id
stringlengths
11
116
type
stringclasses
1 value
granularity
stringclasses
4 values
content
stringlengths
16
477k
metadata
dict
fn_clm_router_get_outgoing_webhooks_signature_-846307319803188573
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/compatibility/stripe/webhooks // Implementation of StripeOutgoingWebhook for OutgoingWebhookType fn get_outgoing_webhooks_signature( &self, payment_response_hash_key: Option<impl AsRef<[u8]>>, ) -> errors::CustomResult<OutgoingWebhookPayloadWithSignature, errors::WebhooksFlowError> { let timestamp = self.created; let payment_response_hash_key = payment_response_hash_key .ok_or(errors::WebhooksFlowError::MerchantConfigNotFound) .attach_printable("For stripe compatibility payment_response_hash_key is mandatory")?; let webhook_signature_payload = self .encode_to_string_of_json() .change_context(errors::WebhooksFlowError::OutgoingWebhookEncodingFailed) .attach_printable("failed encoding outgoing webhook payload")?; let new_signature_payload = format!("{timestamp}.{webhook_signature_payload}"); let v1 = hex::encode( common_utils::crypto::HmacSha256::sign_message( &common_utils::crypto::HmacSha256, payment_response_hash_key.as_ref(), new_signature_payload.as_bytes(), ) .change_context(errors::WebhooksFlowError::OutgoingWebhookSigningFailed) .attach_printable("Failed to sign the message")?, ); let t = timestamp; let signature = Some(format!("t={t},v1={v1}")); Ok(OutgoingWebhookPayloadWithSignature { payload: webhook_signature_payload.into(), signature, }) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 44, "total_crates": null }
fn_clm_router_add_webhook_header_-846307319803188573
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/compatibility/stripe/webhooks // Implementation of StripeOutgoingWebhook for OutgoingWebhookType fn add_webhook_header(header: &mut Vec<(String, Maskable<String>)>, signature: String) { header.push(( headers::STRIPE_COMPATIBLE_WEBHOOK_SIGNATURE.to_string(), signature.into(), )) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 26, "total_crates": null }
fn_clm_router_get_stripe_event_type_-846307319803188573
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/compatibility/stripe/webhooks fn get_stripe_event_type(event_type: api_models::enums::EventType) -> &'static str { match event_type { api_models::enums::EventType::PaymentSucceeded => "payment_intent.succeeded", api_models::enums::EventType::PaymentFailed => "payment_intent.payment_failed", api_models::enums::EventType::PaymentProcessing | api_models::enums::EventType::PaymentPartiallyAuthorized => "payment_intent.processing", api_models::enums::EventType::PaymentCancelled | api_models::enums::EventType::PaymentCancelledPostCapture | api_models::enums::EventType::PaymentExpired => "payment_intent.canceled", // the below are not really stripe compatible because stripe doesn't provide this api_models::enums::EventType::ActionRequired => "action.required", api_models::enums::EventType::RefundSucceeded => "refund.succeeded", api_models::enums::EventType::RefundFailed => "refund.failed", api_models::enums::EventType::DisputeOpened => "dispute.failed", api_models::enums::EventType::DisputeExpired => "dispute.expired", api_models::enums::EventType::DisputeAccepted => "dispute.accepted", api_models::enums::EventType::DisputeCancelled => "dispute.cancelled", api_models::enums::EventType::DisputeChallenged => "dispute.challenged", api_models::enums::EventType::DisputeWon => "dispute.won", api_models::enums::EventType::DisputeLost => "dispute.lost", api_models::enums::EventType::MandateActive => "mandate.active", api_models::enums::EventType::MandateRevoked => "mandate.revoked", // as per this doc https://stripe.com/docs/api/events/types#event_types-payment_intent.amount_capturable_updated api_models::enums::EventType::PaymentAuthorized => { "payment_intent.amount_capturable_updated" } // stripe treats partially captured payments as succeeded. api_models::enums::EventType::PaymentCaptured => "payment_intent.succeeded", api_models::enums::EventType::PayoutSuccess => "payout.paid", api_models::enums::EventType::PayoutFailed => "payout.failed", api_models::enums::EventType::PayoutInitiated => "payout.created", api_models::enums::EventType::PayoutCancelled => "payout.canceled", api_models::enums::EventType::PayoutProcessing => "payout.created", api_models::enums::EventType::PayoutExpired => "payout.failed", api_models::enums::EventType::PayoutReversed => "payout.reconciliation_completed", } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 0, "total_crates": null }
fn_clm_router_switch_7003199750199650938
