |
+
"code_changed": true,
|
| 14 |
+
"imports_changed": false,
|
| 15 |
+
"before_code": "fn get_attempt_status(\n flow: WorldpayvantivPaymentFlow,\n response: WorldpayvantivResponseCode,\n) -> Result<common_enums::AttemptStatus, errors::ConnectorError> {\n match response {\n WorldpayvantivResponseCode::Approved\n | WorldpayvantivResponseCode::PartiallyApproved\n | WorldpayvantivResponseCode::OfflineApproval\n | WorldpayvantivResponseCode::OfflineApprovalUnableToGoOnline => match flow {\n WorldpayvantivPaymentFlow::Sale => Ok(common_enums::AttemptStatus::Charged),\n WorldpayvantivPaymentFlow::Auth => Ok(common_enums::AttemptStatus::Authorized),\n WorldpayvantivPaymentFlow::Capture => Ok(common_enums::AttemptStatus::Charged),\n WorldpayvantivPaymentFlow::Void => Ok(common_enums::AttemptStatus::Voided),\n }\n WorldpayvantivResponseCode::PendingShopperCheckoutCompletion\n | WorldpayvantivResponseCode::TransactionReceived => {\n Ok(common_enums::AttemptStatus::Pending)\n }\n\n WorldpayvantivResponseCode::ShopperCheckoutExpired\n | WorldpayvantivResponseCode::ProcessingNetworkUnavailable\n | WorldpayvantivResponseCode::IssuerUnavailable\n | WorldpayvantivResponseCode::ReSubmitTransaction\n | WorldpayvantivResponseCode::TryAgainLater\n | WorldpayvantivResponseCode::InsufficientFunds\n | WorldpayvantivResponseCode::AuthorizationAmountHasAlreadyBeenDepleted\n | WorldpayvantivResponseCode::InsufficientFundsRetryAfter1Hour\n | WorldpayvantivResponseCode::InsufficientFundsRetryAfter24Hour\n | WorldpayvantivResponseCode::InsufficientFundsRetryAfter2Days\n | WorldpayvantivResponseCode::InsufficientFundsRetryAfter4Days\n | WorldpayvantivResponseCode::InsufficientFundsRetryAfter6Days\n | WorldpayvantivResponseCode::InsufficientFundsRetryAfter8Days\n | WorldpayvantivResponseCode::InsufficientFundsRetryAfter10Days\n | WorldpayvantivResponseCode::CallIssuer\n | WorldpayvantivResponseCode::CallAmex\n | WorldpayvantivResponseCode::CallDinersClub\n | WorldpayvantivResponseCode::CallDiscover\n | WorldpayvantivResponseCode::CallJbs\n | WorldpayvantivResponseCode::CallVisaMastercard\n | WorldpayvantivResponseCode::CallIssuerUpdateCardholderData\n | WorldpayvantivResponseCode::ExceedsApprovalAmountLimit\n | WorldpayvantivResponseCode::CallIndicatedNumber\n | WorldpayvantivResponseCode::UnacceptablePinTransactionDeclinedRetry\n | WorldpayvantivResponseCode::PinNotChanged\n | WorldpayvantivResponseCode::ConsumerMultiUseVirtualCardNumberSoftDecline\n | WorldpayvantivResponseCode::ConsumerNonReloadablePrepaidCardSoftDecline\n | WorldpayvantivResponseCode::ConsumerSingleUseVirtualCardNumberSoftDecline\n | WorldpayvantivResponseCode::UpdateCardholderData\n | WorldpayvantivResponseCode::ConsumerNonReloadablePrepaidCardApproved\n | WorldpayvantivResponseCode::ConsumerSingleUseVirtualCardNumberApproved\n | WorldpayvantivResponseCode::MerchantDoesntQualifyForProductCode\n | WorldpayvantivResponseCode::Lifecycle\n | WorldpayvantivResponseCode::Policy\n | WorldpayvantivResponseCode::FraudSecurity\n | WorldpayvantivResponseCode::InvalidOrExpiredCardContactCardholderToUpdate\n | WorldpayvantivResponseCode::InvalidTransactionOrCardRestrictionVerifyInformationAndResubmit\n | WorldpayvantivResponseCode::AtLeastOneOfOrigIdOrOrigCnpTxnIdIsRequired\n | WorldpayvantivResponseCode::OrigCnpTxnIdIsRequiredWhenShowStatusOnlyIsUsed\n | WorldpayvantivResponseCode::IncrementalAuthNotSupported\n | WorldpayvantivResponseCode::SetAuthIndicatorToIncremental\n | WorldpayvantivResponseCode::IncrementalValueForAuthIndicatorNotAllowedInThisAuthStructure\n | WorldpayvantivResponseCode::CannotRequestAnIncrementalAuthIfOriginalAuthNotSetToEstimated\n | WorldpayvantivResponseCode::TransactionMustReferenceTheEstimatedAuth\n | WorldpayvantivResponseCode::IncrementedAuthExceedsMaxTransactionAmount\n | WorldpayvantivResponseCode::SubmittedMccNotAllowed\n | WorldpayvantivResponseCode::MerchantNotCertifiedEnabledForIias\n | WorldpayvantivResponseCode::IssuerGeneratedError\n | WorldpayvantivResponseCode::PickupCardOtherThanLostStolen\n | WorldpayvantivResponseCode::InvalidAmountHardDecline\n | WorldpayvantivResponseCode::ReversalUnsuccessful\n | WorldpayvantivResponseCode::MissingData\n | WorldpayvantivResponseCode::PickupCardLostCard\n | WorldpayvantivResponseCode::PickupCardStolenCard\n | WorldpayvantivResponseCode::RestrictedCard\n | WorldpayvantivResponseCode::InvalidDeactivate\n | WorldpayvantivResponseCode::CardAlreadyActive\n | WorldpayvantivResponseCode::CardNotActive\n | WorldpayvantivResponseCode::CardAlreadyDeactivate\n | WorldpayvantivResponseCode::OverMaxBalance\n | WorldpayvantivResponseCode::InvalidActivate\n | WorldpayvantivResponseCode::NoTransactionFoundForReversal\n | WorldpayvantivResponseCode::IncorrectCvv\n | WorldpayvantivResponseCode::IllegalTransaction\n | WorldpayvantivResponseCode::DuplicateTransaction\n | WorldpayvantivResponseCode::SystemError\n | WorldpayvantivResponseCode::DeconvertedBin\n | WorldpayvantivResponseCode::MerchantDepleted\n | WorldpayvantivResponseCode::GiftCardEscheated\n | WorldpayvantivResponseCode::InvalidReversalTypeForCreditCardTransaction\n | WorldpayvantivResponseCode::SystemErrorMessageFormatError\n | WorldpayvantivResponseCode::SystemErrorCannotProcess\n | WorldpayvantivResponseCode::RefundRejectedDueToPendingDepositStatus\n | WorldpayvantivResponseCode::RefundRejectedDueToDeclinedDepositStatus\n | WorldpayvantivResponseCode::RefundRejectedByTheProcessingNetwork\n | WorldpayvantivResponseCode::CaptureCreditAndAuthReversalTagsCannotBeUsedForGiftCardTransactions\n | WorldpayvantivResponseCode::InvalidAccountNumber\n | WorldpayvantivResponseCode::AccountNumberDoesNotMatchPaymentType\n | WorldpayvantivResponseCode::PickUpCard\n | WorldpayvantivResponseCode::LostStolenCard\n | WorldpayvantivResponseCode::ExpiredCard\n | WorldpayvantivResponseCode::AuthorizationHasExpiredNoNeedToReverse\n | WorldpayvantivResponseCode::RestrictedCardSoftDecline\n | WorldpayvantivResponseCode::RestrictedCardChargeback\n | WorldpayvantivResponseCode::RestrictedCardPrepaidCardFilteringService\n | WorldpayvantivResponseCode::InvalidTrackData\n | WorldpayvantivResponseCode::DepositIsAlreadyReferencedByAChargeback\n | WorldpayvantivResponseCode::RestrictedCardInternationalCardFilteringService\n | WorldpayvantivResponseCode::InternationalFilteringForIssuingCardCountry\n | WorldpayvantivResponseCode::RestrictedCardAuthFraudVelocityFilteringService\n | WorldpayvantivResponseCode::AutomaticRefundAlreadyIssued\n | WorldpayvantivResponseCode::RestrictedCardAuthFraudAdviceFilteringService\n | WorldpayvantivResponseCode::RestrictedCardFraudAvsFilteringService\n | WorldpayvantivResponseCode::InvalidExpirationDate\n | WorldpayvantivResponseCode::InvalidMerchant\n | WorldpayvantivResponseCode::InvalidTransaction\n | WorldpayvantivResponseCode::NoSuchIssuer\n | WorldpayvantivResponseCode::InvalidPin\n | WorldpayvantivResponseCode::TransactionNotAllowedAtTerminal\n | WorldpayvantivResponseCode::ExceedsNumberOfPinEntries\n | WorldpayvantivResponseCode::CardholderTransactionNotPermitted\n | WorldpayvantivResponseCode::CardholderRequestedThatRecurringOrInstallmentPaymentBeStopped\n | WorldpayvantivResponseCode::InvalidPaymentType\n | WorldpayvantivResponseCode::InvalidPosCapabilityForCardholderAuthorizedTerminalTransaction\n | WorldpayvantivResponseCode::InvalidPosCardholderIdForCardholderAuthorizedTerminalTransaction\n | WorldpayvantivResponseCode::ThisMethodOfPaymentDoesNotSupportAuthorizationReversals\n | WorldpayvantivResponseCode::ReversalAmountDoesNotMatchAuthorizationAmount\n | WorldpayvantivResponseCode::TransactionDidNotConvertToPinless\n | WorldpayvantivResponseCode::InvalidAmountSoftDecline\n | WorldpayvantivResponseCode::InvalidHealthcareAmounts\n | WorldpayvantivResponseCode::InvalidBillingDescriptorPrefix\n | WorldpayvantivResponseCode::InvalidBillingDescriptor\n | WorldpayvantivResponseCode::InvalidReportGroup\n | WorldpayvantivResponseCode::DoNotHonor\n | WorldpayvantivResponseCode::GenericDecline\n | WorldpayvantivResponseCode::DeclineRequestPositiveId\n | WorldpayvantivResponseCode::DeclineCvv2CidFail\n | WorldpayvantivResponseCode::ThreeDSecureTransactionNotSupportedByMerchant\n | WorldpayvantivResponseCode::InvalidPurchaseLevelIiiTheTransactionContainedBadOrMissingData\n | WorldpayvantivResponseCode::MissingHealthcareIiasTagForAnFsaTransaction\n | WorldpayvantivResponseCode::RestrictedByVantivDueToSecurityCodeMismatch\n | WorldpayvantivResponseCode::NoTransactionFoundWithSpecifiedTransactionId\n | WorldpayvantivResponseCode::AuthorizationNoLongerAvailable\n | WorldpayvantivResponseCode::TransactionNotVoidedAlreadySettled\n | WorldpayvantivResponseCode::AutoVoidOnRefund\n | WorldpayvantivResponseCode::InvalidAccountNumberOriginalOrNocUpdatedECheckAccountRequired\n | WorldpayvantivResponseCode::TotalCreditAmountExceedsCaptureAmount\n | WorldpayvantivResponseCode::ExceedTheThresholdForSendingRedeposits\n | WorldpayvantivResponseCode::DepositHasNotBeenReturnedForInsufficientNonSufficientFunds\n | WorldpayvantivResponseCode::InvalidCheckNumber\n | WorldpayvantivResponseCode::RedepositAgainstInvalidTransactionType\n | WorldpayvantivResponseCode::InternalSystemErrorCallVantiv\n | WorldpayvantivResponseCode::OriginalTransactionHasBeenProcessedFutureRedepositsCanceled\n | WorldpayvantivResponseCode::SoftDeclineAutoRecyclingInProgress\n | WorldpayvantivResponseCode::HardDeclineAutoRecyclingComplete\n | WorldpayvantivResponseCode::RestrictedCardCardUnderSanction\n | WorldpayvantivResponseCode::MerchantIsNotEnabledForSurcharging\n | WorldpayvantivResponseCode::ThisMethodOfPaymentDoesNotSupportSurcharging\n | WorldpayvantivResponseCode::SurchargeIsNotValidForDebitOrPrepaidCards\n | WorldpayvantivResponseCode::SurchargeCannotExceedsTheMaximumAllowedLimit\n | WorldpayvantivResponseCode::TransactionDeclinedByTheProcessingNetwork\n | WorldpayvantivResponseCode::SecondaryAmountCannotExceedTheSaleAmount\n | WorldpayvantivResponseCode::ThisMethodOfPaymentDoesNotSupportSecondaryAmount\n | WorldpayvantivResponseCode::SecondaryAmountCannotBeLessThanZero\n | WorldpayvantivResponseCode::PartialTransactionIsNotSupportedWhenIncludingASecondaryAmount\n | WorldpayvantivResponseCode::SecondaryAmountRequiredOnPartialRefundWhenUsedOnDeposit\n | WorldpayvantivResponseCode::SecondaryAmountNotAllowedOnRefundIfNotIncludedOnDeposit\n | WorldpayvantivResponseCode::ProcessingNetworkError\n | WorldpayvantivResponseCode::InvalidEMail\n | WorldpayvantivResponseCode::InvalidCombinationOfAccountFundingTransactionTypeAndMcc\n | WorldpayvantivResponseCode::InvalidAccountFundingTransactionTypeForThisMethodOfPayment\n | WorldpayvantivResponseCode::MissingOneOrMoreReceiverFieldsForAccountFundingTransaction\n | WorldpayvantivResponseCode::InvalidRecurringRequestSeeRecurringResponseForDetails\n | WorldpayvantivResponseCode::ApprovedRecurringSubscriptionCreated\n | WorldpayvantivResponseCode::ParentTransactionDeclinedRecurringSubscriptionNotCreated\n | WorldpayvantivResponseCode::InvalidPlanCode\n | WorldpayvantivResponseCode::ScheduledRecurringPaymentProcessed\n | WorldpayvantivResponseCode::InvalidSubscriptionId\n | WorldpayvantivResponseCode::AddOnCodeAlreadyExists\n | WorldpayvantivResponseCode::DuplicateAddOnCodesInRequests\n | WorldpayvantivResponseCode::NoMatchingAddOnCodeForTheSubscription\n | WorldpayvantivResponseCode::NoMatchingDiscountCodeForTheSubscription\n | WorldpayvantivResponseCode::DuplicateDiscountCodesInRequest\n | WorldpayvantivResponseCode::InvalidStartDate\n | WorldpayvantivResponseCode::MerchantNotRegisteredForRecurringEngine\n | WorldpayvantivResponseCode::InsufficientDataToUpdateSubscription\n | WorldpayvantivResponseCode::InvalidBillingDate\n | WorldpayvantivResponseCode::DiscountCodeAlreadyExists\n | WorldpayvantivResponseCode::PlanCodeAlreadyExists\n | WorldpayvantivResponseCode::TheAccountNumberWasChanged\n | WorldpayvantivResponseCode::TheAccountWasClosed\n | WorldpayvantivResponseCode::TheExpirationDateWasChanged\n | WorldpayvantivResponseCode::TheIssuingBankDoesNotParticipateInTheUpdateProgram\n | WorldpayvantivResponseCode::ContactTheCardholderForUpdatedInformation\n | WorldpayvantivResponseCode::TheCardholderHasOptedOutOfTheUpdateProgram\n | WorldpayvantivResponseCode::SoftDeclineCardReaderDecryptionServiceIsNotAvailable\n | WorldpayvantivResponseCode::SoftDeclineDecryptionFailed\n | WorldpayvantivResponseCode::HardDeclineInputDataIsInvalid\n | WorldpayvantivResponseCode::ApplePayKeyMismatch\n | WorldpayvantivResponseCode::ApplePayDecryptionFailed\n | WorldpayvantivResponseCode::HardDeclineDecryptionFailed\n | WorldpayvantivResponseCode::MerchantNotConfiguredForProcessingAtThisSite\n | WorldpayvantivResponseCode::AdvancedFraudFilterScoreBelowThreshold\n | WorldpayvantivResponseCode::SuspectedFraud\n | WorldpayvantivResponseCode::SystemErrorContactWorldpayRepresentative\n | WorldpayvantivResponseCode::AmazonPayAmazonUnavailable\n | WorldpayvantivResponseCode::AmazonPayAmazonDeclined\n | WorldpayvantivResponseCode::AmazonPayInvalidToken\n | WorldpayvantivResponseCode::MerchantNotEnabledForAmazonPay\n | WorldpayvantivResponseCode::TransactionNotSupportedBlockedByIssuer\n | WorldpayvantivResponseCode::BlockedByCardholderContactCardholder\n | WorldpayvantivResponseCode::SoftDeclinePrimaryFundingSourceFailed\n | WorldpayvantivResponseCode::SoftDeclineBuyerHasAlternateFundingSource\n | WorldpayvantivResponseCode::HardDeclineInvalidBillingAgreementId\n | WorldpayvantivResponseCode::HardDeclinePrimaryFundingSourceFailed\n | WorldpayvantivResponseCode::HardDeclineIssueWithPaypalAccount\n | WorldpayvantivResponseCode::HardDeclinePayPalAuthorizationIdMissing\n | WorldpayvantivResponseCode::HardDeclineConfirmedEmailAddressIsNotAvailable\n | WorldpayvantivResponseCode::HardDeclinePayPalBuyerAccountDenied\n | WorldpayvantivResponseCode::HardDeclinePayPalBuyerAccountRestricted\n | WorldpayvantivResponseCode::HardDeclinePayPalOrderHasBeenVoidedExpiredOrCompleted\n | WorldpayvantivResponseCode::HardDeclineIssueWithPayPalRefund\n | WorldpayvantivResponseCode::HardDeclinePayPalCredentialsIssue\n | WorldpayvantivResponseCode::HardDeclinePayPalAuthorizationVoidedOrExpired\n | WorldpayvantivResponseCode::HardDeclineRequiredPayPalParameterMissing\n | WorldpayvantivResponseCode::HardDeclinePayPalTransactionIdOrAuthIdIsInvalid\n | WorldpayvantivResponseCode::HardDeclineExceededMaximumNumberOfPayPalAuthorizationAttempts\n | WorldpayvantivResponseCode::HardDeclineTransactionAmountExceedsMerchantsPayPalAccountLimit\n | WorldpayvantivResponseCode::HardDeclinePayPalFundingSourcesUnavailable\n | WorldpayvantivResponseCode::HardDeclineIssueWithPayPalPrimaryFundingSource\n | WorldpayvantivResponseCode::HardDeclinePayPalProfileDoesNotAllowThisTransactionType\n | WorldpayvantivResponseCode::InternalSystemErrorWithPayPalContactVantiv\n | WorldpayvantivResponseCode::HardDeclineContactPayPalConsumerForAnotherPaymentMethod\n | WorldpayvantivResponseCode::InvalidTerminalId\n | WorldpayvantivResponseCode::PinlessDebitProcessingNotSupportedForNonRecurringTransactions\n | WorldpayvantivResponseCode::PinlessDebitProcessingNotSupportedForPartialAuths\n | WorldpayvantivResponseCode::MerchantNotConfiguredForPinlessDebitProcessing\n | WorldpayvantivResponseCode::DeclineCustomerCancellation\n | WorldpayvantivResponseCode::DeclineReTryTransaction\n | WorldpayvantivResponseCode::DeclineUnableToLocateRecordOnFile\n | WorldpayvantivResponseCode::DeclineFileUpdateFieldEditError\n | WorldpayvantivResponseCode::RemoteFunctionUnknown\n | WorldpayvantivResponseCode::DeclinedExceedsWithdrawalFrequencyLimit\n | WorldpayvantivResponseCode::DeclineCardRecordNotAvailable\n | WorldpayvantivResponseCode::InvalidAuthorizationCode\n | WorldpayvantivResponseCode::ReconciliationError\n | WorldpayvantivResponseCode::PreferredDebitRoutingDenialCreditTransactionCanBeDebit\n | WorldpayvantivResponseCode::DeclinedCurrencyConversionCompleteNoAuthPerformed\n | WorldpayvantivResponseCode::DeclinedMultiCurrencyDccFail\n | WorldpayvantivResponseCode::DeclinedMultiCurrencyInvertFail\n | WorldpayvantivResponseCode::Invalid3DSecurePassword\n | WorldpayvantivResponseCode::InvalidSocialSecurityNumber\n | WorldpayvantivResponseCode::InvalidMothersMaidenName\n | WorldpayvantivResponseCode::EnrollmentInquiryDeclined\n | WorldpayvantivResponseCode::SocialSecurityNumberNotAvailable\n | WorldpayvantivResponseCode::MothersMaidenNameNotAvailable\n | WorldpayvantivResponseCode::PinAlreadyExistsOnDatabase\n | WorldpayvantivResponseCode::Under18YearsOld\n | WorldpayvantivResponseCode::BillToOutsideUsa\n | WorldpayvantivResponseCode::BillToAddressIsNotEqualToShipToAddress\n | WorldpayvantivResponseCode::DeclinedForeignCurrencyMustBeUsd\n | WorldpayvantivResponseCode::OnNegativeFile\n | WorldpayvantivResponseCode::BlockedAgreement\n | WorldpayvantivResponseCode::InsufficientBuyingPower\n | WorldpayvantivResponseCode::InvalidData\n | WorldpayvantivResponseCode::InvalidDataDataElementsMissing\n | WorldpayvantivResponseCode::InvalidDataDataFormatError\n | WorldpayvantivResponseCode::InvalidDataInvalidTCVersion\n | WorldpayvantivResponseCode::DuplicateTransactionPaypalCredit\n | WorldpayvantivResponseCode::VerifyBillingAddress\n | WorldpayvantivResponseCode::InactiveAccount\n | WorldpayvantivResponseCode::InvalidAuth\n | WorldpayvantivResponseCode::AuthorizationAlreadyExistsForTheOrder\n | WorldpayvantivResponseCode::LodgingTransactionsAreNotAllowedForThisMcc\n | WorldpayvantivResponseCode::DurationCannotBeNegative\n | WorldpayvantivResponseCode::HotelFolioNumberCannotBeBlank\n | WorldpayvantivResponseCode::InvalidCheckInDate\n | WorldpayvantivResponseCode::InvalidCheckOutDate\n | WorldpayvantivResponseCode::InvalidCheckInOrCheckOutDate\n | WorldpayvantivResponseCode::CheckOutDateCannotBeBeforeCheckInDate\n | WorldpayvantivResponseCode::NumberOfAdultsCannotBeNegative\n | WorldpayvantivResponseCode::RoomRateCannotBeNegative\n | WorldpayvantivResponseCode::RoomTaxCannotBeNegative\n | WorldpayvantivResponseCode::DurationCanOnlyBeFrom0To99ForVisa\n | WorldpayvantivResponseCode::MerchantIsNotAuthorizedForTokens\n | WorldpayvantivResponseCode::CreditCardNumberWasInvalid\n | WorldpayvantivResponseCode::TokenWasNotFound\n | WorldpayvantivResponseCode::TokenInvalid\n | WorldpayvantivResponseCode::MerchantNotAuthorizedForECheckTokens\n | WorldpayvantivResponseCode::CheckoutIdWasInvalid\n | WorldpayvantivResponseCode::CheckoutIdWasNotFound\n | WorldpayvantivResponseCode::GenericCheckoutIdError\n | WorldpayvantivResponseCode::CaptureAmountCanNotBeMoreThanAuthorizedAmount\n | WorldpayvantivResponseCode::TaxBillingOnlyAllowedForMcc9311\n | WorldpayvantivResponseCode::Mcc9311RequiresTaxTypeElement\n | WorldpayvantivResponseCode::DebtRepaymentOnlyAllowedForViTransactionsOnMccs6012And6051\n | WorldpayvantivResponseCode::RoutingNumberDidNotMatchOneOnFileForToken\n | WorldpayvantivResponseCode::InvalidPayPageRegistrationId\n | WorldpayvantivResponseCode::ExpiredPayPageRegistrationId\n | WorldpayvantivResponseCode::MerchantIsNotAuthorizedForPayPage\n | WorldpayvantivResponseCode::MaximumNumberOfUpdatesForThisTokenExceeded\n | WorldpayvantivResponseCode::TooManyTokensCreatedForExistingNamespace\n | WorldpayvantivResponseCode::PinValidationNotPossible\n | WorldpayvantivResponseCode::GenericTokenRegistrationError\n | WorldpayvantivResponseCode::GenericTokenUseError\n | WorldpayvantivResponseCode::InvalidBankRoutingNumber\n | WorldpayvantivResponseCode::MissingName\n | WorldpayvantivResponseCode::InvalidName\n | WorldpayvantivResponseCode::MissingBillingCountryCode\n | WorldpayvantivResponseCode::InvalidIban\n | WorldpayvantivResponseCode::MissingEmailAddress\n | WorldpayvantivResponseCode::MissingMandateReference\n | WorldpayvantivResponseCode::InvalidMandateReference\n | WorldpayvantivResponseCode::MissingMandateUrl\n | WorldpayvantivResponseCode::InvalidMandateUrl\n | WorldpayvantivResponseCode::MissingMandateSignatureDate\n | WorldpayvantivResponseCode::InvalidMandateSignatureDate\n | WorldpayvantivResponseCode::RecurringMandateAlreadyExists\n | WorldpayvantivResponseCode::RecurringMandateWasNotFound\n | WorldpayvantivResponseCode::FinalRecurringWasAlreadyReceivedUsingThisMandate\n | WorldpayvantivResponseCode::IbanDidNotMatchOneOnFileForMandate\n | WorldpayvantivResponseCode::InvalidBillingCountry\n | WorldpayvantivResponseCode::ExpirationDateRequiredForInteracTransaction\n | WorldpayvantivResponseCode::TransactionTypeIsNotSupportedWithThisMethodOfPayment\n | WorldpayvantivResponseCode::UnreferencedOrphanRefundsAreNotAllowed\n | WorldpayvantivResponseCode::UnableToVoidATransactionWithAHeldState\n | WorldpayvantivResponseCode::ThisFundingInstructionResultsInANegativeAccountBalance\n | WorldpayvantivResponseCode::AccountBalanceInformationUnavailableAtThisTime\n | WorldpayvantivResponseCode::TheSubmittedCardIsNotEligibleForFastAccessFunding\n | WorldpayvantivResponseCode::TransactionCannotUseBothCcdPaymentInformationAndCtxPaymentInformation\n | WorldpayvantivResponseCode::ProcessingError\n | WorldpayvantivResponseCode::ThisFundingInstructionTypeIsInvalidForCanadianMerchants\n | WorldpayvantivResponseCode::CtxAndCcdRecordsAreNotAllowedForCanadianMerchants\n | WorldpayvantivResponseCode::CanadianAccountNumberCannotExceed12Digits\n | WorldpayvantivResponseCode::ThisFundingInstructionTypeIsInvalid\n | WorldpayvantivResponseCode::DeclineNegativeInformationOnFile\n | WorldpayvantivResponseCode::AbsoluteDecline\n | WorldpayvantivResponseCode::TheMerchantProfileDoesNotAllowTheRequestedOperation\n | WorldpayvantivResponseCode::TheAccountCannotAcceptAchTransactions\n | WorldpayvantivResponseCode::TheAccountCannotAcceptAchTransactionsOrSiteDrafts\n | WorldpayvantivResponseCode::AmountGreaterThanLimitSpecifiedInTheMerchantProfile\n | WorldpayvantivResponseCode::MerchantIsNotAuthorizedToPerformECheckVerificationTransactions\n | WorldpayvantivResponseCode::FirstNameAndLastNameRequiredForECheckVerifications\n | WorldpayvantivResponseCode::CompanyNameRequiredForCorporateAccountForECheckVerifications\n | WorldpayvantivResponseCode::PhoneNumberRequiredForECheckVerifications\n | WorldpayvantivResponseCode::CardBrandTokenNotSupported\n | WorldpayvantivResponseCode::PrivateLabelCardNotSupported\n | WorldpayvantivResponseCode::AllowedDailyDirectDebitCaptureECheckSaleLimitExceeded\n | WorldpayvantivResponseCode::AllowedDailyDirectDebitCreditECheckCreditLimitExceeded\n | WorldpayvantivResponseCode::AccountNotEligibleForRtp\n | WorldpayvantivResponseCode::SoftDeclineCustomerAuthenticationRequired\n | WorldpayvantivResponseCode::TransactionNotReversedVoidWorkflowNeedToBeInvoked\n | WorldpayvantivResponseCode::TransactionReversalNotSupportedForTheCoreMerchants\n | WorldpayvantivResponseCode::NoValidParentDepositOrParentRefundFound\n | WorldpayvantivResponseCode::TransactionReversalNotEnabledForVisa\n | WorldpayvantivResponseCode::TransactionReversalNotEnabledForMastercard\n | WorldpayvantivResponseCode::TransactionReversalNotEnabledForAmEx\n | WorldpayvantivResponseCode::TransactionReversalNotEnabledForDiscover\n | WorldpayvantivResponseCode::TransactionReversalNotSupported\n | WorldpayvantivResponseCode::FundingInstructionHeldPleaseContactYourRelationshipManager\n | WorldpayvantivResponseCode::MissingAddressInformation\n | WorldpayvantivResponseCode::CryptographicFailure\n | WorldpayvantivResponseCode::InvalidRegionCode\n | WorldpayvantivResponseCode::InvalidCountryCode\n | WorldpayvantivResponseCode::InvalidCreditAccount\n | WorldpayvantivResponseCode::InvalidCheckingAccount\n | WorldpayvantivResponseCode::InvalidSavingsAccount\n | WorldpayvantivResponseCode::InvalidUseOfMccCorrectAndReattempt\n | WorldpayvantivResponseCode::ExceedsRtpTransactionLimit\n => match flow {\n WorldpayvantivPaymentFlow::Sale\n | WorldpayvantivPaymentFlow::Auth => Ok(common_enums::AttemptStatus::Failure),\n WorldpayvantivPaymentFlow::Capture => Ok(common_enums::AttemptStatus::CaptureFailed),\n WorldpayvantivPaymentFlow::Void => Ok(common_enums::AttemptStatus::VoidFailed)\n }\n _ => {\n Err(errors::ConnectorError::UnexpectedResponseError(\n bytes::Bytes::from(\"Invalid response code \".to_string()),\n ))\n }\n }\n}",
|
| 16 |
+
"after_code": "fn get_attempt_status(\n flow: WorldpayvantivPaymentFlow,\n response: WorldpayvantivResponseCode,\n) -> Result<common_enums::AttemptStatus, errors::ConnectorError> {\n match response {\n WorldpayvantivResponseCode::Approved\n | WorldpayvantivResponseCode::PartiallyApproved\n | WorldpayvantivResponseCode::OfflineApproval\n | WorldpayvantivResponseCode::OfflineApprovalUnableToGoOnline\n | WorldpayvantivResponseCode::ConsumerNonReloadablePrepaidCardApproved\n | WorldpayvantivResponseCode::ConsumerSingleUseVirtualCardNumberApproved\n | WorldpayvantivResponseCode::ScheduledRecurringPaymentProcessed\n | WorldpayvantivResponseCode::ApprovedRecurringSubscriptionCreated\n => match flow {\n WorldpayvantivPaymentFlow::Sale => Ok(common_enums::AttemptStatus::Charged),\n WorldpayvantivPaymentFlow::Auth => Ok(common_enums::AttemptStatus::Authorized),\n WorldpayvantivPaymentFlow::Capture => Ok(common_enums::AttemptStatus::Charged),\n WorldpayvantivPaymentFlow::Void => Ok(common_enums::AttemptStatus::Voided),\n }\n WorldpayvantivResponseCode::PendingShopperCheckoutCompletion\n | WorldpayvantivResponseCode::TransactionReceived => {\n Ok(common_enums::AttemptStatus::Pending)\n }\n\n WorldpayvantivResponseCode::ShopperCheckoutExpired\n | WorldpayvantivResponseCode::ProcessingNetworkUnavailable\n | WorldpayvantivResponseCode::IssuerUnavailable\n | WorldpayvantivResponseCode::ReSubmitTransaction\n | WorldpayvantivResponseCode::TryAgainLater\n | WorldpayvantivResponseCode::InsufficientFunds\n | WorldpayvantivResponseCode::AuthorizationAmountHasAlreadyBeenDepleted\n | WorldpayvantivResponseCode::InsufficientFundsRetryAfter1Hour\n | WorldpayvantivResponseCode::InsufficientFundsRetryAfter24Hour\n | WorldpayvantivResponseCode::InsufficientFundsRetryAfter2Days\n | WorldpayvantivResponseCode::InsufficientFundsRetryAfter4Days\n | WorldpayvantivResponseCode::InsufficientFundsRetryAfter6Days\n | WorldpayvantivResponseCode::InsufficientFundsRetryAfter8Days\n | WorldpayvantivResponseCode::InsufficientFundsRetryAfter10Days\n | WorldpayvantivResponseCode::CallIssuer\n | WorldpayvantivResponseCode::CallAmex\n | WorldpayvantivResponseCode::CallDinersClub\n | WorldpayvantivResponseCode::CallDiscover\n | WorldpayvantivResponseCode::CallJbs\n | WorldpayvantivResponseCode::CallVisaMastercard\n | WorldpayvantivResponseCode::CallIssuerUpdateCardholderData\n | WorldpayvantivResponseCode::ExceedsApprovalAmountLimit\n | WorldpayvantivResponseCode::CallIndicatedNumber\n | WorldpayvantivResponseCode::UnacceptablePinTransactionDeclinedRetry\n | WorldpayvantivResponseCode::PinNotChanged\n | WorldpayvantivResponseCode::ConsumerMultiUseVirtualCardNumberSoftDecline\n | WorldpayvantivResponseCode::ConsumerNonReloadablePrepaidCardSoftDecline\n | WorldpayvantivResponseCode::ConsumerSingleUseVirtualCardNumberSoftDecline\n | WorldpayvantivResponseCode::UpdateCardholderData\n | WorldpayvantivResponseCode::MerchantDoesntQualifyForProductCode\n | WorldpayvantivResponseCode::Lifecycle\n | WorldpayvantivResponseCode::Policy\n | WorldpayvantivResponseCode::FraudSecurity\n | WorldpayvantivResponseCode::InvalidOrExpiredCardContactCardholderToUpdate\n | WorldpayvantivResponseCode::InvalidTransactionOrCardRestrictionVerifyInformationAndResubmit\n | WorldpayvantivResponseCode::AtLeastOneOfOrigIdOrOrigCnpTxnIdIsRequired\n | WorldpayvantivResponseCode::OrigCnpTxnIdIsRequiredWhenShowStatusOnlyIsUsed\n | WorldpayvantivResponseCode::IncrementalAuthNotSupported\n | WorldpayvantivResponseCode::SetAuthIndicatorToIncremental\n | WorldpayvantivResponseCode::IncrementalValueForAuthIndicatorNotAllowedInThisAuthStructure\n | WorldpayvantivResponseCode::CannotRequestAnIncrementalAuthIfOriginalAuthNotSetToEstimated\n | WorldpayvantivResponseCode::TransactionMustReferenceTheEstimatedAuth\n | WorldpayvantivResponseCode::IncrementedAuthExceedsMaxTransactionAmount\n | WorldpayvantivResponseCode::SubmittedMccNotAllowed\n | WorldpayvantivResponseCode::MerchantNotCertifiedEnabledForIias\n | WorldpayvantivResponseCode::IssuerGeneratedError\n | WorldpayvantivResponseCode::PickupCardOtherThanLostStolen\n | WorldpayvantivResponseCode::InvalidAmountHardDecline\n | WorldpayvantivResponseCode::ReversalUnsuccessful\n | WorldpayvantivResponseCode::MissingData\n | WorldpayvantivResponseCode::PickupCardLostCard\n | WorldpayvantivResponseCode::PickupCardStolenCard\n | WorldpayvantivResponseCode::RestrictedCard\n | WorldpayvantivResponseCode::InvalidDeactivate\n | WorldpayvantivResponseCode::CardAlreadyActive\n | WorldpayvantivResponseCode::CardNotActive\n | WorldpayvantivResponseCode::CardAlreadyDeactivate\n | WorldpayvantivResponseCode::OverMaxBalance\n | WorldpayvantivResponseCode::InvalidActivate\n | WorldpayvantivResponseCode::NoTransactionFoundForReversal\n | WorldpayvantivResponseCode::IncorrectCvv\n | WorldpayvantivResponseCode::IllegalTransaction\n | WorldpayvantivResponseCode::DuplicateTransaction\n | WorldpayvantivResponseCode::SystemError\n | WorldpayvantivResponseCode::DeconvertedBin\n | WorldpayvantivResponseCode::MerchantDepleted\n | WorldpayvantivResponseCode::GiftCardEscheated\n | WorldpayvantivResponseCode::InvalidReversalTypeForCreditCardTransaction\n | WorldpayvantivResponseCode::SystemErrorMessageFormatError\n | WorldpayvantivResponseCode::SystemErrorCannotProcess\n | WorldpayvantivResponseCode::RefundRejectedDueToPendingDepositStatus\n | WorldpayvantivResponseCode::RefundRejectedDueToDeclinedDepositStatus\n | WorldpayvantivResponseCode::RefundRejectedByTheProcessingNetwork\n | WorldpayvantivResponseCode::CaptureCreditAndAuthReversalTagsCannotBeUsedForGiftCardTransactions\n | WorldpayvantivResponseCode::InvalidAccountNumber\n | WorldpayvantivResponseCode::AccountNumberDoesNotMatchPaymentType\n | WorldpayvantivResponseCode::PickUpCard\n | WorldpayvantivResponseCode::LostStolenCard\n | WorldpayvantivResponseCode::ExpiredCard\n | WorldpayvantivResponseCode::AuthorizationHasExpiredNoNeedToReverse\n | WorldpayvantivResponseCode::RestrictedCardSoftDecline\n | WorldpayvantivResponseCode::RestrictedCardChargeback\n | WorldpayvantivResponseCode::RestrictedCardPrepaidCardFilteringService\n | WorldpayvantivResponseCode::InvalidTrackData\n | WorldpayvantivResponseCode::DepositIsAlreadyReferencedByAChargeback\n | WorldpayvantivResponseCode::RestrictedCardInternationalCardFilteringService\n | WorldpayvantivResponseCode::InternationalFilteringForIssuingCardCountry\n | WorldpayvantivResponseCode::RestrictedCardAuthFraudVelocityFilteringService\n | WorldpayvantivResponseCode::AutomaticRefundAlreadyIssued\n | WorldpayvantivResponseCode::RestrictedCardAuthFraudAdviceFilteringService\n | WorldpayvantivResponseCode::RestrictedCardFraudAvsFilteringService\n | WorldpayvantivResponseCode::InvalidExpirationDate\n | WorldpayvantivResponseCode::InvalidMerchant\n | WorldpayvantivResponseCode::InvalidTransaction\n | WorldpayvantivResponseCode::NoSuchIssuer\n | WorldpayvantivResponseCode::InvalidPin\n | WorldpayvantivResponseCode::TransactionNotAllowedAtTerminal\n | WorldpayvantivResponseCode::ExceedsNumberOfPinEntries\n | WorldpayvantivResponseCode::CardholderTransactionNotPermitted\n | WorldpayvantivResponseCode::CardholderRequestedThatRecurringOrInstallmentPaymentBeStopped\n | WorldpayvantivResponseCode::InvalidPaymentType\n | WorldpayvantivResponseCode::InvalidPosCapabilityForCardholderAuthorizedTerminalTransaction\n | WorldpayvantivResponseCode::InvalidPosCardholderIdForCardholderAuthorizedTerminalTransaction\n | WorldpayvantivResponseCode::ThisMethodOfPaymentDoesNotSupportAuthorizationReversals\n | WorldpayvantivResponseCode::ReversalAmountDoesNotMatchAuthorizationAmount\n | WorldpayvantivResponseCode::TransactionDidNotConvertToPinless\n | WorldpayvantivResponseCode::InvalidAmountSoftDecline\n | WorldpayvantivResponseCode::InvalidHealthcareAmounts\n | WorldpayvantivResponseCode::InvalidBillingDescriptorPrefix\n | WorldpayvantivResponseCode::InvalidBillingDescriptor\n | WorldpayvantivResponseCode::InvalidReportGroup\n | WorldpayvantivResponseCode::DoNotHonor\n | WorldpayvantivResponseCode::GenericDecline\n | WorldpayvantivResponseCode::DeclineRequestPositiveId\n | WorldpayvantivResponseCode::DeclineCvv2CidFail\n | WorldpayvantivResponseCode::ThreeDSecureTransactionNotSupportedByMerchant\n | WorldpayvantivResponseCode::InvalidPurchaseLevelIiiTheTransactionContainedBadOrMissingData\n | WorldpayvantivResponseCode::MissingHealthcareIiasTagForAnFsaTransaction\n | WorldpayvantivResponseCode::RestrictedByVantivDueToSecurityCodeMismatch\n | WorldpayvantivResponseCode::NoTransactionFoundWithSpecifiedTransactionId\n | WorldpayvantivResponseCode::AuthorizationNoLongerAvailable\n | WorldpayvantivResponseCode::TransactionNotVoidedAlreadySettled\n | WorldpayvantivResponseCode::AutoVoidOnRefund\n | WorldpayvantivResponseCode::InvalidAccountNumberOriginalOrNocUpdatedECheckAccountRequired\n | WorldpayvantivResponseCode::TotalCreditAmountExceedsCaptureAmount\n | WorldpayvantivResponseCode::ExceedTheThresholdForSendingRedeposits\n | WorldpayvantivResponseCode::DepositHasNotBeenReturnedForInsufficientNonSufficientFunds\n | WorldpayvantivResponseCode::InvalidCheckNumber\n | WorldpayvantivResponseCode::RedepositAgainstInvalidTransactionType\n | WorldpayvantivResponseCode::InternalSystemErrorCallVantiv\n | WorldpayvantivResponseCode::OriginalTransactionHasBeenProcessedFutureRedepositsCanceled\n | WorldpayvantivResponseCode::SoftDeclineAutoRecyclingInProgress\n | WorldpayvantivResponseCode::HardDeclineAutoRecyclingComplete\n | WorldpayvantivResponseCode::RestrictedCardCardUnderSanction\n | WorldpayvantivResponseCode::MerchantIsNotEnabledForSurcharging\n | WorldpayvantivResponseCode::ThisMethodOfPaymentDoesNotSupportSurcharging\n | WorldpayvantivResponseCode::SurchargeIsNotValidForDebitOrPrepaidCards\n | WorldpayvantivResponseCode::SurchargeCannotExceedsTheMaximumAllowedLimit\n | WorldpayvantivResponseCode::TransactionDeclinedByTheProcessingNetwork\n | WorldpayvantivResponseCode::SecondaryAmountCannotExceedTheSaleAmount\n | WorldpayvantivResponseCode::ThisMethodOfPaymentDoesNotSupportSecondaryAmount\n | WorldpayvantivResponseCode::SecondaryAmountCannotBeLessThanZero\n | WorldpayvantivResponseCode::PartialTransactionIsNotSupportedWhenIncludingASecondaryAmount\n | WorldpayvantivResponseCode::SecondaryAmountRequiredOnPartialRefundWhenUsedOnDeposit\n | WorldpayvantivResponseCode::SecondaryAmountNotAllowedOnRefundIfNotIncludedOnDeposit\n | WorldpayvantivResponseCode::ProcessingNetworkError\n | WorldpayvantivResponseCode::InvalidEMail\n | WorldpayvantivResponseCode::InvalidCombinationOfAccountFundingTransactionTypeAndMcc\n | WorldpayvantivResponseCode::InvalidAccountFundingTransactionTypeForThisMethodOfPayment\n | WorldpayvantivResponseCode::MissingOneOrMoreReceiverFieldsForAccountFundingTransaction\n | WorldpayvantivResponseCode::InvalidRecurringRequestSeeRecurringResponseForDetails\n | WorldpayvantivResponseCode::ParentTransactionDeclinedRecurringSubscriptionNotCreated\n | WorldpayvantivResponseCode::InvalidPlanCode\n | WorldpayvantivResponseCode::InvalidSubscriptionId\n | WorldpayvantivResponseCode::AddOnCodeAlreadyExists\n | WorldpayvantivResponseCode::DuplicateAddOnCodesInRequests\n | WorldpayvantivResponseCode::NoMatchingAddOnCodeForTheSubscription\n | WorldpayvantivResponseCode::NoMatchingDiscountCodeForTheSubscription\n | WorldpayvantivResponseCode::DuplicateDiscountCodesInRequest\n | WorldpayvantivResponseCode::InvalidStartDate\n | WorldpayvantivResponseCode::MerchantNotRegisteredForRecurringEngine\n | WorldpayvantivResponseCode::InsufficientDataToUpdateSubscription\n | WorldpayvantivResponseCode::InvalidBillingDate\n | WorldpayvantivResponseCode::DiscountCodeAlreadyExists\n | WorldpayvantivResponseCode::PlanCodeAlreadyExists\n | WorldpayvantivResponseCode::TheAccountNumberWasChanged\n | WorldpayvantivResponseCode::TheAccountWasClosed\n | WorldpayvantivResponseCode::TheExpirationDateWasChanged\n | WorldpayvantivResponseCode::TheIssuingBankDoesNotParticipateInTheUpdateProgram\n | WorldpayvantivResponseCode::ContactTheCardholderForUpdatedInformation\n | WorldpayvantivResponseCode::TheCardholderHasOptedOutOfTheUpdateProgram\n | WorldpayvantivResponseCode::SoftDeclineCardReaderDecryptionServiceIsNotAvailable\n | WorldpayvantivResponseCode::SoftDeclineDecryptionFailed\n | WorldpayvantivResponseCode::HardDeclineInputDataIsInvalid\n | WorldpayvantivResponseCode::ApplePayKeyMismatch\n | WorldpayvantivResponseCode::ApplePayDecryptionFailed\n | WorldpayvantivResponseCode::HardDeclineDecryptionFailed\n | WorldpayvantivResponseCode::MerchantNotConfiguredForProcessingAtThisSite\n | WorldpayvantivResponseCode::AdvancedFraudFilterScoreBelowThreshold\n | WorldpayvantivResponseCode::SuspectedFraud\n | WorldpayvantivResponseCode::SystemErrorContactWorldpayRepresentative\n | WorldpayvantivResponseCode::AmazonPayAmazonUnavailable\n | WorldpayvantivResponseCode::AmazonPayAmazonDeclined\n | WorldpayvantivResponseCode::AmazonPayInvalidToken\n | WorldpayvantivResponseCode::MerchantNotEnabledForAmazonPay\n | WorldpayvantivResponseCode::TransactionNotSupportedBlockedByIssuer\n | WorldpayvantivResponseCode::BlockedByCardholderContactCardholder\n | WorldpayvantivResponseCode::SoftDeclinePrimaryFundingSourceFailed\n | WorldpayvantivResponseCode::SoftDeclineBuyerHasAlternateFundingSource\n | WorldpayvantivResponseCode::HardDeclineInvalidBillingAgreementId\n | WorldpayvantivResponseCode::HardDeclinePrimaryFundingSourceFailed\n | WorldpayvantivResponseCode::HardDeclineIssueWithPaypalAccount\n | WorldpayvantivResponseCode::HardDeclinePayPalAuthorizationIdMissing\n | WorldpayvantivResponseCode::HardDeclineConfirmedEmailAddressIsNotAvailable\n | WorldpayvantivResponseCode::HardDeclinePayPalBuyerAccountDenied\n | WorldpayvantivResponseCode::HardDeclinePayPalBuyerAccountRestricted\n | WorldpayvantivResponseCode::HardDeclinePayPalOrderHasBeenVoidedExpiredOrCompleted\n | WorldpayvantivResponseCode::HardDeclineIssueWithPayPalRefund\n | WorldpayvantivResponseCode::HardDeclinePayPalCredentialsIssue\n | WorldpayvantivResponseCode::HardDeclinePayPalAuthorizationVoidedOrExpired\n | WorldpayvantivResponseCode::HardDeclineRequiredPayPalParameterMissing\n | WorldpayvantivResponseCode::HardDeclinePayPalTransactionIdOrAuthIdIsInvalid\n | WorldpayvantivResponseCode::HardDeclineExceededMaximumNumberOfPayPalAuthorizationAttempts\n | WorldpayvantivResponseCode::HardDeclineTransactionAmountExceedsMerchantsPayPalAccountLimit\n | WorldpayvantivResponseCode::HardDeclinePayPalFundingSourcesUnavailable\n | WorldpayvantivResponseCode::HardDeclineIssueWithPayPalPrimaryFundingSource\n | WorldpayvantivResponseCode::HardDeclinePayPalProfileDoesNotAllowThisTransactionType\n | WorldpayvantivResponseCode::InternalSystemErrorWithPayPalContactVantiv\n | WorldpayvantivResponseCode::HardDeclineContactPayPalConsumerForAnotherPaymentMethod\n | WorldpayvantivResponseCode::InvalidTerminalId\n | WorldpayvantivResponseCode::PinlessDebitProcessingNotSupportedForNonRecurringTransactions\n | WorldpayvantivResponseCode::PinlessDebitProcessingNotSupportedForPartialAuths\n | WorldpayvantivResponseCode::MerchantNotConfiguredForPinlessDebitProcessing\n | WorldpayvantivResponseCode::DeclineCustomerCancellation\n | WorldpayvantivResponseCode::DeclineReTryTransaction\n | WorldpayvantivResponseCode::DeclineUnableToLocateRecordOnFile\n | WorldpayvantivResponseCode::DeclineFileUpdateFieldEditError\n | WorldpayvantivResponseCode::RemoteFunctionUnknown\n | WorldpayvantivResponseCode::DeclinedExceedsWithdrawalFrequencyLimit\n | WorldpayvantivResponseCode::DeclineCardRecordNotAvailable\n | WorldpayvantivResponseCode::InvalidAuthorizationCode\n | WorldpayvantivResponseCode::ReconciliationError\n | WorldpayvantivResponseCode::PreferredDebitRoutingDenialCreditTransactionCanBeDebit\n | WorldpayvantivResponseCode::DeclinedCurrencyConversionCompleteNoAuthPerformed\n | WorldpayvantivResponseCode::DeclinedMultiCurrencyDccFail\n | WorldpayvantivResponseCode::DeclinedMultiCurrencyInvertFail\n | WorldpayvantivResponseCode::Invalid3DSecurePassword\n | WorldpayvantivResponseCode::InvalidSocialSecurityNumber\n | WorldpayvantivResponseCode::InvalidMothersMaidenName\n | WorldpayvantivResponseCode::EnrollmentInquiryDeclined\n | WorldpayvantivResponseCode::SocialSecurityNumberNotAvailable\n | WorldpayvantivResponseCode::MothersMaidenNameNotAvailable\n | WorldpayvantivResponseCode::PinAlreadyExistsOnDatabase\n | WorldpayvantivResponseCode::Under18YearsOld\n | WorldpayvantivResponseCode::BillToOutsideUsa\n | WorldpayvantivResponseCode::BillToAddressIsNotEqualToShipToAddress\n | WorldpayvantivResponseCode::DeclinedForeignCurrencyMustBeUsd\n | WorldpayvantivResponseCode::OnNegativeFile\n | WorldpayvantivResponseCode::BlockedAgreement\n | WorldpayvantivResponseCode::InsufficientBuyingPower\n | WorldpayvantivResponseCode::InvalidData\n | WorldpayvantivResponseCode::InvalidDataDataElementsMissing\n | WorldpayvantivResponseCode::InvalidDataDataFormatError\n | WorldpayvantivResponseCode::InvalidDataInvalidTCVersion\n | WorldpayvantivResponseCode::DuplicateTransactionPaypalCredit\n | WorldpayvantivResponseCode::VerifyBillingAddress\n | WorldpayvantivResponseCode::InactiveAccount\n | WorldpayvantivResponseCode::InvalidAuth\n | WorldpayvantivResponseCode::AuthorizationAlreadyExistsForTheOrder\n | WorldpayvantivResponseCode::LodgingTransactionsAreNotAllowedForThisMcc\n | WorldpayvantivResponseCode::DurationCannotBeNegative\n | WorldpayvantivResponseCode::HotelFolioNumberCannotBeBlank\n | WorldpayvantivResponseCode::InvalidCheckInDate\n | WorldpayvantivResponseCode::InvalidCheckOutDate\n | WorldpayvantivResponseCode::InvalidCheckInOrCheckOutDate\n | WorldpayvantivResponseCode::CheckOutDateCannotBeBeforeCheckInDate\n | WorldpayvantivResponseCode::NumberOfAdultsCannotBeNegative\n | WorldpayvantivResponseCode::RoomRateCannotBeNegative\n | WorldpayvantivResponseCode::RoomTaxCannotBeNegative\n | WorldpayvantivResponseCode::DurationCanOnlyBeFrom0To99ForVisa\n | WorldpayvantivResponseCode::MerchantIsNotAuthorizedForTokens\n | WorldpayvantivResponseCode::CreditCardNumberWasInvalid\n | WorldpayvantivResponseCode::TokenWasNotFound\n | WorldpayvantivResponseCode::TokenInvalid\n | WorldpayvantivResponseCode::MerchantNotAuthorizedForECheckTokens\n | WorldpayvantivResponseCode::CheckoutIdWasInvalid\n | WorldpayvantivResponseCode::CheckoutIdWasNotFound\n | WorldpayvantivResponseCode::GenericCheckoutIdError\n | WorldpayvantivResponseCode::CaptureAmountCanNotBeMoreThanAuthorizedAmount\n | WorldpayvantivResponseCode::TaxBillingOnlyAllowedForMcc9311\n | WorldpayvantivResponseCode::Mcc9311RequiresTaxTypeElement\n | WorldpayvantivResponseCode::DebtRepaymentOnlyAllowedForViTransactionsOnMccs6012And6051\n | WorldpayvantivResponseCode::RoutingNumberDidNotMatchOneOnFileForToken\n | WorldpayvantivResponseCode::InvalidPayPageRegistrationId\n | WorldpayvantivResponseCode::ExpiredPayPageRegistrationId\n | WorldpayvantivResponseCode::MerchantIsNotAuthorizedForPayPage\n | WorldpayvantivResponseCode::MaximumNumberOfUpdatesForThisTokenExceeded\n | WorldpayvantivResponseCode::TooManyTokensCreatedForExistingNamespace\n | WorldpayvantivResponseCode::PinValidationNotPossible\n | WorldpayvantivResponseCode::GenericTokenRegistrationError\n | WorldpayvantivResponseCode::GenericTokenUseError\n | WorldpayvantivResponseCode::InvalidBankRoutingNumber\n | WorldpayvantivResponseCode::MissingName\n | WorldpayvantivResponseCode::InvalidName\n | WorldpayvantivResponseCode::MissingBillingCountryCode\n | WorldpayvantivResponseCode::InvalidIban\n | WorldpayvantivResponseCode::MissingEmailAddress\n | WorldpayvantivResponseCode::MissingMandateReference\n | WorldpayvantivResponseCode::InvalidMandateReference\n | WorldpayvantivResponseCode::MissingMandateUrl\n | WorldpayvantivResponseCode::InvalidMandateUrl\n | WorldpayvantivResponseCode::MissingMandateSignatureDate\n | WorldpayvantivResponseCode::InvalidMandateSignatureDate\n | WorldpayvantivResponseCode::RecurringMandateAlreadyExists\n | WorldpayvantivResponseCode::RecurringMandateWasNotFound\n | WorldpayvantivResponseCode::FinalRecurringWasAlreadyReceivedUsingThisMandate\n | WorldpayvantivResponseCode::IbanDidNotMatchOneOnFileForMandate\n | WorldpayvantivResponseCode::InvalidBillingCountry\n | WorldpayvantivResponseCode::ExpirationDateRequiredForInteracTransaction\n | WorldpayvantivResponseCode::TransactionTypeIsNotSupportedWithThisMethodOfPayment\n | WorldpayvantivResponseCode::UnreferencedOrphanRefundsAreNotAllowed\n | WorldpayvantivResponseCode::UnableToVoidATransactionWithAHeldState\n | WorldpayvantivResponseCode::ThisFundingInstructionResultsInANegativeAccountBalance\n | WorldpayvantivResponseCode::AccountBalanceInformationUnavailableAtThisTime\n | WorldpayvantivResponseCode::TheSubmittedCardIsNotEligibleForFastAccessFunding\n | WorldpayvantivResponseCode::TransactionCannotUseBothCcdPaymentInformationAndCtxPaymentInformation\n | WorldpayvantivResponseCode::ProcessingError\n | WorldpayvantivResponseCode::ThisFundingInstructionTypeIsInvalidForCanadianMerchants\n | WorldpayvantivResponseCode::CtxAndCcdRecordsAreNotAllowedForCanadianMerchants\n | WorldpayvantivResponseCode::CanadianAccountNumberCannotExceed12Digits\n | WorldpayvantivResponseCode::ThisFundingInstructionTypeIsInvalid\n | WorldpayvantivResponseCode::DeclineNegativeInformationOnFile\n | WorldpayvantivResponseCode::AbsoluteDecline\n | WorldpayvantivResponseCode::TheMerchantProfileDoesNotAllowTheRequestedOperation\n | WorldpayvantivResponseCode::TheAccountCannotAcceptAchTransactions\n | WorldpayvantivResponseCode::TheAccountCannotAcceptAchTransactionsOrSiteDrafts\n | WorldpayvantivResponseCode::AmountGreaterThanLimitSpecifiedInTheMerchantProfile\n | WorldpayvantivResponseCode::MerchantIsNotAuthorizedToPerformECheckVerificationTransactions\n | WorldpayvantivResponseCode::FirstNameAndLastNameRequiredForECheckVerifications\n | WorldpayvantivResponseCode::CompanyNameRequiredForCorporateAccountForECheckVerifications\n | WorldpayvantivResponseCode::PhoneNumberRequiredForECheckVerifications\n | WorldpayvantivResponseCode::CardBrandTokenNotSupported\n | WorldpayvantivResponseCode::PrivateLabelCardNotSupported\n | WorldpayvantivResponseCode::AllowedDailyDirectDebitCaptureECheckSaleLimitExceeded\n | WorldpayvantivResponseCode::AllowedDailyDirectDebitCreditECheckCreditLimitExceeded\n | WorldpayvantivResponseCode::AccountNotEligibleForRtp\n | WorldpayvantivResponseCode::SoftDeclineCustomerAuthenticationRequired\n | WorldpayvantivResponseCode::TransactionNotReversedVoidWorkflowNeedToBeInvoked\n | WorldpayvantivResponseCode::TransactionReversalNotSupportedForTheCoreMerchants\n | WorldpayvantivResponseCode::NoValidParentDepositOrParentRefundFound\n | WorldpayvantivResponseCode::TransactionReversalNotEnabledForVisa\n | WorldpayvantivResponseCode::TransactionReversalNotEnabledForMastercard\n | WorldpayvantivResponseCode::TransactionReversalNotEnabledForAmEx\n | WorldpayvantivResponseCode::TransactionReversalNotEnabledForDiscover\n | WorldpayvantivResponseCode::TransactionReversalNotSupported\n | WorldpayvantivResponseCode::FundingInstructionHeldPleaseContactYourRelationshipManager\n | WorldpayvantivResponseCode::MissingAddressInformation\n | WorldpayvantivResponseCode::CryptographicFailure\n | WorldpayvantivResponseCode::InvalidRegionCode\n | WorldpayvantivResponseCode::InvalidCountryCode\n | WorldpayvantivResponseCode::InvalidCreditAccount\n | WorldpayvantivResponseCode::InvalidCheckingAccount\n | WorldpayvantivResponseCode::InvalidSavingsAccount\n | WorldpayvantivResponseCode::InvalidUseOfMccCorrectAndReattempt\n | WorldpayvantivResponseCode::ExceedsRtpTransactionLimit\n => match flow {\n WorldpayvantivPaymentFlow::Sale\n | WorldpayvantivPaymentFlow::Auth => Ok(common_enums::AttemptStatus::Failure),\n WorldpayvantivPaymentFlow::Capture => Ok(common_enums::AttemptStatus::CaptureFailed),\n WorldpayvantivPaymentFlow::Void => Ok(common_enums::AttemptStatus::VoidFailed)\n }\n _ => {\n Err(errors::ConnectorError::UnexpectedResponseError(\n bytes::Bytes::from(\"Invalid response code \".to_string()),\n ))\n }\n }\n}",
|
| 17 |
+
"diff_span": {
|
| 18 |
+
"before": " | WorldpayvantivResponseCode::PartiallyApproved\n | WorldpayvantivResponseCode::OfflineApproval\n | WorldpayvantivResponseCode::OfflineApprovalUnableToGoOnline => match flow {\n WorldpayvantivPaymentFlow::Sale => Ok(common_enums::AttemptStatus::Charged),\n WorldpayvantivPaymentFlow::Auth => Ok(common_enums::AttemptStatus::Authorized),\n WorldpayvantivPaymentFlow::Capture => Ok(common_enums::AttemptStatus::Charged),\n WorldpayvantivPaymentFlow::Void => Ok(common_enums::AttemptStatus::Voided),\n }\n WorldpayvantivResponseCode::PendingShopperCheckoutCompletion\n | WorldpayvantivResponseCode::TransactionReceived => {\n Ok(common_enums::AttemptStatus::Pending)\n }\n\n WorldpayvantivResponseCode::ShopperCheckoutExpired\n | WorldpayvantivResponseCode::ProcessingNetworkUnavailable\n | WorldpayvantivResponseCode::IssuerUnavailable\n | WorldpayvantivResponseCode::ReSubmitTransaction\n | WorldpayvantivResponseCode::TryAgainLater\n | WorldpayvantivResponseCode::InsufficientFunds\n | WorldpayvantivResponseCode::AuthorizationAmountHasAlreadyBeenDepleted\n | WorldpayvantivResponseCode::InsufficientFundsRetryAfter1Hour\n | WorldpayvantivResponseCode::InsufficientFundsRetryAfter24Hour\n | WorldpayvantivResponseCode::InsufficientFundsRetryAfter2Days\n | WorldpayvantivResponseCode::InsufficientFundsRetryAfter4Days\n | WorldpayvantivResponseCode::InsufficientFundsRetryAfter6Days\n | WorldpayvantivResponseCode::InsufficientFundsRetryAfter8Days\n | WorldpayvantivResponseCode::InsufficientFundsRetryAfter10Days\n | WorldpayvantivResponseCode::CallIssuer\n | WorldpayvantivResponseCode::CallAmex\n | WorldpayvantivResponseCode::CallDinersClub\n | WorldpayvantivResponseCode::CallDiscover\n | WorldpayvantivResponseCode::CallJbs\n | WorldpayvantivResponseCode::CallVisaMastercard\n | WorldpayvantivResponseCode::CallIssuerUpdateCardholderData\n | WorldpayvantivResponseCode::ExceedsApprovalAmountLimit\n | WorldpayvantivResponseCode::CallIndicatedNumber\n | WorldpayvantivResponseCode::UnacceptablePinTransactionDeclinedRetry\n | WorldpayvantivResponseCode::PinNotChanged\n | WorldpayvantivResponseCode::ConsumerMultiUseVirtualCardNumberSoftDecline\n | WorldpayvantivResponseCode::ConsumerNonReloadablePrepaidCardSoftDecline\n | WorldpayvantivResponseCode::ConsumerSingleUseVirtualCardNumberSoftDecline\n | WorldpayvantivResponseCode::UpdateCardholderData\n | WorldpayvantivResponseCode::ConsumerNonReloadablePrepaidCardApproved\n | WorldpayvantivResponseCode::ConsumerSingleUseVirtualCardNumberApproved\n | WorldpayvantivResponseCode::MerchantDoesntQualifyForProductCode\n | WorldpayvantivResponseCode::Lifecycle\n | WorldpayvantivResponseCode::Policy\n | WorldpayvantivResponseCode::FraudSecurity\n | WorldpayvantivResponseCode::InvalidOrExpiredCardContactCardholderToUpdate\n | WorldpayvantivResponseCode::InvalidTransactionOrCardRestrictionVerifyInformationAndResubmit\n | WorldpayvantivResponseCode::AtLeastOneOfOrigIdOrOrigCnpTxnIdIsRequired\n | WorldpayvantivResponseCode::OrigCnpTxnIdIsRequiredWhenShowStatusOnlyIsUsed\n | WorldpayvantivResponseCode::IncrementalAuthNotSupported\n | WorldpayvantivResponseCode::SetAuthIndicatorToIncremental\n | WorldpayvantivResponseCode::IncrementalValueForAuthIndicatorNotAllowedInThisAuthStructure\n | WorldpayvantivResponseCode::CannotRequestAnIncrementalAuthIfOriginalAuthNotSetToEstimated\n | WorldpayvantivResponseCode::TransactionMustReferenceTheEstimatedAuth\n | WorldpayvantivResponseCode::IncrementedAuthExceedsMaxTransactionAmount\n | WorldpayvantivResponseCode::SubmittedMccNotAllowed\n | WorldpayvantivResponseCode::MerchantNotCertifiedEnabledForIias\n | WorldpayvantivResponseCode::IssuerGeneratedError\n | WorldpayvantivResponseCode::PickupCardOtherThanLostStolen\n | WorldpayvantivResponseCode::InvalidAmountHardDecline\n | WorldpayvantivResponseCode::ReversalUnsuccessful\n | WorldpayvantivResponseCode::MissingData\n | WorldpayvantivResponseCode::PickupCardLostCard\n | WorldpayvantivResponseCode::PickupCardStolenCard\n | WorldpayvantivResponseCode::RestrictedCard\n | WorldpayvantivResponseCode::InvalidDeactivate\n | WorldpayvantivResponseCode::CardAlreadyActive\n | WorldpayvantivResponseCode::CardNotActive\n | WorldpayvantivResponseCode::CardAlreadyDeactivate\n | WorldpayvantivResponseCode::OverMaxBalance\n | WorldpayvantivResponseCode::InvalidActivate\n | WorldpayvantivResponseCode::NoTransactionFoundForReversal\n | WorldpayvantivResponseCode::IncorrectCvv\n | WorldpayvantivResponseCode::IllegalTransaction\n | WorldpayvantivResponseCode::DuplicateTransaction\n | WorldpayvantivResponseCode::SystemError\n | WorldpayvantivResponseCode::DeconvertedBin\n | WorldpayvantivResponseCode::MerchantDepleted\n | WorldpayvantivResponseCode::GiftCardEscheated\n | WorldpayvantivResponseCode::InvalidReversalTypeForCreditCardTransaction\n | WorldpayvantivResponseCode::SystemErrorMessageFormatError\n | WorldpayvantivResponseCode::SystemErrorCannotProcess\n | WorldpayvantivResponseCode::RefundRejectedDueToPendingDepositStatus\n | WorldpayvantivResponseCode::RefundRejectedDueToDeclinedDepositStatus\n | WorldpayvantivResponseCode::RefundRejectedByTheProcessingNetwork\n | WorldpayvantivResponseCode::CaptureCreditAndAuthReversalTagsCannotBeUsedForGiftCardTransactions\n | WorldpayvantivResponseCode::InvalidAccountNumber\n | WorldpayvantivResponseCode::AccountNumberDoesNotMatchPaymentType\n | WorldpayvantivResponseCode::PickUpCard\n | WorldpayvantivResponseCode::LostStolenCard\n | WorldpayvantivResponseCode::ExpiredCard\n | WorldpayvantivResponseCode::AuthorizationHasExpiredNoNeedToReverse\n | WorldpayvantivResponseCode::RestrictedCardSoftDecline\n | WorldpayvantivResponseCode::RestrictedCardChargeback\n | WorldpayvantivResponseCode::RestrictedCardPrepaidCardFilteringService\n | WorldpayvantivResponseCode::InvalidTrackData\n | WorldpayvantivResponseCode::DepositIsAlreadyReferencedByAChargeback\n | WorldpayvantivResponseCode::RestrictedCardInternationalCardFilteringService\n | WorldpayvantivResponseCode::InternationalFilteringForIssuingCardCountry\n | WorldpayvantivResponseCode::RestrictedCardAuthFraudVelocityFilteringService\n | WorldpayvantivResponseCode::AutomaticRefundAlreadyIssued\n | WorldpayvantivResponseCode::RestrictedCardAuthFraudAdviceFilteringService\n | WorldpayvantivResponseCode::RestrictedCardFraudAvsFilteringService\n | WorldpayvantivResponseCode::InvalidExpirationDate\n | WorldpayvantivResponseCode::InvalidMerchant\n | WorldpayvantivResponseCode::InvalidTransaction\n | WorldpayvantivResponseCode::NoSuchIssuer\n | WorldpayvantivResponseCode::InvalidPin\n | WorldpayvantivResponseCode::TransactionNotAllowedAtTerminal\n | WorldpayvantivResponseCode::ExceedsNumberOfPinEntries\n | WorldpayvantivResponseCode::CardholderTransactionNotPermitted\n | WorldpayvantivResponseCode::CardholderRequestedThatRecurringOrInstallmentPaymentBeStopped\n | WorldpayvantivResponseCode::InvalidPaymentType\n | WorldpayvantivResponseCode::InvalidPosCapabilityForCardholderAuthorizedTerminalTransaction\n | WorldpayvantivResponseCode::InvalidPosCardholderIdForCardholderAuthorizedTerminalTransaction\n | WorldpayvantivResponseCode::ThisMethodOfPaymentDoesNotSupportAuthorizationReversals\n | WorldpayvantivResponseCode::ReversalAmountDoesNotMatchAuthorizationAmount\n | WorldpayvantivResponseCode::TransactionDidNotConvertToPinless\n | WorldpayvantivResponseCode::InvalidAmountSoftDecline\n | WorldpayvantivResponseCode::InvalidHealthcareAmounts\n | WorldpayvantivResponseCode::InvalidBillingDescriptorPrefix\n | WorldpayvantivResponseCode::InvalidBillingDescriptor\n | WorldpayvantivResponseCode::InvalidReportGroup\n | WorldpayvantivResponseCode::DoNotHonor\n | WorldpayvantivResponseCode::GenericDecline\n | WorldpayvantivResponseCode::DeclineRequestPositiveId\n | WorldpayvantivResponseCode::DeclineCvv2CidFail\n | WorldpayvantivResponseCode::ThreeDSecureTransactionNotSupportedByMerchant\n | WorldpayvantivResponseCode::InvalidPurchaseLevelIiiTheTransactionContainedBadOrMissingData\n | WorldpayvantivResponseCode::MissingHealthcareIiasTagForAnFsaTransaction\n | WorldpayvantivResponseCode::RestrictedByVantivDueToSecurityCodeMismatch\n | WorldpayvantivResponseCode::NoTransactionFoundWithSpecifiedTransactionId\n | WorldpayvantivResponseCode::AuthorizationNoLongerAvailable\n | WorldpayvantivResponseCode::TransactionNotVoidedAlreadySettled\n | WorldpayvantivResponseCode::AutoVoidOnRefund\n | WorldpayvantivResponseCode::InvalidAccountNumberOriginalOrNocUpdatedECheckAccountRequired\n | WorldpayvantivResponseCode::TotalCreditAmountExceedsCaptureAmount\n | WorldpayvantivResponseCode::ExceedTheThresholdForSendingRedeposits\n | WorldpayvantivResponseCode::DepositHasNotBeenReturnedForInsufficientNonSufficientFunds\n | WorldpayvantivResponseCode::InvalidCheckNumber\n | WorldpayvantivResponseCode::RedepositAgainstInvalidTransactionType\n | WorldpayvantivResponseCode::InternalSystemErrorCallVantiv\n | WorldpayvantivResponseCode::OriginalTransactionHasBeenProcessedFutureRedepositsCanceled\n | WorldpayvantivResponseCode::SoftDeclineAutoRecyclingInProgress\n | WorldpayvantivResponseCode::HardDeclineAutoRecyclingComplete\n | WorldpayvantivResponseCode::RestrictedCardCardUnderSanction\n | WorldpayvantivResponseCode::MerchantIsNotEnabledForSurcharging\n | WorldpayvantivResponseCode::ThisMethodOfPaymentDoesNotSupportSurcharging\n | WorldpayvantivResponseCode::SurchargeIsNotValidForDebitOrPrepaidCards\n | WorldpayvantivResponseCode::SurchargeCannotExceedsTheMaximumAllowedLimit\n | WorldpayvantivResponseCode::TransactionDeclinedByTheProcessingNetwork\n | WorldpayvantivResponseCode::SecondaryAmountCannotExceedTheSaleAmount\n | WorldpayvantivResponseCode::ThisMethodOfPaymentDoesNotSupportSecondaryAmount\n | WorldpayvantivResponseCode::SecondaryAmountCannotBeLessThanZero\n | WorldpayvantivResponseCode::PartialTransactionIsNotSupportedWhenIncludingASecondaryAmount\n | WorldpayvantivResponseCode::SecondaryAmountRequiredOnPartialRefundWhenUsedOnDeposit\n | WorldpayvantivResponseCode::SecondaryAmountNotAllowedOnRefundIfNotIncludedOnDeposit\n | WorldpayvantivResponseCode::ProcessingNetworkError\n | WorldpayvantivResponseCode::InvalidEMail\n | WorldpayvantivResponseCode::InvalidCombinationOfAccountFundingTransactionTypeAndMcc\n | WorldpayvantivResponseCode::InvalidAccountFundingTransactionTypeForThisMethodOfPayment\n | WorldpayvantivResponseCode::MissingOneOrMoreReceiverFieldsForAccountFundingTransaction\n | WorldpayvantivResponseCode::InvalidRecurringRequestSeeRecurringResponseForDetails\n | WorldpayvantivResponseCode::ApprovedRecurringSubscriptionCreated\n | WorldpayvantivResponseCode::ParentTransactionDeclinedRecurringSubscriptionNotCreated\n | WorldpayvantivResponseCode::InvalidPlanCode\n | WorldpayvantivResponseCode::ScheduledRecurringPaymentProcessed\n | WorldpayvantivResponseCode::InvalidSubscriptionId\n | WorldpayvantivResponseCode::AddOnCodeAlreadyExists",
|
| 19 |
+
"after": " | WorldpayvantivResponseCode::PartiallyApproved\n | WorldpayvantivResponseCode::OfflineApproval\n | WorldpayvantivResponseCode::OfflineApprovalUnableToGoOnline\n | WorldpayvantivResponseCode::ConsumerNonReloadablePrepaidCardApproved\n | WorldpayvantivResponseCode::ConsumerSingleUseVirtualCardNumberApproved\n | WorldpayvantivResponseCode::ScheduledRecurringPaymentProcessed\n | WorldpayvantivResponseCode::ApprovedRecurringSubscriptionCreated\n => match flow {\n WorldpayvantivPaymentFlow::Sale => Ok(common_enums::AttemptStatus::Charged),\n WorldpayvantivPaymentFlow::Auth => Ok(common_enums::AttemptStatus::Authorized),"
|
| 20 |
+
},
|
| 21 |
+
"commit_sha": "bd1ce277fa8783d5d05558f05e608b0057b6e9b8"
|
| 22 |
+
},
|
| 23 |
+
{
|
| 24 |
+
"id": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs::mod::worldpayvantiv_constants",
|
| 25 |
+
"file": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs",
|
| 26 |
+
"kind": "mod_item",
|
| 27 |
+
"status": "modified",
|
| 28 |
+
"code_changed": true,
|
| 29 |
+
"imports_changed": false,
|
| 30 |
+
"before_code": "pub mod worldpayvantiv_constants {\n pub const WORLDPAYVANTIV_VERSION: &str = \"12.23\";\n pub const XML_VERSION: &str = \"1.0\";\n pub const XML_ENCODING: &str = \"UTF-8\";\n pub const XMLNS: &str = \"http://www.vantivcnp.com/schema\";\n}",
|
| 31 |
+
"after_code": "pub mod worldpayvantiv_constants {\n pub const WORLDPAYVANTIV_VERSION: &str = \"12.23\";\n pub const XML_VERSION: &str = \"1.0\";\n pub const XML_ENCODING: &str = \"UTF-8\";\n pub const XMLNS: &str = \"http://www.vantivcnp.com/schema\";\n pub const MAX_ID_LENGTH: usize = 26;\n}",
|
| 32 |
+
"diff_span": {
|
| 33 |
+
"before": "",
|
| 34 |
+
"after": " pub const XML_ENCODING: &str = \"UTF-8\";\n pub const XMLNS: &str = \"http://www.vantivcnp.com/schema\";\n pub const MAX_ID_LENGTH: usize = 26;\n}"
|
| 35 |
+
},
|
| 36 |
+
"commit_sha": "bd1ce277fa8783d5d05558f05e608b0057b6e9b8"
|
| 37 |
+
},
|
| 38 |
+
{
|
| 39 |
+
"id": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs::function::get_refund_status",
|
| 40 |
+
"file": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs",
|
| 41 |
+
"kind": "function_item",
|
| 42 |
+
"status": "modified",
|
| 43 |
+
"code_changed": true,
|
| 44 |
+
"imports_changed": false,
|
| 45 |
+
"before_code": "fn get_refund_status(\n response: WorldpayvantivResponseCode,\n) -> Result<common_enums::RefundStatus, errors::ConnectorError> {\n match response {\n WorldpayvantivResponseCode::Approved\n | WorldpayvantivResponseCode::PartiallyApproved\n | WorldpayvantivResponseCode::OfflineApproval\n | WorldpayvantivResponseCode::OfflineApprovalUnableToGoOnline => {\n Ok(common_enums::RefundStatus::Success)\n },\n WorldpayvantivResponseCode::TransactionReceived => Ok(common_enums::RefundStatus::Pending),\n WorldpayvantivResponseCode::ProcessingNetworkUnavailable\n | WorldpayvantivResponseCode::IssuerUnavailable\n | WorldpayvantivResponseCode::ReSubmitTransaction\n | WorldpayvantivResponseCode::MerchantNotConfiguredForProcessingAtThisSite\n | WorldpayvantivResponseCode::TryAgainLater\n | WorldpayvantivResponseCode::InsufficientFunds\n | WorldpayvantivResponseCode::AuthorizationAmountHasAlreadyBeenDepleted\n | WorldpayvantivResponseCode::InsufficientFundsRetryAfter1Hour\n | WorldpayvantivResponseCode::InsufficientFundsRetryAfter24Hour\n | WorldpayvantivResponseCode::InsufficientFundsRetryAfter2Days\n | WorldpayvantivResponseCode::InsufficientFundsRetryAfter4Days\n | WorldpayvantivResponseCode::InsufficientFundsRetryAfter6Days\n | WorldpayvantivResponseCode::InsufficientFundsRetryAfter8Days\n | WorldpayvantivResponseCode::InsufficientFundsRetryAfter10Days\n | WorldpayvantivResponseCode::CallIssuer\n | WorldpayvantivResponseCode::CallAmex\n | WorldpayvantivResponseCode::CallDinersClub\n | WorldpayvantivResponseCode::CallDiscover\n | WorldpayvantivResponseCode::CallJbs\n | WorldpayvantivResponseCode::CallVisaMastercard\n | WorldpayvantivResponseCode::ExceedsApprovalAmountLimit\n | WorldpayvantivResponseCode::CallIndicatedNumber\n | WorldpayvantivResponseCode::ConsumerMultiUseVirtualCardNumberSoftDecline\n | WorldpayvantivResponseCode::ConsumerNonReloadablePrepaidCardSoftDecline\n | WorldpayvantivResponseCode::ConsumerSingleUseVirtualCardNumberSoftDecline\n | WorldpayvantivResponseCode::ConsumerNonReloadablePrepaidCardApproved\n | WorldpayvantivResponseCode::ConsumerSingleUseVirtualCardNumberApproved\n | WorldpayvantivResponseCode::MerchantDoesntQualifyForProductCode\n | WorldpayvantivResponseCode::Lifecycle\n | WorldpayvantivResponseCode::Policy\n | WorldpayvantivResponseCode::InvalidOrExpiredCardContactCardholderToUpdate\n | WorldpayvantivResponseCode::InvalidTransactionOrCardRestrictionVerifyInformationAndResubmit\n | WorldpayvantivResponseCode::OriginalTransactionNotFound\n | WorldpayvantivResponseCode::QueryTransactionNotEnabled\n | WorldpayvantivResponseCode::AtLeastOneOfOrigIdOrOrigCnpTxnIdIsRequired\n | WorldpayvantivResponseCode::OrigCnpTxnIdIsRequiredWhenShowStatusOnlyIsUsed\n | WorldpayvantivResponseCode::TransactionMustReferenceTheEstimatedAuth\n | WorldpayvantivResponseCode::IncrementedAuthExceedsMaxTransactionAmount\n | WorldpayvantivResponseCode::SubmittedMccNotAllowed\n | WorldpayvantivResponseCode::TheMerchantIsNotRegisteredInTheUpdateProgram\n | WorldpayvantivResponseCode::MerchantNotCertifiedEnabledForIias\n | WorldpayvantivResponseCode::IssuerGeneratedError\n | WorldpayvantivResponseCode::InvalidAmountHardDecline\n | WorldpayvantivResponseCode::ReversalUnsuccessful\n | WorldpayvantivResponseCode::MissingData\n | WorldpayvantivResponseCode::InvalidDeactivate\n | WorldpayvantivResponseCode::OverMaxBalance\n | WorldpayvantivResponseCode::InvalidActivate\n | WorldpayvantivResponseCode::NoTransactionFoundForReversal\n | WorldpayvantivResponseCode::IllegalTransaction\n | WorldpayvantivResponseCode::DuplicateTransaction\n | WorldpayvantivResponseCode::SystemError\n | WorldpayvantivResponseCode::MerchantDepleted\n | WorldpayvantivResponseCode::InvalidReversalTypeForCreditCardTransaction\n | WorldpayvantivResponseCode::SystemErrorMessageFormatError\n | WorldpayvantivResponseCode::SystemErrorCannotProcess\n | WorldpayvantivResponseCode::RefundRejectedDueToPendingDepositStatus\n | WorldpayvantivResponseCode::RefundRejectedDueToDeclinedDepositStatus\n | WorldpayvantivResponseCode::RefundRejectedByTheProcessingNetwork\n | WorldpayvantivResponseCode::CaptureCreditAndAuthReversalTagsCannotBeUsedForGiftCardTransactions\n | WorldpayvantivResponseCode::InvalidAccountNumber\n | WorldpayvantivResponseCode::AuthorizationHasExpiredNoNeedToReverse\n | WorldpayvantivResponseCode::InvalidTrackData\n | WorldpayvantivResponseCode::DepositIsAlreadyReferencedByAChargeback\n | WorldpayvantivResponseCode::AutomaticRefundAlreadyIssued\n | WorldpayvantivResponseCode::InvalidMerchant\n | WorldpayvantivResponseCode::InvalidTransaction\n | WorldpayvantivResponseCode::TransactionNotAllowedAtTerminal\n | WorldpayvantivResponseCode::ThisMethodOfPaymentDoesNotSupportAuthorizationReversals\n | WorldpayvantivResponseCode::ReversalAmountDoesNotMatchAuthorizationAmount\n | WorldpayvantivResponseCode::InvalidAmountSoftDecline\n | WorldpayvantivResponseCode::InvalidReportGroup\n | WorldpayvantivResponseCode::DoNotHonor\n | WorldpayvantivResponseCode::GenericDecline\n | WorldpayvantivResponseCode::DeclineRequestPositiveId\n | WorldpayvantivResponseCode::ThreeDSecureTransactionNotSupportedByMerchant\n | WorldpayvantivResponseCode::RestrictedByVantivDueToSecurityCodeMismatch\n | WorldpayvantivResponseCode::NoTransactionFoundWithSpecifiedTransactionId\n | WorldpayvantivResponseCode::AuthorizationNoLongerAvailable\n | WorldpayvantivResponseCode::TransactionNotVoidedAlreadySettled\n | WorldpayvantivResponseCode::AutoVoidOnRefund\n | WorldpayvantivResponseCode::InvalidAccountNumberOriginalOrNocUpdatedECheckAccountRequired\n | WorldpayvantivResponseCode::TotalCreditAmountExceedsCaptureAmount\n | WorldpayvantivResponseCode::ExceedTheThresholdForSendingRedeposits\n | WorldpayvantivResponseCode::DepositHasNotBeenReturnedForInsufficientNonSufficientFunds\n | WorldpayvantivResponseCode::RedepositAgainstInvalidTransactionType\n | WorldpayvantivResponseCode::InternalSystemErrorCallVantiv\n | WorldpayvantivResponseCode::OriginalTransactionHasBeenProcessedFutureRedepositsCanceled\n | WorldpayvantivResponseCode::SoftDeclineAutoRecyclingInProgress\n | WorldpayvantivResponseCode::HardDeclineAutoRecyclingComplete\n | WorldpayvantivResponseCode::TransactionDeclinedByTheProcessingNetwork\n | WorldpayvantivResponseCode::SecondaryAmountCannotExceedTheSaleAmount\n | WorldpayvantivResponseCode::ThisMethodOfPaymentDoesNotSupportSecondaryAmount\n | WorldpayvantivResponseCode::SecondaryAmountCannotBeLessThanZero\n | WorldpayvantivResponseCode::PartialTransactionIsNotSupportedWhenIncludingASecondaryAmount\n | WorldpayvantivResponseCode::SecondaryAmountRequiredOnPartialRefundWhenUsedOnDeposit\n | WorldpayvantivResponseCode::SecondaryAmountNotAllowedOnRefundIfNotIncludedOnDeposit\n | WorldpayvantivResponseCode::ProcessingNetworkError\n | WorldpayvantivResponseCode::InvalidEMail\n | WorldpayvantivResponseCode::InvalidCombinationOfAccountFundingTransactionTypeAndMcc\n | WorldpayvantivResponseCode::InvalidAccountFundingTransactionTypeForThisMethodOfPayment\n | WorldpayvantivResponseCode::MissingOneOrMoreReceiverFieldsForAccountFundingTransaction\n | WorldpayvantivResponseCode::SoftDeclineDecryptionFailed\n | WorldpayvantivResponseCode::HardDeclineInputDataIsInvalid\n | WorldpayvantivResponseCode::HardDeclineDecryptionFailed\n | WorldpayvantivResponseCode::SuspectedFraud\n | WorldpayvantivResponseCode::SystemErrorContactWorldpayRepresentative\n | WorldpayvantivResponseCode::InvalidTerminalId\n | WorldpayvantivResponseCode::DeclineReTryTransaction\n | WorldpayvantivResponseCode::RemoteFunctionUnknown\n | WorldpayvantivResponseCode::InvalidData\n | WorldpayvantivResponseCode::InvalidDataDataElementsMissing\n | WorldpayvantivResponseCode::InvalidDataDataFormatError\n | WorldpayvantivResponseCode::VerifyBillingAddress\n | WorldpayvantivResponseCode::InactiveAccount\n | WorldpayvantivResponseCode::InvalidAuth\n | WorldpayvantivResponseCode::CheckoutIdWasInvalid\n | WorldpayvantivResponseCode::CheckoutIdWasNotFound\n | WorldpayvantivResponseCode::TransactionTypeIsNotSupportedWithThisMethodOfPayment\n | WorldpayvantivResponseCode::UnreferencedOrphanRefundsAreNotAllowed\n | WorldpayvantivResponseCode::ThisFundingInstructionResultsInANegativeAccountBalance\n | WorldpayvantivResponseCode::ProcessingError\n | WorldpayvantivResponseCode::ThisFundingInstructionTypeIsInvalidForCanadianMerchants\n | WorldpayvantivResponseCode::ThisFundingInstructionTypeIsInvalid\n | WorldpayvantivResponseCode::AbsoluteDecline\n | WorldpayvantivResponseCode::TheMerchantProfileDoesNotAllowTheRequestedOperation\n | WorldpayvantivResponseCode::AmountGreaterThanLimitSpecifiedInTheMerchantProfile\n | WorldpayvantivResponseCode::AccountNotEligibleForRtp\n | WorldpayvantivResponseCode::NoValidParentDepositOrParentRefundFound\n | WorldpayvantivResponseCode::FundingInstructionHeldPleaseContactYourRelationshipManager\n | WorldpayvantivResponseCode::InvalidCreditAccount => Ok(common_enums::RefundStatus::Failure),\n _ => {\n Err(errors::ConnectorError::UnexpectedResponseError(\n bytes::Bytes::from(\"Invalid response code for refund\".to_string()),\n ))\n }\n }\n}",