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/compatibility/stripe/errors // Implementation of CustomersErrorResponse for ErrorSwitch<StripeErrorCode> fn switch(&self) -> StripeErrorCode { use StripeErrorCode as SC; match self { Self::CustomerRedacted => SC::CustomerRedacted, Self::InternalServerError => SC::InternalServerError, Self::InvalidRequestData { message } => SC::InvalidRequestData { message: message.clone(), }, Self::MandateActive => SC::MandateActive, Self::CustomerNotFound => SC::CustomerNotFound, Self::CustomerAlreadyExists => SC::DuplicateCustomer, } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 3082, "total_crates": null }
fn_clm_router_from_7003199750199650938
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/compatibility/stripe/errors // Implementation of StripeErrorCode for From<serde_qs::Error> fn from(item: serde_qs::Error) -> Self { match item { serde_qs::Error::Custom(s) => Self::SerdeQsError { error_message: s, param: None, }, serde_qs::Error::Parse(param, position) => Self::SerdeQsError { error_message: format!( "parsing failed with error: '{param}' at position: {position}" ), param: Some(param), }, serde_qs::Error::Unsupported => Self::SerdeQsError { error_message: "Given request format is not supported".to_owned(), param: None, }, serde_qs::Error::FromUtf8(_) => Self::SerdeQsError { error_message: "Failed to parse request to from utf-8".to_owned(), param: None, }, serde_qs::Error::Io(_) => Self::SerdeQsError { error_message: "Failed to parse request".to_owned(), param: None, }, serde_qs::Error::ParseInt(_) => Self::SerdeQsError { error_message: "Failed to parse integer in request".to_owned(), param: None, }, serde_qs::Error::Utf8(_) => Self::SerdeQsError { error_message: "Failed to convert utf8 to string".to_owned(), param: None, }, } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 2610, "total_crates": null }
fn_clm_router_fmt_7003199750199650938
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/compatibility/stripe/errors // Implementation of StripeErrorCode for ::core::fmt::Display fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result { write!( f, "{{\"error\": {}}}", serde_json::to_string(self).unwrap_or_else(|_| "API error response".to_string()) ) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 38, "total_crates": null }
fn_clm_router_status_code_7003199750199650938
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/compatibility/stripe/errors // Implementation of StripeErrorCode for actix_web::ResponseError fn status_code(&self) -> reqwest::StatusCode { use reqwest::StatusCode; match self { Self::Unauthorized | Self::PlatformUnauthorizedRequest => StatusCode::UNAUTHORIZED, Self::InvalidRequestUrl | Self::GenericNotFoundError { .. } => StatusCode::NOT_FOUND, Self::ParameterUnknown { .. } | Self::HyperswitchUnprocessableEntity { .. } => { StatusCode::UNPROCESSABLE_ENTITY } Self::ParameterMissing { .. } | Self::RefundAmountExceedsPaymentAmount { .. } | Self::PaymentIntentAuthenticationFailure { .. } | Self::PaymentIntentPaymentAttemptFailed { .. } | Self::ExpiredCard | Self::InvalidCardType | Self::DuplicateRefundRequest | Self::DuplicatePayout { .. } | Self::RefundNotFound | Self::CustomerNotFound | Self::ConfigNotFound | Self::DuplicateConfig | Self::ClientSecretNotFound | Self::PaymentNotFound | Self::PaymentMethodNotFound | Self::MerchantAccountNotFound | Self::MerchantConnectorAccountNotFound { .. } | Self::MerchantConnectorAccountDisabled | Self::MandateNotFound | Self::ApiKeyNotFound | Self::PayoutNotFound | Self::EventNotFound | Self::DuplicateMerchantAccount | Self::DuplicateMerchantConnectorAccount { .. } | Self::DuplicatePaymentMethod | Self::PaymentFailed | Self::VerificationFailed { .. } | Self::DisputeFailed { .. } | Self::MaximumRefundCount | Self::PaymentIntentInvalidParameter { .. } | Self::SerdeQsError { .. } | Self::InvalidRequestData { .. } | Self::InvalidWalletToken { .. } | Self::PreconditionFailed { .. } | Self::DuplicateMandate | Self::SuccessfulPaymentNotFound | Self::AddressNotFound | Self::ResourceIdNotFound | Self::PaymentIntentMandateInvalid { .. } | Self::PaymentIntentUnexpectedState { .. } | Self::DuplicatePayment { .. } | Self::GenericDuplicateError { .. } | Self::IncorrectConnectorNameGiven | Self::ResourceMissing { .. } | Self::FileValidationFailed | Self::MissingFile | Self::MissingFileContentType | Self::MissingFilePurpose | Self::MissingDisputeId | Self::FileNotFound | Self::FileNotAvailable | Self::FileProviderNotSupported | Self::CurrencyNotSupported { .. } | Self::DuplicateCustomer | Self::PaymentMethodUnactivated | Self::InvalidConnectorConfiguration { .. } | Self::CurrencyConversionFailed | Self::PaymentMethodDeleteFailed | Self::ExtendedCardInfoNotFound | Self::PlatformBadRequest | Self::LinkConfigurationError { .. } => StatusCode::BAD_REQUEST, Self::RefundFailed | Self::PayoutFailed | Self::PaymentLinkNotFound | Self::InternalServerError | Self::MandateActive | Self::CustomerRedacted | Self::WebhookProcessingError | Self::InvalidTenant | Self::ExternalVaultFailed | Self::AmountConversionFailed { .. } | Self::SubscriptionError { .. } => StatusCode::INTERNAL_SERVER_ERROR, Self::ReturnUrlUnavailable => StatusCode::SERVICE_UNAVAILABLE, Self::ExternalConnectorError { status_code, .. } => { StatusCode::from_u16(*status_code).unwrap_or(StatusCode::INTERNAL_SERVER_ERROR) } Self::IntegrityCheckFailed { .. } => StatusCode::INTERNAL_SERVER_ERROR, Self::PaymentBlockedError { code, .. } => { StatusCode::from_u16(*code).unwrap_or(StatusCode::OK) } Self::LockTimeout => StatusCode::LOCKED, Self::ProfileAcquirerNotFound => StatusCode::NOT_FOUND, } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 34, "total_crates": null }
fn_clm_router_error_response_7003199750199650938
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/compatibility/stripe/errors // Implementation of StripeErrorCode for actix_web::ResponseError fn error_response(&self) -> actix_web::HttpResponse { use actix_web::http::header; actix_web::HttpResponseBuilder::new(self.status_code()) .insert_header((header::CONTENT_TYPE, mime::APPLICATION_JSON)) .body(self.to_string()) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 30, "total_crates": null }
fn_clm_router_customer_update_-4414728657837261820
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/compatibility/stripe/customers pub async fn customer_update( state: web::Data<routes::AppState>, qs_config: web::Data<serde_qs::Config>, req: HttpRequest, path: web::Path<id_type::CustomerId>, form_payload: web::Bytes, ) -> HttpResponse { let payload: types::CustomerUpdateRequest = match qs_config.deserialize_bytes(&form_payload) { Ok(p) => p, Err(err) => { return api::log_and_return_error_response(report!(errors::StripeErrorCode::from(err))) } }; let customer_id = path.into_inner().clone(); let request = customer_types::CustomerUpdateRequest::from(payload); let request_internal = customer_types::CustomerUpdateRequestInternal { customer_id, request, }; let flow = Flow::CustomersUpdate; Box::pin(wrap::compatibility_api_wrap::< _, _, _, _, _, types::CustomerUpdateResponse, errors::StripeErrorCode, _, >( flow, state.into_inner(), &req, request_internal, |state, auth: auth::AuthenticationData, request_internal, _| { let merchant_context = domain::MerchantContext::NormalMerchant(Box::new( domain::Context(auth.merchant_account, auth.key_store), )); customers::update_customer(state, merchant_context, request_internal) }, &auth::HeaderAuth(auth::ApiKeyAuth { is_connected_allowed: false, is_platform_allowed: false, }), api_locking::LockAction::NotApplicable, )) .await }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 34, "total_crates": null }
fn_clm_router_customer_create_-4414728657837261820
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/compatibility/stripe/customers pub async fn customer_create( state: web::Data<routes::AppState>, qs_config: web::Data<serde_qs::Config>, req: HttpRequest, form_payload: web::Bytes, ) -> HttpResponse { let payload: types::CreateCustomerRequest = match qs_config.deserialize_bytes(&form_payload) { Ok(p) => p, Err(err) => { return api::log_and_return_error_response(report!(errors::StripeErrorCode::from(err))) } }; let create_cust_req: customer_types::CustomerRequest = payload.into(); let flow = Flow::CustomersCreate; Box::pin(wrap::compatibility_api_wrap::< _, _, _, _, _, types::CreateCustomerResponse, errors::StripeErrorCode, _, >( flow, state.into_inner(), &req, create_cust_req, |state, auth: auth::AuthenticationData, req, _| { let merchant_context = domain::MerchantContext::NormalMerchant(Box::new( domain::Context(auth.merchant_account, auth.key_store), )); customers::create_customer(state, merchant_context, req, None) }, &auth::HeaderAuth(auth::ApiKeyAuth { is_connected_allowed: false, is_platform_allowed: false, }), api_locking::LockAction::NotApplicable, )) .await }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 30, "total_crates": null }
fn_clm_router_list_customer_payment_method_api_-4414728657837261820
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/compatibility/stripe/customers pub async fn list_customer_payment_method_api( state: web::Data<routes::AppState>, req: HttpRequest, path: web::Path<id_type::CustomerId>, json_payload: web::Query<payment_methods::PaymentMethodListRequest>, ) -> HttpResponse { let payload = json_payload.into_inner(); let customer_id = path.into_inner(); let flow = Flow::CustomerPaymentMethodsList; Box::pin(wrap::compatibility_api_wrap::< _, _, _, _, _, types::CustomerPaymentMethodListResponse, errors::StripeErrorCode, _, >( flow, state.into_inner(), &req, payload, |state, auth: auth::AuthenticationData, req, _| { let merchant_context = domain::MerchantContext::NormalMerchant(Box::new( domain::Context(auth.merchant_account, auth.key_store), )); cards::do_list_customer_pm_fetch_customer_if_not_passed( state, merchant_context, Some(req), Some(&customer_id), None, ) }, &auth::HeaderAuth(auth::ApiKeyAuth { is_connected_allowed: false, is_platform_allowed: false, }), api_locking::LockAction::NotApplicable, )) .await }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 28, "total_crates": null }