|
| 46 |
+
"after_code": "fn get_refund_status(\n response: WorldpayvantivResponseCode,\n) -> Result<common_enums::RefundStatus, errors::ConnectorError> {\n match response {\n WorldpayvantivResponseCode::Approved\n | WorldpayvantivResponseCode::PartiallyApproved\n | WorldpayvantivResponseCode::OfflineApproval\n | WorldpayvantivResponseCode::OfflineApprovalUnableToGoOnline => {\n Ok(common_enums::RefundStatus::Success)\n },\n WorldpayvantivResponseCode::TransactionReceived => Ok(common_enums::RefundStatus::Pending),\n WorldpayvantivResponseCode::ProcessingNetworkUnavailable\n | WorldpayvantivResponseCode::IssuerUnavailable\n | WorldpayvantivResponseCode::ReSubmitTransaction\n | WorldpayvantivResponseCode::MerchantNotConfiguredForProcessingAtThisSite\n | WorldpayvantivResponseCode::TryAgainLater\n | WorldpayvantivResponseCode::InsufficientFunds\n | WorldpayvantivResponseCode::AuthorizationAmountHasAlreadyBeenDepleted\n | WorldpayvantivResponseCode::InsufficientFundsRetryAfter1Hour\n | WorldpayvantivResponseCode::InsufficientFundsRetryAfter24Hour\n | WorldpayvantivResponseCode::InsufficientFundsRetryAfter2Days\n | WorldpayvantivResponseCode::InsufficientFundsRetryAfter4Days\n | WorldpayvantivResponseCode::InsufficientFundsRetryAfter6Days\n | WorldpayvantivResponseCode::InsufficientFundsRetryAfter8Days\n | WorldpayvantivResponseCode::InsufficientFundsRetryAfter10Days\n | WorldpayvantivResponseCode::CallIssuer\n | WorldpayvantivResponseCode::CallAmex\n | WorldpayvantivResponseCode::CallDinersClub\n | WorldpayvantivResponseCode::CallDiscover\n | WorldpayvantivResponseCode::CallJbs\n | WorldpayvantivResponseCode::CallVisaMastercard\n | WorldpayvantivResponseCode::ExceedsApprovalAmountLimit\n | WorldpayvantivResponseCode::CallIndicatedNumber\n | WorldpayvantivResponseCode::ConsumerMultiUseVirtualCardNumberSoftDecline\n | WorldpayvantivResponseCode::ConsumerNonReloadablePrepaidCardSoftDecline\n | WorldpayvantivResponseCode::ConsumerSingleUseVirtualCardNumberSoftDecline\n | WorldpayvantivResponseCode::MerchantDoesntQualifyForProductCode\n | WorldpayvantivResponseCode::Lifecycle\n | WorldpayvantivResponseCode::Policy\n | WorldpayvantivResponseCode::InvalidOrExpiredCardContactCardholderToUpdate\n | WorldpayvantivResponseCode::InvalidTransactionOrCardRestrictionVerifyInformationAndResubmit\n | WorldpayvantivResponseCode::OriginalTransactionNotFound\n | WorldpayvantivResponseCode::QueryTransactionNotEnabled\n | WorldpayvantivResponseCode::AtLeastOneOfOrigIdOrOrigCnpTxnIdIsRequired\n | WorldpayvantivResponseCode::OrigCnpTxnIdIsRequiredWhenShowStatusOnlyIsUsed\n | WorldpayvantivResponseCode::TransactionMustReferenceTheEstimatedAuth\n | WorldpayvantivResponseCode::IncrementedAuthExceedsMaxTransactionAmount\n | WorldpayvantivResponseCode::SubmittedMccNotAllowed\n | WorldpayvantivResponseCode::TheMerchantIsNotRegisteredInTheUpdateProgram\n | WorldpayvantivResponseCode::MerchantNotCertifiedEnabledForIias\n | WorldpayvantivResponseCode::IssuerGeneratedError\n | WorldpayvantivResponseCode::InvalidAmountHardDecline\n | WorldpayvantivResponseCode::ReversalUnsuccessful\n | WorldpayvantivResponseCode::MissingData\n | WorldpayvantivResponseCode::InvalidDeactivate\n | WorldpayvantivResponseCode::OverMaxBalance\n | WorldpayvantivResponseCode::InvalidActivate\n | WorldpayvantivResponseCode::NoTransactionFoundForReversal\n | WorldpayvantivResponseCode::IllegalTransaction\n | WorldpayvantivResponseCode::DuplicateTransaction\n | WorldpayvantivResponseCode::SystemError\n | WorldpayvantivResponseCode::MerchantDepleted\n | WorldpayvantivResponseCode::InvalidReversalTypeForCreditCardTransaction\n | WorldpayvantivResponseCode::SystemErrorMessageFormatError\n | WorldpayvantivResponseCode::SystemErrorCannotProcess\n | WorldpayvantivResponseCode::RefundRejectedDueToPendingDepositStatus\n | WorldpayvantivResponseCode::RefundRejectedDueToDeclinedDepositStatus\n | WorldpayvantivResponseCode::RefundRejectedByTheProcessingNetwork\n | WorldpayvantivResponseCode::CaptureCreditAndAuthReversalTagsCannotBeUsedForGiftCardTransactions\n | WorldpayvantivResponseCode::InvalidAccountNumber\n | WorldpayvantivResponseCode::AuthorizationHasExpiredNoNeedToReverse\n | WorldpayvantivResponseCode::InvalidTrackData\n | WorldpayvantivResponseCode::DepositIsAlreadyReferencedByAChargeback\n | WorldpayvantivResponseCode::AutomaticRefundAlreadyIssued\n | WorldpayvantivResponseCode::InvalidMerchant\n | WorldpayvantivResponseCode::InvalidTransaction\n | WorldpayvantivResponseCode::TransactionNotAllowedAtTerminal\n | WorldpayvantivResponseCode::ThisMethodOfPaymentDoesNotSupportAuthorizationReversals\n | WorldpayvantivResponseCode::ReversalAmountDoesNotMatchAuthorizationAmount\n | WorldpayvantivResponseCode::InvalidAmountSoftDecline\n | WorldpayvantivResponseCode::InvalidReportGroup\n | WorldpayvantivResponseCode::DoNotHonor\n | WorldpayvantivResponseCode::GenericDecline\n | WorldpayvantivResponseCode::DeclineRequestPositiveId\n | WorldpayvantivResponseCode::ThreeDSecureTransactionNotSupportedByMerchant\n | WorldpayvantivResponseCode::RestrictedByVantivDueToSecurityCodeMismatch\n | WorldpayvantivResponseCode::NoTransactionFoundWithSpecifiedTransactionId\n | WorldpayvantivResponseCode::AuthorizationNoLongerAvailable\n | WorldpayvantivResponseCode::TransactionNotVoidedAlreadySettled\n | WorldpayvantivResponseCode::AutoVoidOnRefund\n | WorldpayvantivResponseCode::InvalidAccountNumberOriginalOrNocUpdatedECheckAccountRequired\n | WorldpayvantivResponseCode::TotalCreditAmountExceedsCaptureAmount\n | WorldpayvantivResponseCode::ExceedTheThresholdForSendingRedeposits\n | WorldpayvantivResponseCode::DepositHasNotBeenReturnedForInsufficientNonSufficientFunds\n | WorldpayvantivResponseCode::RedepositAgainstInvalidTransactionType\n | WorldpayvantivResponseCode::InternalSystemErrorCallVantiv\n | WorldpayvantivResponseCode::OriginalTransactionHasBeenProcessedFutureRedepositsCanceled\n | WorldpayvantivResponseCode::SoftDeclineAutoRecyclingInProgress\n | WorldpayvantivResponseCode::HardDeclineAutoRecyclingComplete\n | WorldpayvantivResponseCode::TransactionDeclinedByTheProcessingNetwork\n | WorldpayvantivResponseCode::SecondaryAmountCannotExceedTheSaleAmount\n | WorldpayvantivResponseCode::ThisMethodOfPaymentDoesNotSupportSecondaryAmount\n | WorldpayvantivResponseCode::SecondaryAmountCannotBeLessThanZero\n | WorldpayvantivResponseCode::PartialTransactionIsNotSupportedWhenIncludingASecondaryAmount\n | WorldpayvantivResponseCode::SecondaryAmountRequiredOnPartialRefundWhenUsedOnDeposit\n | WorldpayvantivResponseCode::SecondaryAmountNotAllowedOnRefundIfNotIncludedOnDeposit\n | WorldpayvantivResponseCode::ProcessingNetworkError\n | WorldpayvantivResponseCode::InvalidEMail\n | WorldpayvantivResponseCode::InvalidCombinationOfAccountFundingTransactionTypeAndMcc\n | WorldpayvantivResponseCode::InvalidAccountFundingTransactionTypeForThisMethodOfPayment\n | WorldpayvantivResponseCode::MissingOneOrMoreReceiverFieldsForAccountFundingTransaction\n | WorldpayvantivResponseCode::SoftDeclineDecryptionFailed\n | WorldpayvantivResponseCode::HardDeclineInputDataIsInvalid\n | WorldpayvantivResponseCode::HardDeclineDecryptionFailed\n | WorldpayvantivResponseCode::SuspectedFraud\n | WorldpayvantivResponseCode::SystemErrorContactWorldpayRepresentative\n | WorldpayvantivResponseCode::InvalidTerminalId\n | WorldpayvantivResponseCode::DeclineReTryTransaction\n | WorldpayvantivResponseCode::RemoteFunctionUnknown\n | WorldpayvantivResponseCode::InvalidData\n | WorldpayvantivResponseCode::InvalidDataDataElementsMissing\n | WorldpayvantivResponseCode::InvalidDataDataFormatError\n | WorldpayvantivResponseCode::VerifyBillingAddress\n | WorldpayvantivResponseCode::InactiveAccount\n | WorldpayvantivResponseCode::InvalidAuth\n | WorldpayvantivResponseCode::CheckoutIdWasInvalid\n | WorldpayvantivResponseCode::CheckoutIdWasNotFound\n | WorldpayvantivResponseCode::TransactionTypeIsNotSupportedWithThisMethodOfPayment\n | WorldpayvantivResponseCode::UnreferencedOrphanRefundsAreNotAllowed\n | WorldpayvantivResponseCode::ThisFundingInstructionResultsInANegativeAccountBalance\n | WorldpayvantivResponseCode::ProcessingError\n | WorldpayvantivResponseCode::ThisFundingInstructionTypeIsInvalidForCanadianMerchants\n | WorldpayvantivResponseCode::ThisFundingInstructionTypeIsInvalid\n | WorldpayvantivResponseCode::AbsoluteDecline\n | WorldpayvantivResponseCode::TheMerchantProfileDoesNotAllowTheRequestedOperation\n | WorldpayvantivResponseCode::AmountGreaterThanLimitSpecifiedInTheMerchantProfile\n | WorldpayvantivResponseCode::AccountNotEligibleForRtp\n | WorldpayvantivResponseCode::NoValidParentDepositOrParentRefundFound\n | WorldpayvantivResponseCode::FundingInstructionHeldPleaseContactYourRelationshipManager\n | WorldpayvantivResponseCode::InvalidCreditAccount => Ok(common_enums::RefundStatus::Failure),\n _ => {\n Err(errors::ConnectorError::UnexpectedResponseError(\n bytes::Bytes::from(\"Invalid response code for refund\".to_string()),\n ))\n }\n }\n}",
|
| 47 |
+
"diff_span": {
|
| 48 |
+
"before": " | WorldpayvantivResponseCode::ConsumerNonReloadablePrepaidCardSoftDecline\n | WorldpayvantivResponseCode::ConsumerSingleUseVirtualCardNumberSoftDecline\n | WorldpayvantivResponseCode::ConsumerNonReloadablePrepaidCardApproved\n | WorldpayvantivResponseCode::ConsumerSingleUseVirtualCardNumberApproved\n | WorldpayvantivResponseCode::MerchantDoesntQualifyForProductCode\n | WorldpayvantivResponseCode::Lifecycle",
|
| 49 |
+
"after": ""
|
| 50 |
+
},
|
| 51 |
+
"commit_sha": "bd1ce277fa8783d5d05558f05e608b0057b6e9b8"
|
| 52 |
+
},
|
| 53 |
+
{
|
| 54 |
+
"id": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs::worldpayvantiv_constants::const::MAX_ID_LENGTH",
|
| 55 |
+
"file": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs",
|
| 56 |
+
"kind": "const_item",
|
| 57 |
+
"status": "added",
|
| 58 |
+
"before_code": null,
|
| 59 |
+
"after_code": "pub const MAX_ID_LENGTH: usize = 26;",
|
| 60 |
+
"diff_span": null,
|
| 61 |
+
"commit_sha": "bd1ce277fa8783d5d05558f05e608b0057b6e9b8"
|
| 62 |
+
}
|
| 63 |
+
]
|
| 64 |
+
}
|
diffs/pr_8219/bdae9fc/diff.json
ADDED
|
@@ -0,0 +1,58 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "bdae9fccb4e092c1177aa4a47744957589326ffe",
|
| 3 |
+
"pr_number": 8219,
|
| 4 |
+
"rust_files": [
|
| 5 |
+
"crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs"
|
| 6 |
+
],
|
| 7 |
+
"diffs": [
|
| 8 |
+
{
|
| 9 |
+
"id": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs::CnpOnlineRequest::function::try_from",
|
| 10 |
+
"file": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs",
|
| 11 |
+
"kind": "function_item",
|
| 12 |
+
"status": "modified",
|
| 13 |
+
"code_changed": true,
|
| 14 |
+
"imports_changed": true,
|
| 15 |
+
"before_code": "fn try_from(item: &PaymentsCancelRouterData) -> Result<Self, Self::Error> {\n let report_group_metadata: WorldpayvantivMetadataObject =\n connector_utils::to_connector_meta(item.request.connector_meta.clone())?;\n let api_call_id = format!(\"void_{:?}\", connector_utils::generate_12_digit_number());\n let void = Some(Void {\n id: api_call_id,\n report_group: report_group_metadata.report_group.clone(),\n cnp_txn_id: item.request.connector_transaction_id.clone(),\n });\n\n let worldpayvantiv_auth_type = WorldpayvantivAuthType::try_from(&item.connector_auth_type)?;\n let authentication = Authentication {\n user: worldpayvantiv_auth_type.user,\n password: worldpayvantiv_auth_type.password,\n };\n\n Ok(Self {\n version: worldpayvantiv_constants::WORLDPAYVANTIV_VERSION.to_string(),\n xmlns: worldpayvantiv_constants::XMLNS.to_string(),\n merchant_id: worldpayvantiv_auth_type.merchant_id,\n authentication,\n authorization: None,\n sale: None,\n capture: None,\n void,\n credit: None,\n query_transaction: None,\n })\n }",
|
| 16 |
+
"after_code": "fn try_from(item: &PaymentsCancelRouterData) -> Result<Self, Self::Error> {\n let report_group_metadata: WorldpayvantivPaymentMetadata =\n connector_utils::to_connector_meta(item.request.connector_meta.clone())?;\n let report_group = report_group_metadata.report_group.clone()\n .ok_or( errors::ConnectorError::RequestEncodingFailedWithReason(\n \"Failed to obtain report_group from metadata\".to_string(),\n ))?;\n let api_call_id = format!(\"void_{:?}\", connector_utils::generate_12_digit_number());\n let void = Some(Void {\n id: api_call_id,\n report_group,\n cnp_txn_id: item.request.connector_transaction_id.clone(),\n });\n\n let worldpayvantiv_auth_type = WorldpayvantivAuthType::try_from(&item.connector_auth_type)?;\n let authentication = Authentication {\n user: worldpayvantiv_auth_type.user,\n password: worldpayvantiv_auth_type.password,\n };\n\n Ok(Self {\n version: worldpayvantiv_constants::WORLDPAYVANTIV_VERSION.to_string(),\n xmlns: worldpayvantiv_constants::XMLNS.to_string(),\n merchant_id: worldpayvantiv_auth_type.merchant_id,\n authentication,\n authorization: None,\n sale: None,\n capture: None,\n void,\n credit: None,\n query_transaction: None,\n })\n }",
|
| 17 |
+
"diff_span": {
|
| 18 |
+
"before": "fn try_from(item: &PaymentsCancelRouterData) -> Result<Self, Self::Error> {\n let report_group_metadata: WorldpayvantivMetadataObject =\n connector_utils::to_connector_meta(item.request.connector_meta.clone())?;\n let api_call_id = format!(\"void_{:?}\", connector_utils::generate_12_digit_number());\n let void = Some(Void {\n id: api_call_id,\n report_group: report_group_metadata.report_group.clone(),\n cnp_txn_id: item.request.connector_transaction_id.clone(),\n });",
|
| 19 |
+
"after": "fn try_from(item: &PaymentsCancelRouterData) -> Result<Self, Self::Error> {\n let report_group_metadata: WorldpayvantivPaymentMetadata =\n connector_utils::to_connector_meta(item.request.connector_meta.clone())?;\n let report_group = report_group_metadata.report_group.clone()\n .ok_or( errors::ConnectorError::RequestEncodingFailedWithReason(\n \"Failed to obtain report_group from metadata\".to_string(),\n ))?;\n let api_call_id = format!(\"void_{:?}\", connector_utils::generate_12_digit_number());\n let void = Some(Void {\n id: api_call_id,\n report_group,\n cnp_txn_id: item.request.connector_transaction_id.clone(),\n });"
|
| 20 |
+
},
|
| 21 |
+
"commit_sha": "bdae9fccb4e092c1177aa4a47744957589326ffe",
|
| 22 |
+
"before_imports": [
|
| 23 |
+
"use hyperswitch_domain_models::{\n payment_method_data::PaymentMethodData,\n router_data::{ConnectorAuthType, ErrorResponse, RouterData},\n router_flow_types::refunds::{Execute, RSync},\n router_request_types::{\n PaymentsAuthorizeData, PaymentsCancelData, PaymentsCaptureData, PaymentsSyncData,\n ResponseId,\n },\n router_response_types::{PaymentsResponseData, RefundsResponseData},\n types::{\n PaymentsAuthorizeRouterData, PaymentsCancelRouterData, PaymentsCaptureRouterData,\n PaymentsSyncRouterData, RefundSyncRouterData, RefundsRouterData,\n },\n};",