fn_clm_router_customer_retrieve_-4414728657837261820
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/compatibility/stripe/customers pub async fn customer_retrieve( state: web::Data<routes::AppState>, req: HttpRequest, path: web::Path<id_type::CustomerId>, ) -> HttpResponse { let customer_id = path.into_inner(); let flow = Flow::CustomersRetrieve; Box::pin(wrap::compatibility_api_wrap::< _, _, _, _, _, types::CustomerRetrieveResponse, errors::StripeErrorCode, _, >( flow, state.into_inner(), &req, customer_id, |state, auth: auth::AuthenticationData, customer_id, _| { let merchant_context = domain::MerchantContext::NormalMerchant(Box::new( domain::Context(auth.merchant_account, auth.key_store), )); customers::retrieve_customer(state, merchant_context, None, customer_id) }, &auth::HeaderAuth(auth::ApiKeyAuth { is_connected_allowed: false, is_platform_allowed: false, }), api_locking::LockAction::NotApplicable, )) .await }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 26, "total_crates": null }
fn_clm_router_customer_delete_-4414728657837261820
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/compatibility/stripe/customers pub async fn customer_delete( state: web::Data<routes::AppState>, req: HttpRequest, path: web::Path<id_type::CustomerId>, ) -> HttpResponse { let customer_id = path.into_inner(); let flow = Flow::CustomersDelete; Box::pin(wrap::compatibility_api_wrap::< _, _, _, _, _, types::CustomerDeleteResponse, errors::StripeErrorCode, _, >( flow, state.into_inner(), &req, customer_id, |state, auth: auth::AuthenticationData, customer_id, _| { let merchant_context = domain::MerchantContext::NormalMerchant(Box::new( domain::Context(auth.merchant_account, auth.key_store), )); customers::delete_customer(state, merchant_context, customer_id) }, &auth::HeaderAuth(auth::ApiKeyAuth { is_connected_allowed: false, is_platform_allowed: false, }), api_locking::LockAction::NotApplicable, )) .await }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 26, "total_crates": null }
fn_clm_router_setup_intents_update_3055797208915248571
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/compatibility/stripe/setup_intents pub async fn setup_intents_update( state: web::Data<routes::AppState>, qs_config: web::Data<serde_qs::Config>, req: HttpRequest, form_payload: web::Bytes, path: web::Path<common_utils::id_type::PaymentId>, ) -> HttpResponse { let setup_id = path.into_inner(); let stripe_payload: types::StripeSetupIntentRequest = match qs_config .deserialize_bytes(&form_payload) { Ok(p) => p, Err(err) => { return api::log_and_return_error_response(report!(errors::StripeErrorCode::from(err))) } }; let mut payload: payment_types::PaymentsRequest = match payment_types::PaymentsRequest::try_from(stripe_payload) { Ok(req) => req, Err(err) => return api::log_and_return_error_response(err), }; payload.payment_id = Some(api_types::PaymentIdType::PaymentIntentId(setup_id)); let api_auth = auth::ApiKeyAuth { is_connected_allowed: false, is_platform_allowed: false, }; let (auth_type, auth_flow) = match auth::check_client_secret_and_get_auth(req.headers(), &payload, api_auth) { Ok(auth) => auth, Err(err) => return api::log_and_return_error_response(err), }; let flow = Flow::PaymentsUpdate; Box::pin(wrap::compatibility_api_wrap::< _, _, _, _, _, types::StripeSetupIntentResponse, errors::StripeErrorCode, _, >( flow, state.into_inner(), &req, payload, |state, auth, req, req_state| { let merchant_context = domain::MerchantContext::NormalMerchant(Box::new( domain::Context(auth.merchant_account, auth.key_store), )); payments::payments_core::< api_types::SetupMandate, api_types::PaymentsResponse, _, _, _, payments::PaymentData<api_types::SetupMandate>, >( state, req_state, merchant_context, None, payments::PaymentUpdate, req, auth_flow, payments::CallConnectorAction::Trigger, None, hyperswitch_domain_models::payments::HeaderPayload::default(), ) }, &*auth_type, api_locking::LockAction::NotApplicable, )) .await }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 40, "total_crates": null }
fn_clm_router_setup_intents_confirm_3055797208915248571
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/compatibility/stripe/setup_intents pub async fn setup_intents_confirm( state: web::Data<routes::AppState>, qs_config: web::Data<serde_qs::Config>, req: HttpRequest, form_payload: web::Bytes, path: web::Path<common_utils::id_type::PaymentId>, ) -> HttpResponse { let setup_id = path.into_inner(); let stripe_payload: types::StripeSetupIntentRequest = match qs_config .deserialize_bytes(&form_payload) { Ok(p) => p, Err(err) => { return api::log_and_return_error_response(report!(errors::StripeErrorCode::from(err))) } }; let mut payload: payment_types::PaymentsRequest = match payment_types::PaymentsRequest::try_from(stripe_payload) { Ok(req) => req, Err(err) => return api::log_and_return_error_response(err), }; payload.payment_id = Some(api_types::PaymentIdType::PaymentIntentId(setup_id)); payload.confirm = Some(true); let api_auth = auth::ApiKeyAuth { is_connected_allowed: false, is_platform_allowed: false, }; let (auth_type, auth_flow) = match auth::check_client_secret_and_get_auth(req.headers(), &payload, api_auth) { Ok(auth) => auth, Err(err) => return api::log_and_return_error_response(err), }; let flow = Flow::PaymentsConfirm; Box::pin(wrap::compatibility_api_wrap::< _, _, _, _, _, types::StripeSetupIntentResponse, errors::StripeErrorCode, _, >( flow, state.into_inner(), &req, payload, |state, auth, req, req_state| { let merchant_context = domain::MerchantContext::NormalMerchant(Box::new( domain::Context(auth.merchant_account, auth.key_store), )); payments::payments_core::< api_types::SetupMandate, api_types::PaymentsResponse, _, _, _, payments::PaymentData<api_types::SetupMandate>, >( state, req_state, merchant_context, None, payments::PaymentConfirm, req, auth_flow, payments::CallConnectorAction::Trigger, None, hyperswitch_domain_models::payments::HeaderPayload::default(), ) }, &*auth_type, api_locking::LockAction::NotApplicable, )) .await }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 40, "total_crates": null }
fn_clm_router_setup_intents_retrieve_3055797208915248571
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/compatibility/stripe/setup_intents pub async fn setup_intents_retrieve( state: web::Data<routes::AppState>, req: HttpRequest, path: web::Path<common_utils::id_type::PaymentId>, query_payload: web::Query<stripe_payment_types::StripePaymentRetrieveBody>, ) -> HttpResponse { let payload = payment_types::PaymentsRetrieveRequest { resource_id: api_types::PaymentIdType::PaymentIntentId(path.into_inner()), merchant_id: None, force_sync: true, connector: None, param: None, merchant_connector_details: None, client_secret: query_payload.client_secret.clone(), expand_attempts: None, expand_captures: None, all_keys_required: None, }; let api_auth = auth::ApiKeyAuth { is_connected_allowed: false, is_platform_allowed: false, }; let (auth_type, auth_flow) = match auth::check_client_secret_and_get_auth(req.headers(), &payload, api_auth) { Ok(auth) => auth, Err(err) => return api::log_and_return_error_response(report!(err)), }; let flow = Flow::PaymentsRetrieveForceSync; Box::pin(wrap::compatibility_api_wrap::< _, _, _, _, _, types::StripeSetupIntentResponse, errors::StripeErrorCode, _, >( flow, state.into_inner(), &req, payload, |state, auth, payload, req_state| { let merchant_context = domain::MerchantContext::NormalMerchant(Box::new( domain::Context(auth.merchant_account, auth.key_store), )); payments::payments_core::< api_types::PSync, api_types::PaymentsResponse, _, _, _, payments::PaymentData<api_types::PSync>, >( state, req_state, merchant_context, None, payments::PaymentStatus, payload, auth_flow, payments::CallConnectorAction::Trigger, None, hyperswitch_domain_models::payments::HeaderPayload::default(), ) }, &*auth_type, api_locking::LockAction::NotApplicable, )) .await }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 34, "total_crates": null }
fn_clm_router_setup_intents_create_3055797208915248571
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/compatibility/stripe/setup_intents pub async fn setup_intents_create( state: web::Data<routes::AppState>, qs_config: web::Data<serde_qs::Config>, req: HttpRequest, form_payload: web::Bytes, ) -> HttpResponse { let payload: types::StripeSetupIntentRequest = match qs_config.deserialize_bytes(&form_payload) { Ok(p) => p, Err(err) => { return api::log_and_return_error_response(report!(errors::StripeErrorCode::from(err))) } }; let create_payment_req: payment_types::PaymentsRequest = match payment_types::PaymentsRequest::try_from(payload) { Ok(req) => req, Err(err) => return api::log_and_return_error_response(err), }; let flow = Flow::PaymentsCreate; Box::pin(wrap::compatibility_api_wrap::< _, _, _, _, _, types::StripeSetupIntentResponse, errors::StripeErrorCode, _, >( flow, state.into_inner(), &req, create_payment_req, |state, auth: auth::AuthenticationData, req, req_state| { let merchant_context = domain::MerchantContext::NormalMerchant(Box::new( domain::Context(auth.merchant_account, auth.key_store), )); payments::payments_core::< api_types::SetupMandate, api_types::PaymentsResponse, _, _, _, payments::PaymentData<api_types::SetupMandate>, >( state, req_state, merchant_context, None, payments::PaymentCreate, req, api::AuthFlow::Merchant, payments::CallConnectorAction::Trigger, None, hyperswitch_domain_models::payments::HeaderPayload::default(), ) }, &auth::HeaderAuth(auth::ApiKeyAuth { is_connected_allowed: false, is_platform_allowed: false, }), api_locking::LockAction::NotApplicable, )) .await }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 32, "total_crates": null }
fn_clm_router_server_653111764937113120