|
| 24 |
+
"use crate::{\n types::{RefundsResponseRouterData, ResponseRouterData},\n utils::{self as connector_utils, CardData, PaymentsAuthorizeRequestData, RefundsRequestData},\n};"
|
| 25 |
+
],
|
| 26 |
+
"after_imports": [
|
| 27 |
+
"use hyperswitch_interfaces::errors;",
|
| 28 |
+
"use hyperswitch_domain_models::{\n payment_method_data::PaymentMethodData,\n router_data::{ConnectorAuthType, ErrorResponse, RouterData},\n router_flow_types::refunds::{Execute, RSync},\n router_request_types::{\n PaymentsAuthorizeData, PaymentsCancelData, PaymentsCaptureData, PaymentsSyncData,\n ResponseId,\n },\n router_response_types::{PaymentsResponseData, RefundsResponseData},\n types::{\n PaymentsAuthorizeRouterData, PaymentsCancelRouterData, PaymentsCaptureRouterData,\n PaymentsSyncRouterData, RefundSyncRouterData, RefundsRouterData,\n },\n};",
|
| 29 |
+
"use crate::{\n types::{RefundsResponseRouterData, ResponseRouterData},\n utils::{self as connector_utils, CardData, PaymentsAuthorizeRequestData, RefundsRequestData},\n};"
|
| 30 |
+
]
|
| 31 |
+
},
|
| 32 |
+
{
|
| 33 |
+
"id": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs::impl::CnpOnlineRequest",
|
| 34 |
+
"file": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs",
|
| 35 |
+
"kind": "impl_item",
|
| 36 |
+
"status": "modified",
|
| 37 |
+
"code_changed": true,
|
| 38 |
+
"imports_changed": false,
|
| 39 |
+
"before_code": "impl TryFrom<&PaymentsCancelRouterData> for CnpOnlineRequest {\n type Error = error_stack::Report<errors::ConnectorError>;\n fn try_from(item: &PaymentsCancelRouterData) -> Result<Self, Self::Error> {\n let report_group_metadata: WorldpayvantivMetadataObject =\n connector_utils::to_connector_meta(item.request.connector_meta.clone())?;\n let api_call_id = format!(\"void_{:?}\", connector_utils::generate_12_digit_number());\n let void = Some(Void {\n id: api_call_id,\n report_group: report_group_metadata.report_group.clone(),\n cnp_txn_id: item.request.connector_transaction_id.clone(),\n });\n\n let worldpayvantiv_auth_type = WorldpayvantivAuthType::try_from(&item.connector_auth_type)?;\n let authentication = Authentication {\n user: worldpayvantiv_auth_type.user,\n password: worldpayvantiv_auth_type.password,\n };\n\n Ok(Self {\n version: worldpayvantiv_constants::WORLDPAYVANTIV_VERSION.to_string(),\n xmlns: worldpayvantiv_constants::XMLNS.to_string(),\n merchant_id: worldpayvantiv_auth_type.merchant_id,\n authentication,\n authorization: None,\n sale: None,\n capture: None,\n void,\n credit: None,\n query_transaction: None,\n })\n }\n}",
|
| 40 |
+
"after_code": "impl TryFrom<&PaymentsCancelRouterData> for CnpOnlineRequest {\n type Error = error_stack::Report<errors::ConnectorError>;\n fn try_from(item: &PaymentsCancelRouterData) -> Result<Self, Self::Error> {\n let report_group_metadata: WorldpayvantivPaymentMetadata =\n connector_utils::to_connector_meta(item.request.connector_meta.clone())?;\n let report_group = report_group_metadata.report_group.clone()\n .ok_or( errors::ConnectorError::RequestEncodingFailedWithReason(\n \"Failed to obtain report_group from metadata\".to_string(),\n ))?;\n let api_call_id = format!(\"void_{:?}\", connector_utils::generate_12_digit_number());\n let void = Some(Void {\n id: api_call_id,\n report_group,\n cnp_txn_id: item.request.connector_transaction_id.clone(),\n });\n\n let worldpayvantiv_auth_type = WorldpayvantivAuthType::try_from(&item.connector_auth_type)?;\n let authentication = Authentication {\n user: worldpayvantiv_auth_type.user,\n password: worldpayvantiv_auth_type.password,\n };\n\n Ok(Self {\n version: worldpayvantiv_constants::WORLDPAYVANTIV_VERSION.to_string(),\n xmlns: worldpayvantiv_constants::XMLNS.to_string(),\n merchant_id: worldpayvantiv_auth_type.merchant_id,\n authentication,\n authorization: None,\n sale: None,\n capture: None,\n void,\n credit: None,\n query_transaction: None,\n })\n }\n}",
|
| 41 |
+
"diff_span": {
|
| 42 |
+
"before": " type Error = error_stack::Report<errors::ConnectorError>;\n fn try_from(item: &PaymentsCancelRouterData) -> Result<Self, Self::Error> {\n let report_group_metadata: WorldpayvantivMetadataObject =\n connector_utils::to_connector_meta(item.request.connector_meta.clone())?;\n let api_call_id = format!(\"void_{:?}\", connector_utils::generate_12_digit_number());\n let void = Some(Void {\n id: api_call_id,\n report_group: report_group_metadata.report_group.clone(),\n cnp_txn_id: item.request.connector_transaction_id.clone(),\n });",
|
| 43 |
+
"after": " type Error = error_stack::Report<errors::ConnectorError>;\n fn try_from(item: &PaymentsCancelRouterData) -> Result<Self, Self::Error> {\n let report_group_metadata: WorldpayvantivPaymentMetadata =\n connector_utils::to_connector_meta(item.request.connector_meta.clone())?;\n let report_group = report_group_metadata.report_group.clone()\n .ok_or( errors::ConnectorError::RequestEncodingFailedWithReason(\n \"Failed to obtain report_group from metadata\".to_string(),\n ))?;\n let api_call_id = format!(\"void_{:?}\", connector_utils::generate_12_digit_number());\n let void = Some(Void {\n id: api_call_id,\n report_group,\n cnp_txn_id: item.request.connector_transaction_id.clone(),\n });"
|
| 44 |
+
},
|
| 45 |
+
"commit_sha": "bdae9fccb4e092c1177aa4a47744957589326ffe"
|
| 46 |
+
},
|
| 47 |
+
{
|
| 48 |
+
"id": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs::struct::WorldpayvantivPaymentMetadata",
|
| 49 |
+
"file": "crates/hyperswitch_connectors/src/connectors/worldpayvantiv/transformers.rs",
|
| 50 |
+
"kind": "struct_item",
|
| 51 |
+
"status": "added",
|
| 52 |
+
"before_code": null,
|
| 53 |
+
"after_code": "pub struct WorldpayvantivPaymentMetadata {\n pub report_group: Option<String>, \n}",
|
| 54 |
+
"diff_span": null,
|
| 55 |
+
"commit_sha": "bdae9fccb4e092c1177aa4a47744957589326ffe"
|
| 56 |
+
}
|
| 57 |
+
]
|
| 58 |
+
}
|
diffs/pr_8219/d277913/diff.json
ADDED
|
@@ -0,0 +1,59 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "d2779135ea38944f01950c64f02addd18ae08dc3",
|
| 3 |
+
"pr_number": 8219,
|
| 4 |
+
"rust_files": [
|
| 5 |
+
"crates/connector_configs/src/connector.rs",
|
| 6 |
+
"crates/router/tests/connectors/worldpayvantiv.rs"
|
| 7 |
+
],
|
| 8 |
+
"diffs": [
|
| 9 |
+
{
|
| 10 |
+
"id": "crates/connector_configs/src/connector.rs::impl::ConnectorConfig",
|
| 11 |
+
"file": "crates/connector_configs/src/connector.rs",
|
| 12 |
+
"kind": "impl_item",
|
| 13 |
+
"status": "modified",
|
| 14 |
+
"code_changed": true,
|
| 15 |
+
"imports_changed": false,
|
| 16 |
+
"before_code": "impl ConnectorConfig {\n fn new() -> Result<Self, String> {\n let config_str = if cfg!(feature = \"production\") {\n include_str!(\"../toml/production.toml\")\n } else if cfg!(feature = \"sandbox\") {\n include_str!(\"../toml/sandbox.toml\")\n } else {\n include_str!(\"../toml/development.toml\")\n };\n let config = toml::from_str::<Self>(config_str);\n match config {\n Ok(data) => Ok(data),\n Err(err) => Err(err.to_string()),\n }\n }\n\n #[cfg(feature = \"payouts\")]\n pub fn get_payout_connector_config(\n connector: PayoutConnectors,\n ) -> Result<Option<ConnectorTomlConfig>, String> {\n let connector_data = Self::new()?;\n match connector {\n PayoutConnectors::Adyen => Ok(connector_data.adyen_payout),\n PayoutConnectors::Adyenplatform => Ok(connector_data.adyenplatform_payout),\n PayoutConnectors::Cybersource => Ok(connector_data.cybersource_payout),\n PayoutConnectors::Ebanx => Ok(connector_data.ebanx_payout),\n PayoutConnectors::Nomupay => Ok(connector_data.nomupay_payout),\n PayoutConnectors::Payone => Ok(connector_data.payone_payout),\n PayoutConnectors::Paypal => Ok(connector_data.paypal_payout),\n PayoutConnectors::Stripe => Ok(connector_data.stripe_payout),\n PayoutConnectors::Wise => Ok(connector_data.wise_payout),\n }\n }\n\n pub fn get_authentication_connector_config(\n connector: AuthenticationConnectors,\n ) -> Result<Option<ConnectorTomlConfig>, String> {\n let connector_data = Self::new()?;\n match connector {\n AuthenticationConnectors::Threedsecureio => Ok(connector_data.threedsecureio),\n AuthenticationConnectors::Netcetera => Ok(connector_data.netcetera),\n AuthenticationConnectors::Gpayments => Ok(connector_data.gpayments),\n AuthenticationConnectors::CtpMastercard => Ok(connector_data.ctp_mastercard),\n AuthenticationConnectors::CtpVisa => Ok(connector_data.ctp_visa),\n AuthenticationConnectors::UnifiedAuthenticationService => {\n Ok(connector_data.unified_authentication_service)\n }\n AuthenticationConnectors::Juspaythreedsserver => Ok(connector_data.juspaythreedsserver),\n }\n }\n\n pub fn get_tax_processor_config(\n connector: TaxConnectors,\n ) -> Result<Option<ConnectorTomlConfig>, String> {\n let connector_data = Self::new()?;\n match connector {\n TaxConnectors::Taxjar => Ok(connector_data.taxjar),\n }\n }\n\n pub fn get_pm_authentication_processor_config(\n connector: PmAuthConnectors,\n ) -> Result<Option<ConnectorTomlConfig>, String> {\n let connector_data = Self::new()?;\n match connector {\n PmAuthConnectors::Plaid => Ok(connector_data.plaid),\n }\n }\n\n pub fn get_connector_config(\n connector: Connector,\n ) -> Result<Option<ConnectorTomlConfig>, String> {\n let connector_data = Self::new()?;\n match connector {\n Connector::Aci => Ok(connector_data.aci),\n Connector::Adyen => Ok(connector_data.adyen),\n Connector::Adyenplatform => Err(\"Use get_payout_connector_config\".to_string()),\n Connector::Airwallex => Ok(connector_data.airwallex),\n Connector::Archipel => Ok(connector_data.archipel),\n Connector::Authorizedotnet => Ok(connector_data.authorizedotnet),\n Connector::Bamboraapac => Ok(connector_data.bamboraapac),\n Connector::Bankofamerica => Ok(connector_data.bankofamerica),\n Connector::Barclaycard => Ok(connector_data.barclaycard),\n Connector::Billwerk => Ok(connector_data.billwerk),\n Connector::Bitpay => Ok(connector_data.bitpay),\n Connector::Bluesnap => Ok(connector_data.bluesnap),\n Connector::Boku => Ok(connector_data.boku),\n Connector::Braintree => Ok(connector_data.braintree),\n Connector::Cashtocode => Ok(connector_data.cashtocode),\n Connector::Chargebee => Ok(connector_data.chargebee),\n Connector::Checkout => Ok(connector_data.checkout),\n Connector::Coinbase => Ok(connector_data.coinbase),\n Connector::Coingate => Ok(connector_data.coingate),\n Connector::Cryptopay => Ok(connector_data.cryptopay),\n Connector::CtpVisa => Ok(connector_data.ctp_visa),\n Connector::Cybersource => Ok(connector_data.cybersource),\n #[cfg(feature = \"dummy_connector\")]\n Connector::DummyBillingConnector => Ok(connector_data.dummy_connector),\n Connector::Iatapay => Ok(connector_data.iatapay),\n Connector::Itaubank => Ok(connector_data.itaubank),\n Connector::Opennode => Ok(connector_data.opennode),\n Connector::Bambora => Ok(connector_data.bambora),\n Connector::Datatrans => Ok(connector_data.datatrans),\n Connector::Deutschebank => Ok(connector_data.deutschebank),\n Connector::Digitalvirgo => Ok(connector_data.digitalvirgo),\n Connector::Dlocal => Ok(connector_data.dlocal),\n Connector::Ebanx => Ok(connector_data.ebanx_payout),\n Connector::Elavon => Ok(connector_data.elavon),\n Connector::Facilitapay => Ok(connector_data.facilitapay),\n Connector::Fiserv => Ok(connector_data.fiserv),\n Connector::Fiservemea => Ok(connector_data.fiservemea),\n Connector::Fiuu => Ok(connector_data.fiuu),\n Connector::Forte => Ok(connector_data.forte),\n Connector::Getnet => Ok(connector_data.getnet),\n Connector::Globalpay => Ok(connector_data.globalpay),\n Connector::Globepay => Ok(connector_data.globepay),\n Connector::Gocardless => Ok(connector_data.gocardless),\n Connector::Gpayments => Ok(connector_data.gpayments),\n Connector::Hipay => Ok(connector_data.hipay),\n Connector::Helcim => Ok(connector_data.helcim),\n Connector::Inespay => Ok(connector_data.inespay),\n Connector::Jpmorgan => Ok(connector_data.jpmorgan),\n Connector::Juspaythreedsserver => Ok(connector_data.juspaythreedsserver),\n Connector::Klarna => Ok(connector_data.klarna),\n Connector::Mifinity => Ok(connector_data.mifinity),\n Connector::Mollie => Ok(connector_data.mollie),\n Connector::Moneris => Ok(connector_data.moneris),\n Connector::Multisafepay => Ok(connector_data.multisafepay),\n Connector::Nexinets => Ok(connector_data.nexinets),\n Connector::Nexixpay => Ok(connector_data.nexixpay),\n Connector::Prophetpay => Ok(connector_data.prophetpay),\n Connector::Nmi => Ok(connector_data.nmi),\n Connector::Nomupay => Err(\"Use get_payout_connector_config\".to_string()),\n Connector::Novalnet => Ok(connector_data.novalnet),\n Connector::Noon => Ok(connector_data.noon),\n Connector::Nuvei => Ok(connector_data.nuvei),\n Connector::Paybox => Ok(connector_data.paybox),\n Connector::Payme => Ok(connector_data.payme),\n Connector::Payone => Err(\"Use get_payout_connector_config\".to_string()),\n Connector::Paypal => Ok(connector_data.paypal),\n Connector::Paystack => Ok(connector_data.paystack),\n Connector::Payu => Ok(connector_data.payu),\n Connector::Placetopay => Ok(connector_data.placetopay),\n Connector::Plaid => Ok(connector_data.plaid),\n Connector::Powertranz => Ok(connector_data.powertranz),\n Connector::Razorpay => Ok(connector_data.razorpay),\n Connector::Rapyd => Ok(connector_data.rapyd),\n Connector::Recurly => Ok(connector_data.recurly),\n Connector::Redsys => Ok(connector_data.redsys),\n Connector::Riskified => Ok(connector_data.riskified),\n Connector::Shift4 => Ok(connector_data.shift4),\n Connector::Signifyd => Ok(connector_data.signifyd),\n Connector::Square => Ok(connector_data.square),\n Connector::Stax => Ok(connector_data.stax),\n Connector::Stripe => Ok(connector_data.stripe),\n Connector::Stripebilling => Ok(connector_data.stripebilling),\n Connector::Trustpay => Ok(connector_data.trustpay),\n Connector::Threedsecureio => Ok(connector_data.threedsecureio),\n Connector::Taxjar => Ok(connector_data.taxjar),\n Connector::Tsys => Ok(connector_data.tsys),\n Connector::Vgs => Ok(connector_data.vgs),\n Connector::Volt => Ok(connector_data.volt),\n Connector::Wellsfargo => Ok(connector_data.wellsfargo),\n Connector::Wise => Err(\"Use get_payout_connector_config\".to_string()),\n Connector::Worldline => Ok(connector_data.worldline),\n Connector::Worldpay => Ok(connector_data.worldpay),\n Connector::Worldpayvantiv => Ok(connector_data.worldpayvantiv),\n Connector::Worldpayxml => Ok(connector_data.worldpayxml),\n Connector::Zen => Ok(connector_data.zen),\n Connector::Zsl => Ok(connector_data.zsl),\n #[cfg(feature = \"dummy_connector\")]\n Connector::DummyConnector1 => Ok(connector_data.dummy_connector),\n #[cfg(feature = \"dummy_connector\")]\n Connector::DummyConnector2 => Ok(connector_data.dummy_connector),\n #[cfg(feature = \"dummy_connector\")]\n Connector::DummyConnector3 => Ok(connector_data.dummy_connector),\n #[cfg(feature = \"dummy_connector\")]\n Connector::DummyConnector4 => Ok(connector_data.stripe_test),\n #[cfg(feature = \"dummy_connector\")]\n Connector::DummyConnector5 => Ok(connector_data.dummy_connector),\n #[cfg(feature = \"dummy_connector\")]\n Connector::DummyConnector6 => Ok(connector_data.dummy_connector),\n #[cfg(feature = \"dummy_connector\")]\n Connector::DummyConnector7 => Ok(connector_data.paypal_test),\n Connector::Netcetera => Ok(connector_data.netcetera),\n Connector::CtpMastercard => Ok(connector_data.ctp_mastercard),\n Connector::Xendit => Ok(connector_data.xendit),\n }\n }\n}",
|
| 17 |
+
"after_code": "impl ConnectorConfig {\n fn new() -> Result<Self, String> {\n let config_str = if cfg!(feature = \"production\") {\n include_str!(\"../toml/production.toml\")\n } else if cfg!(feature = \"sandbox\") {\n include_str!(\"../toml/sandbox.toml\")\n } else {\n include_str!(\"../toml/development.toml\")\n };\n let config = toml::from_str::<Self>(config_str);\n match config {\n Ok(data) => Ok(data),\n Err(err) => Err(err.to_string()),\n }\n }\n\n #[cfg(feature = \"payouts\")]\n pub fn get_payout_connector_config(\n connector: PayoutConnectors,\n ) -> Result<Option<ConnectorTomlConfig>, String> {\n let connector_data = Self::new()?;\n match connector {\n PayoutConnectors::Adyen => Ok(connector_data.adyen_payout),\n PayoutConnectors::Adyenplatform => Ok(connector_data.adyenplatform_payout),\n PayoutConnectors::Cybersource => Ok(connector_data.cybersource_payout),\n PayoutConnectors::Ebanx => Ok(connector_data.ebanx_payout),\n PayoutConnectors::Nomupay => Ok(connector_data.nomupay_payout),\n PayoutConnectors::Payone => Ok(connector_data.payone_payout),\n PayoutConnectors::Paypal => Ok(connector_data.paypal_payout),\n PayoutConnectors::Stripe => Ok(connector_data.stripe_payout),\n PayoutConnectors::Wise => Ok(connector_data.wise_payout),\n }\n }\n\n pub fn get_authentication_connector_config(\n connector: AuthenticationConnectors,\n ) -> Result<Option<ConnectorTomlConfig>, String> {\n let connector_data = Self::new()?;\n match connector {\n AuthenticationConnectors::Threedsecureio => Ok(connector_data.threedsecureio),\n AuthenticationConnectors::Netcetera => Ok(connector_data.netcetera),\n AuthenticationConnectors::Gpayments => Ok(connector_data.gpayments),\n AuthenticationConnectors::CtpMastercard => Ok(connector_data.ctp_mastercard),\n AuthenticationConnectors::CtpVisa => Ok(connector_data.ctp_visa),\n AuthenticationConnectors::UnifiedAuthenticationService => {\n Ok(connector_data.unified_authentication_service)\n }\n AuthenticationConnectors::Juspaythreedsserver => Ok(connector_data.juspaythreedsserver),\n }\n }\n\n pub fn get_tax_processor_config(\n connector: TaxConnectors,\n ) -> Result<Option<ConnectorTomlConfig>, String> {\n let connector_data = Self::new()?;\n match connector {\n TaxConnectors::Taxjar => Ok(connector_data.taxjar),\n }\n }\n\n pub fn get_pm_authentication_processor_config(\n connector: PmAuthConnectors,\n ) -> Result<Option<ConnectorTomlConfig>, String> {\n let connector_data = Self::new()?;\n match connector {\n PmAuthConnectors::Plaid => Ok(connector_data.plaid),\n }\n }\n\n pub fn get_connector_config(\n connector: Connector,\n ) -> Result<Option<ConnectorTomlConfig>, String> {\n let connector_data = Self::new()?;\n match connector {\n Connector::Aci => Ok(connector_data.aci),\n Connector::Adyen => Ok(connector_data.adyen),\n Connector::Adyenplatform => Err(\"Use get_payout_connector_config\".to_string()),\n Connector::Airwallex => Ok(connector_data.airwallex),\n Connector::Archipel => Ok(connector_data.archipel),\n Connector::Authorizedotnet => Ok(connector_data.authorizedotnet),\n Connector::Bamboraapac => Ok(connector_data.bamboraapac),\n Connector::Bankofamerica => Ok(connector_data.bankofamerica),\n Connector::Barclaycard => Ok(connector_data.barclaycard),\n Connector::Billwerk => Ok(connector_data.billwerk),\n Connector::Bitpay => Ok(connector_data.bitpay),\n Connector::Bluesnap => Ok(connector_data.bluesnap),\n Connector::Boku => Ok(connector_data.boku),\n Connector::Braintree => Ok(connector_data.braintree),\n Connector::Cashtocode => Ok(connector_data.cashtocode),\n Connector::Chargebee => Ok(connector_data.chargebee),\n Connector::Checkout => Ok(connector_data.checkout),\n Connector::Coinbase => Ok(connector_data.coinbase),\n Connector::Coingate => Ok(connector_data.coingate),\n Connector::Cryptopay => Ok(connector_data.cryptopay),\n Connector::CtpVisa => Ok(connector_data.ctp_visa),\n Connector::Cybersource => Ok(connector_data.cybersource),\n #[cfg(feature = \"dummy_connector\")]\n Connector::DummyBillingConnector => Ok(connector_data.dummy_connector),\n Connector::Iatapay => Ok(connector_data.iatapay),\n Connector::Itaubank => Ok(connector_data.itaubank),\n Connector::Opennode => Ok(connector_data.opennode),\n Connector::Bambora => Ok(connector_data.bambora),\n Connector::Datatrans => Ok(connector_data.datatrans),\n Connector::Deutschebank => Ok(connector_data.deutschebank),\n Connector::Digitalvirgo => Ok(connector_data.digitalvirgo),\n Connector::Dlocal => Ok(connector_data.dlocal),\n Connector::Ebanx => Ok(connector_data.ebanx_payout),\n Connector::Elavon => Ok(connector_data.elavon),\n Connector::Facilitapay => Ok(connector_data.facilitapay),\n Connector::Fiserv => Ok(connector_data.fiserv),\n Connector::Fiservemea => Ok(connector_data.fiservemea),\n Connector::Fiuu => Ok(connector_data.fiuu),\n Connector::Forte => Ok(connector_data.forte),\n Connector::Getnet => Ok(connector_data.getnet),\n Connector::Globalpay => Ok(connector_data.globalpay),\n Connector::Globepay => Ok(connector_data.globepay),\n Connector::Gocardless => Ok(connector_data.gocardless),\n Connector::Gpayments => Ok(connector_data.gpayments),\n Connector::Hipay => Ok(connector_data.hipay),\n Connector::Helcim => Ok(connector_data.helcim),\n Connector::Inespay => Ok(connector_data.inespay),\n Connector::Jpmorgan => Ok(connector_data.jpmorgan),\n Connector::Juspaythreedsserver => Ok(connector_data.juspaythreedsserver),\n Connector::Klarna => Ok(connector_data.klarna),\n Connector::Mifinity => Ok(connector_data.mifinity),\n Connector::Mollie => Ok(connector_data.mollie),\n Connector::Moneris => Ok(connector_data.moneris),\n Connector::Multisafepay => Ok(connector_data.multisafepay),\n Connector::Nexinets => Ok(connector_data.nexinets),\n Connector::Nexixpay => Ok(connector_data.nexixpay),\n Connector::Prophetpay => Ok(connector_data.prophetpay),\n Connector::Nmi => Ok(connector_data.nmi),\n Connector::Nomupay => Err(\"Use get_payout_connector_config\".to_string()),\n Connector::Novalnet => Ok(connector_data.novalnet),\n Connector::Noon => Ok(connector_data.noon),\n Connector::Nuvei => Ok(connector_data.nuvei),\n Connector::Paybox => Ok(connector_data.paybox),\n Connector::Payme => Ok(connector_data.payme),\n Connector::Payone => Err(\"Use get_payout_connector_config\".to_string()),\n Connector::Paypal => Ok(connector_data.paypal),\n Connector::Paystack => Ok(connector_data.paystack),\n Connector::Payu => Ok(connector_data.payu),\n Connector::Placetopay => Ok(connector_data.placetopay),\n Connector::Plaid => Ok(connector_data.plaid),\n Connector::Powertranz => Ok(connector_data.powertranz),\n Connector::Razorpay => Ok(connector_data.razorpay),\n Connector::Rapyd => Ok(connector_data.rapyd),\n Connector::Recurly => Ok(connector_data.recurly),\n Connector::Redsys => Ok(connector_data.redsys),\n Connector::Riskified => Ok(connector_data.riskified),\n Connector::Shift4 => Ok(connector_data.shift4),\n Connector::Signifyd => Ok(connector_data.signifyd),\n Connector::Square => Ok(connector_data.square),\n Connector::Stax => Ok(connector_data.stax),\n Connector::Stripe => Ok(connector_data.stripe),\n Connector::Stripebilling => Ok(connector_data.stripebilling),\n Connector::Trustpay => Ok(connector_data.trustpay),\n Connector::Threedsecureio => Ok(connector_data.threedsecureio),\n Connector::Taxjar => Ok(connector_data.taxjar),\n Connector::Tsys => Ok(connector_data.tsys),\n Connector::Vgs => Ok(connector_data.vgs),\n Connector::Volt => Ok(connector_data.volt),\n Connector::Wellsfargo => Ok(connector_data.wellsfargo),\n Connector::Wise => Err(\"Use get_payout_connector_config\".to_string()),\n Connector::Worldline => Ok(connector_data.worldline),\n Connector::Worldpay => Ok(connector_data.worldpay),\n // Connector::Worldpayvantiv => Ok(connector_data.worldpayvantiv),\n Connector::Worldpayxml => Ok(connector_data.worldpayxml),\n Connector::Zen => Ok(connector_data.zen),\n Connector::Zsl => Ok(connector_data.zsl),\n #[cfg(feature = \"dummy_connector\")]\n Connector::DummyConnector1 => Ok(connector_data.dummy_connector),\n #[cfg(feature = \"dummy_connector\")]\n Connector::DummyConnector2 => Ok(connector_data.dummy_connector),\n #[cfg(feature = \"dummy_connector\")]\n Connector::DummyConnector3 => Ok(connector_data.dummy_connector),\n #[cfg(feature = \"dummy_connector\")]\n Connector::DummyConnector4 => Ok(connector_data.stripe_test),\n #[cfg(feature = \"dummy_connector\")]\n Connector::DummyConnector5 => Ok(connector_data.dummy_connector),\n #[cfg(feature = \"dummy_connector\")]\n Connector::DummyConnector6 => Ok(connector_data.dummy_connector),\n #[cfg(feature = \"dummy_connector\")]\n Connector::DummyConnector7 => Ok(connector_data.paypal_test),\n Connector::Netcetera => Ok(connector_data.netcetera),\n Connector::CtpMastercard => Ok(connector_data.ctp_mastercard),\n Connector::Xendit => Ok(connector_data.xendit),\n }\n }\n}",
|
| 18 |
+
"diff_span": {
|
| 19 |
+
"before": " Connector::Worldline => Ok(connector_data.worldline),\n Connector::Worldpay => Ok(connector_data.worldpay),\n Connector::Worldpayvantiv => Ok(connector_data.worldpayvantiv),\n Connector::Worldpayxml => Ok(connector_data.worldpayxml),\n Connector::Zen => Ok(connector_data.zen),",
|
| 20 |
+
"after": " Connector::Worldline => Ok(connector_data.worldline),\n Connector::Worldpay => Ok(connector_data.worldpay),\n // Connector::Worldpayvantiv => Ok(connector_data.worldpayvantiv),\n Connector::Worldpayxml => Ok(connector_data.worldpayxml),\n Connector::Zen => Ok(connector_data.zen),"
|
| 21 |
+
},
|
| 22 |
+
"commit_sha": "d2779135ea38944f01950c64f02addd18ae08dc3"
|
| 23 |
+
},
|
| 24 |
+
{
|
| 25 |
+
"id": "crates/connector_configs/src/connector.rs::ConnectorConfig::function::get_connector_config",
|
| 26 |
+
"file": "crates/connector_configs/src/connector.rs",
|
| 27 |
+
"kind": "function_item",
|
| 28 |
+
"status": "modified",
|
| 29 |
+
"code_changed": true,
|
| 30 |
+
"imports_changed": false,
|
| 31 |
+
"before_code": "pub fn get_connector_config(\n connector: Connector,\n ) -> Result<Option<ConnectorTomlConfig>, String> {\n let connector_data = Self::new()?;\n match connector {\n Connector::Aci => Ok(connector_data.aci),\n Connector::Adyen => Ok(connector_data.adyen),\n Connector::Adyenplatform => Err(\"Use get_payout_connector_config\".to_string()),\n Connector::Airwallex => Ok(connector_data.airwallex),\n Connector::Archipel => Ok(connector_data.archipel),\n Connector::Authorizedotnet => Ok(connector_data.authorizedotnet),\n Connector::Bamboraapac => Ok(connector_data.bamboraapac),\n Connector::Bankofamerica => Ok(connector_data.bankofamerica),\n Connector::Barclaycard => Ok(connector_data.barclaycard),\n Connector::Billwerk => Ok(connector_data.billwerk),\n Connector::Bitpay => Ok(connector_data.bitpay),\n Connector::Bluesnap => Ok(connector_data.bluesnap),\n Connector::Boku => Ok(connector_data.boku),\n Connector::Braintree => Ok(connector_data.braintree),\n Connector::Cashtocode => Ok(connector_data.cashtocode),\n Connector::Chargebee => Ok(connector_data.chargebee),\n Connector::Checkout => Ok(connector_data.checkout),\n Connector::Coinbase => Ok(connector_data.coinbase),\n Connector::Coingate => Ok(connector_data.coingate),\n Connector::Cryptopay => Ok(connector_data.cryptopay),\n Connector::CtpVisa => Ok(connector_data.ctp_visa),\n Connector::Cybersource => Ok(connector_data.cybersource),\n #[cfg(feature = \"dummy_connector\")]\n Connector::DummyBillingConnector => Ok(connector_data.dummy_connector),\n Connector::Iatapay => Ok(connector_data.iatapay),\n Connector::Itaubank => Ok(connector_data.itaubank),\n Connector::Opennode => Ok(connector_data.opennode),\n Connector::Bambora => Ok(connector_data.bambora),\n Connector::Datatrans => Ok(connector_data.datatrans),\n Connector::Deutschebank => Ok(connector_data.deutschebank),\n Connector::Digitalvirgo => Ok(connector_data.digitalvirgo),\n Connector::Dlocal => Ok(connector_data.dlocal),\n Connector::Ebanx => Ok(connector_data.ebanx_payout),\n Connector::Elavon => Ok(connector_data.elavon),\n Connector::Facilitapay => Ok(connector_data.facilitapay),\n Connector::Fiserv => Ok(connector_data.fiserv),\n Connector::Fiservemea => Ok(connector_data.fiservemea),\n Connector::Fiuu => Ok(connector_data.fiuu),\n Connector::Forte => Ok(connector_data.forte),\n Connector::Getnet => Ok(connector_data.getnet),\n Connector::Globalpay => Ok(connector_data.globalpay),\n Connector::Globepay => Ok(connector_data.globepay),\n Connector::Gocardless => Ok(connector_data.gocardless),\n Connector::Gpayments => Ok(connector_data.gpayments),\n Connector::Hipay => Ok(connector_data.hipay),\n Connector::Helcim => Ok(connector_data.helcim),\n Connector::Inespay => Ok(connector_data.inespay),\n Connector::Jpmorgan => Ok(connector_data.jpmorgan),\n Connector::Juspaythreedsserver => Ok(connector_data.juspaythreedsserver),\n Connector::Klarna => Ok(connector_data.klarna),\n Connector::Mifinity => Ok(connector_data.mifinity),\n Connector::Mollie => Ok(connector_data.mollie),\n Connector::Moneris => Ok(connector_data.moneris),\n Connector::Multisafepay => Ok(connector_data.multisafepay),\n Connector::Nexinets => Ok(connector_data.nexinets),\n Connector::Nexixpay => Ok(connector_data.nexixpay),\n Connector::Prophetpay => Ok(connector_data.prophetpay),\n Connector::Nmi => Ok(connector_data.nmi),\n Connector::Nomupay => Err(\"Use get_payout_connector_config\".to_string()),\n Connector::Novalnet => Ok(connector_data.novalnet),\n Connector::Noon => Ok(connector_data.noon),\n Connector::Nuvei => Ok(connector_data.nuvei),\n Connector::Paybox => Ok(connector_data.paybox),\n Connector::Payme => Ok(connector_data.payme),\n Connector::Payone => Err(\"Use get_payout_connector_config\".to_string()),\n Connector::Paypal => Ok(connector_data.paypal),\n Connector::Paystack => Ok(connector_data.paystack),\n Connector::Payu => Ok(connector_data.payu),\n Connector::Placetopay => Ok(connector_data.placetopay),\n Connector::Plaid => Ok(connector_data.plaid),\n Connector::Powertranz => Ok(connector_data.powertranz),\n Connector::Razorpay => Ok(connector_data.razorpay),\n Connector::Rapyd => Ok(connector_data.rapyd),\n Connector::Recurly => Ok(connector_data.recurly),\n Connector::Redsys => Ok(connector_data.redsys),\n Connector::Riskified => Ok(connector_data.riskified),\n Connector::Shift4 => Ok(connector_data.shift4),\n Connector::Signifyd => Ok(connector_data.signifyd),\n Connector::Square => Ok(connector_data.square),\n Connector::Stax => Ok(connector_data.stax),\n Connector::Stripe => Ok(connector_data.stripe),\n Connector::Stripebilling => Ok(connector_data.stripebilling),\n Connector::Trustpay => Ok(connector_data.trustpay),\n Connector::Threedsecureio => Ok(connector_data.threedsecureio),\n Connector::Taxjar => Ok(connector_data.taxjar),\n Connector::Tsys => Ok(connector_data.tsys),\n Connector::Vgs => Ok(connector_data.vgs),\n Connector::Volt => Ok(connector_data.volt),\n Connector::Wellsfargo => Ok(connector_data.wellsfargo),\n Connector::Wise => Err(\"Use get_payout_connector_config\".to_string()),\n Connector::Worldline => Ok(connector_data.worldline),\n Connector::Worldpay => Ok(connector_data.worldpay),\n Connector::Worldpayvantiv => Ok(connector_data.worldpayvantiv),\n Connector::Worldpayxml => Ok(connector_data.worldpayxml),\n Connector::Zen => Ok(connector_data.zen),\n Connector::Zsl => Ok(connector_data.zsl),\n #[cfg(feature = \"dummy_connector\")]\n Connector::DummyConnector1 => Ok(connector_data.dummy_connector),\n #[cfg(feature = \"dummy_connector\")]\n Connector::DummyConnector2 => Ok(connector_data.dummy_connector),\n #[cfg(feature = \"dummy_connector\")]\n Connector::DummyConnector3 => Ok(connector_data.dummy_connector),\n #[cfg(feature = \"dummy_connector\")]\n Connector::DummyConnector4 => Ok(connector_data.stripe_test),\n #[cfg(feature = \"dummy_connector\")]\n Connector::DummyConnector5 => Ok(connector_data.dummy_connector),\n #[cfg(feature = \"dummy_connector\")]\n Connector::DummyConnector6 => Ok(connector_data.dummy_connector),\n #[cfg(feature = \"dummy_connector\")]\n Connector::DummyConnector7 => Ok(connector_data.paypal_test),\n Connector::Netcetera => Ok(connector_data.netcetera),\n Connector::CtpMastercard => Ok(connector_data.ctp_mastercard),\n Connector::Xendit => Ok(connector_data.xendit),\n }\n }",
|
| 32 |
+