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/compatibility/stripe/app // Inherent implementation for Mandates pub fn server(config: routes::AppState) -> Scope { web::scope("/payment_methods") .app_data(web::Data::new(config)) .service(web::resource("/{id}/detach").route(web::post().to(mandates::revoke_mandate))) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 220, "total_crates": null }
fn_clm_router_from_7532662773634923420
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/compatibility/stripe/customers/types // Implementation of CardDetails for From<api_types::CardDetailFromLocker> fn from(item: api_types::CardDetailFromLocker) -> Self { Self { country: item.issuer_country, last4: item.last4_digits, exp_month: item.expiry_month, exp_year: item.expiry_year, fingerprint: item.card_fingerprint, } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 2600, "total_crates": null }
fn_clm_router_new_-7658488023416701556
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/compatibility/stripe/payment_intents/types // Inherent implementation for Charges pub fn new() -> Self { Self { object: "list", data: vec![], has_more: false, total_count: 0, url: "http://placeholder".to_string(), } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 14465, "total_crates": null }
fn_clm_router_try_from_-7658488023416701556
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/compatibility/stripe/payment_intents/types // Implementation of payments::PaymentListConstraints for TryFrom<StripePaymentListConstraints> fn try_from(item: StripePaymentListConstraints) -> Result<Self, Self::Error> { Ok(Self { customer_id: item.customer, starting_after: item.starting_after, ending_before: item.ending_before, limit: item.limit, created: from_timestamp_to_datetime(item.created)?, created_lt: from_timestamp_to_datetime(item.created_lt)?, created_gt: from_timestamp_to_datetime(item.created_gt)?, created_lte: from_timestamp_to_datetime(item.created_lte)?, created_gte: from_timestamp_to_datetime(item.created_gte)?, }) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 2667, "total_crates": null }
fn_clm_router_from_-7658488023416701556
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/compatibility/stripe/payment_intents/types // Implementation of StripePaymentIntentListResponse for From<payments::PaymentListResponse> fn from(it: payments::PaymentListResponse) -> Self { Self { object: "list".to_string(), url: "/v1/payment_intents".to_string(), has_more: false, data: it.data.into_iter().map(Into::into).collect(), } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 2610, "total_crates": null }
fn_clm_router_foreign_try_from_-7658488023416701556
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/compatibility/stripe/payment_intents/types // Implementation of Option<payments::MandateData> for ForeignTryFrom<(Option<MandateData>, Option<String>)> fn foreign_try_from( (mandate_data, currency): (Option<MandateData>, Option<String>), ) -> errors::RouterResult<Self> { let currency = currency .ok_or( errors::ApiErrorResponse::MissingRequiredField { field_name: "currency", } .into(), ) .and_then(|c| { c.to_uppercase().parse_enum("currency").change_context( errors::ApiErrorResponse::InvalidDataValue { field_name: "currency", }, ) })?; let mandate_data = mandate_data.map(|mandate| payments::MandateData { mandate_type: match mandate.mandate_type { Some(item) => match item { StripeMandateType::SingleUse => Some(payments::MandateType::SingleUse( payments::MandateAmountData { amount: MinorUnit::new(mandate.amount.unwrap_or_default()), currency, start_date: mandate.start_date, end_date: mandate.end_date, metadata: None, }, )), StripeMandateType::MultiUse => Some(payments::MandateType::MultiUse(Some( payments::MandateAmountData { amount: MinorUnit::new(mandate.amount.unwrap_or_default()), currency, start_date: mandate.start_date, end_date: mandate.end_date, metadata: None, }, ))), }, None => Some(payments::MandateType::MultiUse(Some( payments::MandateAmountData { amount: MinorUnit::new(mandate.amount.unwrap_or_default()), currency, start_date: mandate.start_date, end_date: mandate.end_date, metadata: None, }, ))), }, customer_acceptance: Some(common_payments_types::CustomerAcceptance { acceptance_type: common_payments_types::AcceptanceType::Online, accepted_at: mandate.customer_acceptance.accepted_at, online: mandate.customer_acceptance.online.map(|online| { common_payments_types::OnlineMandate { ip_address: Some(online.ip_address), user_agent: online.user_agent, } }), }), update_mandate_id: None, }); Ok(mandate_data) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 462, "total_crates": null }
fn_clm_router_foreign_from_-7658488023416701556