"after_code": "pub fn get_connector_config(\n connector: Connector,\n ) -> Result<Option<ConnectorTomlConfig>, String> {\n let connector_data = Self::new()?;\n match connector {\n Connector::Aci => Ok(connector_data.aci),\n Connector::Adyen => Ok(connector_data.adyen),\n Connector::Adyenplatform => Err(\"Use get_payout_connector_config\".to_string()),\n Connector::Airwallex => Ok(connector_data.airwallex),\n Connector::Archipel => Ok(connector_data.archipel),\n Connector::Authorizedotnet => Ok(connector_data.authorizedotnet),\n Connector::Bamboraapac => Ok(connector_data.bamboraapac),\n Connector::Bankofamerica => Ok(connector_data.bankofamerica),\n Connector::Barclaycard => Ok(connector_data.barclaycard),\n Connector::Billwerk => Ok(connector_data.billwerk),\n Connector::Bitpay => Ok(connector_data.bitpay),\n Connector::Bluesnap => Ok(connector_data.bluesnap),\n Connector::Boku => Ok(connector_data.boku),\n Connector::Braintree => Ok(connector_data.braintree),\n Connector::Cashtocode => Ok(connector_data.cashtocode),\n Connector::Chargebee => Ok(connector_data.chargebee),\n Connector::Checkout => Ok(connector_data.checkout),\n Connector::Coinbase => Ok(connector_data.coinbase),\n Connector::Coingate => Ok(connector_data.coingate),\n Connector::Cryptopay => Ok(connector_data.cryptopay),\n Connector::CtpVisa => Ok(connector_data.ctp_visa),\n Connector::Cybersource => Ok(connector_data.cybersource),\n #[cfg(feature = \"dummy_connector\")]\n Connector::DummyBillingConnector => Ok(connector_data.dummy_connector),\n Connector::Iatapay => Ok(connector_data.iatapay),\n Connector::Itaubank => Ok(connector_data.itaubank),\n Connector::Opennode => Ok(connector_data.opennode),\n Connector::Bambora => Ok(connector_data.bambora),\n Connector::Datatrans => Ok(connector_data.datatrans),\n Connector::Deutschebank => Ok(connector_data.deutschebank),\n Connector::Digitalvirgo => Ok(connector_data.digitalvirgo),\n Connector::Dlocal => Ok(connector_data.dlocal),\n Connector::Ebanx => Ok(connector_data.ebanx_payout),\n Connector::Elavon => Ok(connector_data.elavon),\n Connector::Facilitapay => Ok(connector_data.facilitapay),\n Connector::Fiserv => Ok(connector_data.fiserv),\n Connector::Fiservemea => Ok(connector_data.fiservemea),\n Connector::Fiuu => Ok(connector_data.fiuu),\n Connector::Forte => Ok(connector_data.forte),\n Connector::Getnet => Ok(connector_data.getnet),\n Connector::Globalpay => Ok(connector_data.globalpay),\n Connector::Globepay => Ok(connector_data.globepay),\n Connector::Gocardless => Ok(connector_data.gocardless),\n Connector::Gpayments => Ok(connector_data.gpayments),\n Connector::Hipay => Ok(connector_data.hipay),\n Connector::Helcim => Ok(connector_data.helcim),\n Connector::Inespay => Ok(connector_data.inespay),\n Connector::Jpmorgan => Ok(connector_data.jpmorgan),\n Connector::Juspaythreedsserver => Ok(connector_data.juspaythreedsserver),\n Connector::Klarna => Ok(connector_data.klarna),\n Connector::Mifinity => Ok(connector_data.mifinity),\n Connector::Mollie => Ok(connector_data.mollie),\n Connector::Moneris => Ok(connector_data.moneris),\n Connector::Multisafepay => Ok(connector_data.multisafepay),\n Connector::Nexinets => Ok(connector_data.nexinets),\n Connector::Nexixpay => Ok(connector_data.nexixpay),\n Connector::Prophetpay => Ok(connector_data.prophetpay),\n Connector::Nmi => Ok(connector_data.nmi),\n Connector::Nomupay => Err(\"Use get_payout_connector_config\".to_string()),\n Connector::Novalnet => Ok(connector_data.novalnet),\n Connector::Noon => Ok(connector_data.noon),\n Connector::Nuvei => Ok(connector_data.nuvei),\n Connector::Paybox => Ok(connector_data.paybox),\n Connector::Payme => Ok(connector_data.payme),\n Connector::Payone => Err(\"Use get_payout_connector_config\".to_string()),\n Connector::Paypal => Ok(connector_data.paypal),\n Connector::Paystack => Ok(connector_data.paystack),\n Connector::Payu => Ok(connector_data.payu),\n Connector::Placetopay => Ok(connector_data.placetopay),\n Connector::Plaid => Ok(connector_data.plaid),\n Connector::Powertranz => Ok(connector_data.powertranz),\n Connector::Razorpay => Ok(connector_data.razorpay),\n Connector::Rapyd => Ok(connector_data.rapyd),\n Connector::Recurly => Ok(connector_data.recurly),\n Connector::Redsys => Ok(connector_data.redsys),\n Connector::Riskified => Ok(connector_data.riskified),\n Connector::Shift4 => Ok(connector_data.shift4),\n Connector::Signifyd => Ok(connector_data.signifyd),\n Connector::Square => Ok(connector_data.square),\n Connector::Stax => Ok(connector_data.stax),\n Connector::Stripe => Ok(connector_data.stripe),\n Connector::Stripebilling => Ok(connector_data.stripebilling),\n Connector::Trustpay => Ok(connector_data.trustpay),\n Connector::Threedsecureio => Ok(connector_data.threedsecureio),\n Connector::Taxjar => Ok(connector_data.taxjar),\n Connector::Tsys => Ok(connector_data.tsys),\n Connector::Vgs => Ok(connector_data.vgs),\n Connector::Volt => Ok(connector_data.volt),\n Connector::Wellsfargo => Ok(connector_data.wellsfargo),\n Connector::Wise => Err(\"Use get_payout_connector_config\".to_string()),\n Connector::Worldline => Ok(connector_data.worldline),\n Connector::Worldpay => Ok(connector_data.worldpay),\n // Connector::Worldpayvantiv => Ok(connector_data.worldpayvantiv),\n Connector::Worldpayxml => Ok(connector_data.worldpayxml),\n Connector::Zen => Ok(connector_data.zen),\n Connector::Zsl => Ok(connector_data.zsl),\n #[cfg(feature = \"dummy_connector\")]\n Connector::DummyConnector1 => Ok(connector_data.dummy_connector),\n #[cfg(feature = \"dummy_connector\")]\n Connector::DummyConnector2 => Ok(connector_data.dummy_connector),\n #[cfg(feature = \"dummy_connector\")]\n Connector::DummyConnector3 => Ok(connector_data.dummy_connector),\n #[cfg(feature = \"dummy_connector\")]\n Connector::DummyConnector4 => Ok(connector_data.stripe_test),\n #[cfg(feature = \"dummy_connector\")]\n Connector::DummyConnector5 => Ok(connector_data.dummy_connector),\n #[cfg(feature = \"dummy_connector\")]\n Connector::DummyConnector6 => Ok(connector_data.dummy_connector),\n #[cfg(feature = \"dummy_connector\")]\n Connector::DummyConnector7 => Ok(connector_data.paypal_test),\n Connector::Netcetera => Ok(connector_data.netcetera),\n Connector::CtpMastercard => Ok(connector_data.ctp_mastercard),\n Connector::Xendit => Ok(connector_data.xendit),\n }\n }",
|
| 33 |
+
"diff_span": {
|
| 34 |
+
"before": " Connector::Worldline => Ok(connector_data.worldline),\n Connector::Worldpay => Ok(connector_data.worldpay),\n Connector::Worldpayvantiv => Ok(connector_data.worldpayvantiv),\n Connector::Worldpayxml => Ok(connector_data.worldpayxml),\n Connector::Zen => Ok(connector_data.zen),",
|
| 35 |
+
"after": " Connector::Worldline => Ok(connector_data.worldline),\n Connector::Worldpay => Ok(connector_data.worldpay),\n // Connector::Worldpayvantiv => Ok(connector_data.worldpayvantiv),\n Connector::Worldpayxml => Ok(connector_data.worldpayxml),\n Connector::Zen => Ok(connector_data.zen),"
|
| 36 |
+
},
|
| 37 |
+
"commit_sha": "d2779135ea38944f01950c64f02addd18ae08dc3"
|
| 38 |
+
},
|
| 39 |
+
{
|
| 40 |
+
"id": "crates/router/tests/connectors/worldpayvantiv.rs::static::CONNECTOR",
|
| 41 |
+
"file": "crates/router/tests/connectors/worldpayvantiv.rs",
|
| 42 |
+
"kind": "static_item",
|
| 43 |
+
"status": "modified",
|
| 44 |
+
"code_changed": true,
|
| 45 |
+
"imports_changed": true,
|
| 46 |
+
"before_code": "static CONNECTOR: WorldpayxmlTest = WorldpayxmlTest {};",
|
| 47 |
+
"after_code": "static CONNECTOR: WorldpayvantivTest = WorldpayvantivTest {};",
|
| 48 |
+
"diff_span": {
|
| 49 |
+
"before": "static CONNECTOR: WorldpayxmlTest = WorldpayxmlTest {};",
|
| 50 |
+
"after": "static CONNECTOR: WorldpayvantivTest = WorldpayvantivTest {};"
|
| 51 |
+
},
|
| 52 |
+
"commit_sha": "d2779135ea38944f01950c64f02addd18ae08dc3",
|
| 53 |
+
"before_imports": [
|
| 54 |
+
"use router::connector::Worldpayxml;"
|
| 55 |
+
],
|
| 56 |
+
"after_imports": []
|
| 57 |
+
}
|
| 58 |
+
]
|
| 59 |
+
}
|
diffs/pr_8219/daeff5d/diff.json
ADDED
|
@@ -0,0 +1,24 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"commit_sha": "daeff5d189c84058dc6c6641e28dd84c20ae079a",
|
| 3 |
+
"pr_number": 8219,
|
| 4 |
+
"rust_files": [
|
| 5 |
+
"crates/connector_configs/src/connector.rs"
|
| 6 |
+
],
|
| 7 |
+
"diffs": [
|
| 8 |
+
{
|
| 9 |
+
"id": "crates/connector_configs/src/connector.rs::struct::ConnectorConfig",
|
| 10 |
+
"file": "crates/connector_configs/src/connector.rs",
|
| 11 |
+
"kind": "struct_item",
|
| 12 |
+
"status": "modified",
|
| 13 |
+
"code_changed": true,
|
| 14 |
+
"imports_changed": false,
|
| 15 |
+
"before_code": "pub struct ConnectorConfig {\n pub juspaythreedsserver: Option<ConnectorTomlConfig>,\n pub aci: Option<ConnectorTomlConfig>,\n pub adyen: Option<ConnectorTomlConfig>,\n #[cfg(feature = \"payouts\")]\n pub adyen_payout: Option<ConnectorTomlConfig>,\n #[cfg(feature = \"payouts\")]\n pub adyenplatform_payout: Option<ConnectorTomlConfig>,\n pub airwallex: Option<ConnectorTomlConfig>,\n pub archipel: Option<ConnectorTomlConfig>,\n pub authorizedotnet: Option<ConnectorTomlConfig>,\n pub bamboraapac: Option<ConnectorTomlConfig>,\n pub bankofamerica: Option<ConnectorTomlConfig>,\n pub barclaycard: Option<ConnectorTomlConfig>,\n pub billwerk: Option<ConnectorTomlConfig>,\n pub bitpay: Option<ConnectorTomlConfig>,\n pub bluesnap: Option<ConnectorTomlConfig>,\n pub boku: Option<ConnectorTomlConfig>,\n pub braintree: Option<ConnectorTomlConfig>,\n pub cashtocode: Option<ConnectorTomlConfig>,\n pub chargebee: Option<ConnectorTomlConfig>,\n pub checkout: Option<ConnectorTomlConfig>,\n pub coinbase: Option<ConnectorTomlConfig>,\n pub coingate: Option<ConnectorTomlConfig>,\n pub cryptopay: Option<ConnectorTomlConfig>,\n pub ctp_visa: Option<ConnectorTomlConfig>,\n pub cybersource: Option<ConnectorTomlConfig>,\n #[cfg(feature = \"payouts\")]\n pub cybersource_payout: Option<ConnectorTomlConfig>,\n pub iatapay: Option<ConnectorTomlConfig>,\n pub itaubank: Option<ConnectorTomlConfig>,\n pub opennode: Option<ConnectorTomlConfig>,\n pub bambora: Option<ConnectorTomlConfig>,\n pub datatrans: Option<ConnectorTomlConfig>,\n pub deutschebank: Option<ConnectorTomlConfig>,\n pub digitalvirgo: Option<ConnectorTomlConfig>,\n pub dlocal: Option<ConnectorTomlConfig>,\n pub ebanx_payout: Option<ConnectorTomlConfig>,\n pub elavon: Option<ConnectorTomlConfig>,\n pub facilitapay: Option<ConnectorTomlConfig>,\n pub fiserv: Option<ConnectorTomlConfig>,\n pub fiservemea: Option<ConnectorTomlConfig>,\n pub fiuu: Option<ConnectorTomlConfig>,\n pub forte: Option<ConnectorTomlConfig>,\n pub getnet: Option<ConnectorTomlConfig>,\n pub globalpay: Option<ConnectorTomlConfig>,\n pub globepay: Option<ConnectorTomlConfig>,\n pub gocardless: Option<ConnectorTomlConfig>,\n pub gpayments: Option<ConnectorTomlConfig>,\n pub hipay: Option<ConnectorTomlConfig>,\n pub helcim: Option<ConnectorTomlConfig>,\n pub inespay: Option<ConnectorTomlConfig>,\n pub jpmorgan: Option<ConnectorTomlConfig>,\n pub klarna: Option<ConnectorTomlConfig>,\n pub mifinity: Option<ConnectorTomlConfig>,\n pub mollie: Option<ConnectorTomlConfig>,\n pub moneris: Option<ConnectorTomlConfig>,\n pub multisafepay: Option<ConnectorTomlConfig>,\n pub nexinets: Option<ConnectorTomlConfig>,\n pub nexixpay: Option<ConnectorTomlConfig>,\n pub nmi: Option<ConnectorTomlConfig>,\n pub nomupay_payout: Option<ConnectorTomlConfig>,\n pub noon: Option<ConnectorTomlConfig>,\n pub nordea: Option<ConnectorTomlConfig>,\n pub novalnet: Option<ConnectorTomlConfig>,\n pub nuvei: Option<ConnectorTomlConfig>,\n pub paybox: Option<ConnectorTomlConfig>,\n pub payme: Option<ConnectorTomlConfig>,\n #[cfg(feature = \"payouts\")]\n pub payone_payout: Option<ConnectorTomlConfig>,\n pub paypal: Option<ConnectorTomlConfig>,\n #[cfg(feature = \"payouts\")]\n pub paypal_payout: Option<ConnectorTomlConfig>,\n pub paystack: Option<ConnectorTomlConfig>,\n pub payu: Option<ConnectorTomlConfig>,\n pub placetopay: Option<ConnectorTomlConfig>,\n pub plaid: Option<ConnectorTomlConfig>,\n pub powertranz: Option<ConnectorTomlConfig>,\n pub prophetpay: Option<ConnectorTomlConfig>,\n pub razorpay: Option<ConnectorTomlConfig>,\n pub recurly: Option<ConnectorTomlConfig>,\n pub riskified: Option<ConnectorTomlConfig>,\n pub rapyd: Option<ConnectorTomlConfig>,\n pub redsys: Option<ConnectorTomlConfig>,\n pub shift4: Option<ConnectorTomlConfig>,\n pub stripe: Option<ConnectorTomlConfig>,\n #[cfg(feature = \"payouts\")]\n pub stripe_payout: Option<ConnectorTomlConfig>,\n pub stripebilling: Option<ConnectorTomlConfig>,\n pub signifyd: Option<ConnectorTomlConfig>,\n pub tokenio: Option<ConnectorTomlConfig>,\n pub trustpay: Option<ConnectorTomlConfig>,\n pub threedsecureio: Option<ConnectorTomlConfig>,\n pub netcetera: Option<ConnectorTomlConfig>,\n pub tsys: Option<ConnectorTomlConfig>,\n pub vgs: Option<ConnectorTomlConfig>,\n pub volt: Option<ConnectorTomlConfig>,\n pub wellsfargo: Option<ConnectorTomlConfig>,\n #[cfg(feature = \"payouts\")]\n pub wise_payout: Option<ConnectorTomlConfig>,\n pub worldline: Option<ConnectorTomlConfig>,\n pub worldpay: Option<ConnectorTomlConfig>,\n pub worldpayvantiv: Option<ConnectorTomlConfig>,\n pub worldpayvantiv: Option<ConnectorTomlConfig>,\n pub worldpayxml: Option<ConnectorTomlConfig>,\n pub xendit: Option<ConnectorTomlConfig>,\n pub square: Option<ConnectorTomlConfig>,\n pub stax: Option<ConnectorTomlConfig>,\n pub dummy_connector: Option<ConnectorTomlConfig>,\n pub stripe_test: Option<ConnectorTomlConfig>,\n pub paypal_test: Option<ConnectorTomlConfig>,\n pub zen: Option<ConnectorTomlConfig>,\n pub zsl: Option<ConnectorTomlConfig>,\n pub taxjar: Option<ConnectorTomlConfig>,\n pub ctp_mastercard: Option<ConnectorTomlConfig>,\n pub unified_authentication_service: Option<ConnectorTomlConfig>,\n}",
|
| 16 |
+
"after_code": "pub struct ConnectorConfig {\n pub juspaythreedsserver: Option<ConnectorTomlConfig>,\n pub aci: Option<ConnectorTomlConfig>,\n pub adyen: Option<ConnectorTomlConfig>,\n #[cfg(feature = \"payouts\")]\n pub adyen_payout: Option<ConnectorTomlConfig>,\n #[cfg(feature = \"payouts\")]\n pub adyenplatform_payout: Option<ConnectorTomlConfig>,\n pub airwallex: Option<ConnectorTomlConfig>,\n pub archipel: Option<ConnectorTomlConfig>,\n pub authorizedotnet: Option<ConnectorTomlConfig>,\n pub bamboraapac: Option<ConnectorTomlConfig>,\n pub bankofamerica: Option<ConnectorTomlConfig>,\n pub barclaycard: Option<ConnectorTomlConfig>,\n pub billwerk: Option<ConnectorTomlConfig>,\n pub bitpay: Option<ConnectorTomlConfig>,\n pub bluesnap: Option<ConnectorTomlConfig>,\n pub boku: Option<ConnectorTomlConfig>,\n pub braintree: Option<ConnectorTomlConfig>,\n pub cashtocode: Option<ConnectorTomlConfig>,\n pub chargebee: Option<ConnectorTomlConfig>,\n pub checkout: Option<ConnectorTomlConfig>,\n pub coinbase: Option<ConnectorTomlConfig>,\n pub coingate: Option<ConnectorTomlConfig>,\n pub cryptopay: Option<ConnectorTomlConfig>,\n pub ctp_visa: Option<ConnectorTomlConfig>,\n pub cybersource: Option<ConnectorTomlConfig>,\n #[cfg(feature = \"payouts\")]\n pub cybersource_payout: Option<ConnectorTomlConfig>,\n pub iatapay: Option<ConnectorTomlConfig>,\n pub itaubank: Option<ConnectorTomlConfig>,\n pub opennode: Option<ConnectorTomlConfig>,\n pub bambora: Option<ConnectorTomlConfig>,\n pub datatrans: Option<ConnectorTomlConfig>,\n pub deutschebank: Option<ConnectorTomlConfig>,\n pub digitalvirgo: Option<ConnectorTomlConfig>,\n pub dlocal: Option<ConnectorTomlConfig>,\n pub ebanx_payout: Option<ConnectorTomlConfig>,\n pub elavon: Option<ConnectorTomlConfig>,\n pub facilitapay: Option<ConnectorTomlConfig>,\n pub fiserv: Option<ConnectorTomlConfig>,\n pub fiservemea: Option<ConnectorTomlConfig>,\n pub fiuu: Option<ConnectorTomlConfig>,\n pub forte: Option<ConnectorTomlConfig>,\n pub getnet: Option<ConnectorTomlConfig>,\n pub globalpay: Option<ConnectorTomlConfig>,\n pub globepay: Option<ConnectorTomlConfig>,\n pub gocardless: Option<ConnectorTomlConfig>,\n pub gpayments: Option<ConnectorTomlConfig>,\n pub hipay: Option<ConnectorTomlConfig>,\n pub helcim: Option<ConnectorTomlConfig>,\n pub inespay: Option<ConnectorTomlConfig>,\n pub jpmorgan: Option<ConnectorTomlConfig>,\n pub klarna: Option<ConnectorTomlConfig>,\n pub mifinity: Option<ConnectorTomlConfig>,\n pub mollie: Option<ConnectorTomlConfig>,\n pub moneris: Option<ConnectorTomlConfig>,\n pub multisafepay: Option<ConnectorTomlConfig>,\n pub nexinets: Option<ConnectorTomlConfig>,\n pub nexixpay: Option<ConnectorTomlConfig>,\n pub nmi: Option<ConnectorTomlConfig>,\n pub nomupay_payout: Option<ConnectorTomlConfig>,\n pub noon: Option<ConnectorTomlConfig>,\n pub nordea: Option<ConnectorTomlConfig>,\n pub novalnet: Option<ConnectorTomlConfig>,\n pub nuvei: Option<ConnectorTomlConfig>,\n pub paybox: Option<ConnectorTomlConfig>,\n pub payme: Option<ConnectorTomlConfig>,\n #[cfg(feature = \"payouts\")]\n pub payone_payout: Option<ConnectorTomlConfig>,\n pub paypal: Option<ConnectorTomlConfig>,\n #[cfg(feature = \"payouts\")]\n pub paypal_payout: Option<ConnectorTomlConfig>,\n pub paystack: Option<ConnectorTomlConfig>,\n pub payu: Option<ConnectorTomlConfig>,\n pub placetopay: Option<ConnectorTomlConfig>,\n pub plaid: Option<ConnectorTomlConfig>,\n pub powertranz: Option<ConnectorTomlConfig>,\n pub prophetpay: Option<ConnectorTomlConfig>,\n pub razorpay: Option<ConnectorTomlConfig>,\n pub recurly: Option<ConnectorTomlConfig>,\n pub riskified: Option<ConnectorTomlConfig>,\n pub rapyd: Option<ConnectorTomlConfig>,\n pub redsys: Option<ConnectorTomlConfig>,\n pub shift4: Option<ConnectorTomlConfig>,\n pub stripe: Option<ConnectorTomlConfig>,\n #[cfg(feature = \"payouts\")]\n pub stripe_payout: Option<ConnectorTomlConfig>,\n pub stripebilling: Option<ConnectorTomlConfig>,\n pub signifyd: Option<ConnectorTomlConfig>,\n pub tokenio: Option<ConnectorTomlConfig>,\n pub trustpay: Option<ConnectorTomlConfig>,\n pub threedsecureio: Option<ConnectorTomlConfig>,\n pub netcetera: Option<ConnectorTomlConfig>,\n pub tsys: Option<ConnectorTomlConfig>,\n pub vgs: Option<ConnectorTomlConfig>,\n pub volt: Option<ConnectorTomlConfig>,\n pub wellsfargo: Option<ConnectorTomlConfig>,\n #[cfg(feature = \"payouts\")]\n pub wise_payout: Option<ConnectorTomlConfig>,\n pub worldline: Option<ConnectorTomlConfig>,\n pub worldpay: Option<ConnectorTomlConfig>,\n pub worldpayvantiv: Option<ConnectorTomlConfig>,\n pub worldpayxml: Option<ConnectorTomlConfig>,\n pub xendit: Option<ConnectorTomlConfig>,\n pub square: Option<ConnectorTomlConfig>,\n pub stax: Option<ConnectorTomlConfig>,\n pub dummy_connector: Option<ConnectorTomlConfig>,\n pub stripe_test: Option<ConnectorTomlConfig>,\n pub paypal_test: Option<ConnectorTomlConfig>,\n pub zen: Option<ConnectorTomlConfig>,\n pub zsl: Option<ConnectorTomlConfig>,\n pub taxjar: Option<ConnectorTomlConfig>,\n pub ctp_mastercard: Option<ConnectorTomlConfig>,\n pub unified_authentication_service: Option<ConnectorTomlConfig>,\n}",
|
| 17 |
+
"diff_span": {
|
| 18 |
+
"before": " pub worldpay: Option<ConnectorTomlConfig>,\n pub worldpayvantiv: Option<ConnectorTomlConfig>,\n pub worldpayvantiv: Option<ConnectorTomlConfig>,\n pub worldpayxml: Option<ConnectorTomlConfig>,\n pub xendit: Option<ConnectorTomlConfig>,",
|
| 19 |
+
"after": ""
|
| 20 |
+
},
|
| 21 |
+
"commit_sha": "daeff5d189c84058dc6c6641e28dd84c20ae079a"
|
| 22 |
+
}
|
| 23 |
+
]
|
| 24 |
+
}
|