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/compatibility/stripe/payment_intents/types // Implementation of api_models::enums::AuthenticationType for ForeignFrom<Option<Request3DS>> fn foreign_from(item: Option<Request3DS>) -> Self { match item.unwrap_or_default() { Request3DS::Automatic => Self::NoThreeDs, Request3DS::Any => Self::ThreeDs, } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 214, "total_crates": null }
fn_clm_router_try_from_1459353392353505180
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/compatibility/stripe/setup_intents/types // Implementation of payments::PaymentListConstraints for TryFrom<StripePaymentListConstraints> fn try_from(item: StripePaymentListConstraints) -> Result<Self, Self::Error> { Ok(Self { customer_id: item.customer, starting_after: item.starting_after, ending_before: item.ending_before, limit: item.limit, created: from_timestamp_to_datetime(item.created)?, created_lt: from_timestamp_to_datetime(item.created_lt)?, created_gt: from_timestamp_to_datetime(item.created_gt)?, created_lte: from_timestamp_to_datetime(item.created_lte)?, created_gte: from_timestamp_to_datetime(item.created_gte)?, }) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 2667, "total_crates": null }
fn_clm_router_from_1459353392353505180
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/compatibility/stripe/setup_intents/types // Implementation of StripeSetupIntentResponse for From<payments::PaymentsResponse> fn from(resp: payments::PaymentsResponse) -> Self { Self { object: "setup_intent".to_owned(), status: StripeSetupStatus::from(resp.status), client_secret: resp.client_secret, charges: payment_intent::Charges::new(), created: resp.created, customer: resp.customer_id, metadata: resp.metadata, id: resp.payment_id, refunds: resp .refunds .map(|a| a.into_iter().map(Into::into).collect()), mandate_id: resp.mandate_id, next_action: into_stripe_next_action(resp.next_action, resp.return_url), last_payment_error: resp.error_code.map(|code| -> LastPaymentError { LastPaymentError { charge: None, code: Some(code.to_owned()), decline_code: None, message: resp .error_message .unwrap_or_else(|| consts::NO_ERROR_MESSAGE.to_string()), param: None, payment_method: StripePaymentMethod { payment_method_id: "place_holder_id".to_string(), object: "payment_method", card: None, created: u64::try_from(date_time::now().assume_utc().unix_timestamp()) .unwrap_or_default(), method_type: "card".to_string(), livemode: false, }, error_type: code, } }), connector_transaction_id: resp.connector_transaction_id, } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 2638, "total_crates": null }
fn_clm_router_from_timestamp_to_datetime_1459353392353505180
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/compatibility/stripe/setup_intents/types fn from_timestamp_to_datetime( time: Option<i64>, ) -> Result<Option<time::PrimitiveDateTime>, errors::ApiErrorResponse> { if let Some(time) = time { let time = time::OffsetDateTime::from_unix_timestamp(time).map_err(|err| { logger::error!("Error: from_unix_timestamp: {}", err); errors::ApiErrorResponse::InvalidRequestData { message: "Error while converting timestamp".to_string(), } })?; Ok(Some(time::PrimitiveDateTime::new(time.date(), time.time()))) } else { Ok(None) } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 42, "total_crates": null }
fn_clm_router_into_stripe_next_action_1459353392353505180
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/compatibility/stripe/setup_intents/types pub(crate) fn into_stripe_next_action( next_action: Option<payments::NextActionData>, return_url: Option<String>, ) -> Option<StripeNextAction> { next_action.map(|next_action_data| match next_action_data { payments::NextActionData::RedirectToUrl { redirect_to_url } => { StripeNextAction::RedirectToUrl { redirect_to_url: RedirectUrl { return_url, url: Some(redirect_to_url), }, } } payments::NextActionData::RedirectInsidePopup { popup_url, .. } => { StripeNextAction::RedirectToUrl { redirect_to_url: RedirectUrl { return_url, url: Some(popup_url), }, } } payments::NextActionData::DisplayBankTransferInformation { bank_transfer_steps_and_charges_details, } => StripeNextAction::DisplayBankTransferInformation { bank_transfer_steps_and_charges_details, }, payments::NextActionData::ThirdPartySdkSessionToken { session_token } => { StripeNextAction::ThirdPartySdkSessionToken { session_token } } payments::NextActionData::QrCodeInformation { image_data_url, display_to_timestamp, qr_code_url, display_text, border_color, } => StripeNextAction::QrCodeInformation { image_data_url, display_to_timestamp, qr_code_url, display_text, border_color, }, payments::NextActionData::FetchQrCodeInformation { qr_code_fetch_url } => { StripeNextAction::FetchQrCodeInformation { qr_code_fetch_url } } payments::NextActionData::DisplayVoucherInformation { voucher_details } => { StripeNextAction::DisplayVoucherInformation { voucher_details } } payments::NextActionData::WaitScreenInformation { display_from_timestamp, display_to_timestamp, poll_config: _, } => StripeNextAction::WaitScreenInformation { display_from_timestamp, display_to_timestamp, poll_config: None, }, payments::NextActionData::ThreeDsInvoke { .. } => StripeNextAction::RedirectToUrl { redirect_to_url: RedirectUrl { return_url: None, url: None, }, }, payments::NextActionData::InvokeSdkClient { next_action_data } => { StripeNextAction::InvokeSdkClient { next_action_data } } payments::NextActionData::CollectOtp { consent_data_required, } => StripeNextAction::CollectOtp { consent_data_required, }, payments::NextActionData::InvokeHiddenIframe { iframe_data } => { StripeNextAction::InvokeHiddenIframe { iframe_data } } payments::NextActionData::SdkUpiIntentInformation { sdk_uri } => { StripeNextAction::SdkUpiIntentInformation { sdk_uri } } }) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 15, "total_crates": null }
fn_clm_router_default_limit_1459353392353505180
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/compatibility/stripe/setup_intents/types fn default_limit() -> u32 { 10 }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 0, "total_crates": null }
fn_clm_router_from_-6304703605678882654
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/compatibility/stripe/refunds/types // Implementation of StripeRefundResponse for From<refunds::RefundResponse> fn from(res: refunds::RefundResponse) -> Self { Self { id: res.refund_id, amount: res.amount.get_amount_as_i64(), currency: res.currency.to_ascii_lowercase(), payment_intent: res.payment_id, status: res.status.into(), created: res.created_at.map(|t| t.assume_utc().unix_timestamp()), metadata: res .metadata .unwrap_or_else(|| masking::Secret::new(serde_json::json!({}))), } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 2616, "total_crates": null }
fn_clm_router_is_update_required_-5953297332549155606
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/payment_methods // Inherent implementation for NetworkTokenRequestorData pub fn is_update_required( &self, data_stored_in_vault: api::payment_methods::CardDetailFromLocker, ) -> bool { //if the expiry year and month in the vault are not the same as the ones in the requestor data, //then we need to update the vault data with the updated expiry year and month. !((data_stored_in_vault.expiry_year.unwrap_or_default() == self.expiry_year) && (data_stored_in_vault.expiry_month.unwrap_or_default() == self.expiry_month)) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 40, "total_crates": null }
fn_clm_router_get_vaulting_request_url_-5953297332549155606
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/payment_methods // Implementation of VaultDelete for VaultingInterface fn get_vaulting_request_url() -> &'static str { consts::VAULT_DELETE_REQUEST_URL }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 11, "total_crates": null }
fn_clm_router_get_vaulting_flow_name_-5953297332549155606
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/payment_methods // Implementation of VaultDelete for VaultingInterface fn get_vaulting_flow_name() -> &'static str { consts::VAULT_DELETE_FLOW_TYPE }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 11, "total_crates": null }
fn_clm_router_foreign_try_from_3313904630807326268
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/connector_transformers // Implementation of common_enums::RoutableConnectors for ForeignTryFrom<api_enums::Connector> fn foreign_try_from(from: api_enums::Connector) -> Result<Self, Self::Error> { Ok(match from { api_enums::Connector::Aci => Self::Aci, api_enums::Connector::Adyen => Self::Adyen, api_enums::Connector::Affirm => Self::Affirm, api_enums::Connector::Adyenplatform => Self::Adyenplatform, api_enums::Connector::Airwallex => Self::Airwallex, api_enums::Connector::Amazonpay => Self::Amazonpay, api_enums::Connector::Archipel => Self::Archipel, api_enums::Connector::Authipay => Self::Authipay, api_enums::Connector::Authorizedotnet => Self::Authorizedotnet, api_enums::Connector::Bambora => Self::Bambora, api_enums::Connector::Bamboraapac => Self::Bamboraapac, api_enums::Connector::Bankofamerica => Self::Bankofamerica, api_enums::Connector::Barclaycard => Self::Barclaycard, api_enums::Connector::Billwerk => Self::Billwerk, api_enums::Connector::Bitpay => Self::Bitpay, api_enums::Connector::Bluesnap => Self::Bluesnap, api_enums::Connector::Blackhawknetwork => Self::Blackhawknetwork, api_enums::Connector::Calida => Self::Calida, api_enums::Connector::Boku => Self::Boku, api_enums::Connector::Braintree => Self::Braintree, api_enums::Connector::Breadpay => Self::Breadpay, api_enums::Connector::Cardinal => { Err(common_utils::errors::ValidationError::InvalidValue { message: "cardinal is not a routable connector".to_string(), })? } api_enums::Connector::Cashtocode => Self::Cashtocode, api_enums::Connector::Celero => Self::Celero, api_enums::Connector::Chargebee => Self::Chargebee, api_enums::Connector::Checkbook => Self::Checkbook, api_enums::Connector::Checkout => Self::Checkout, api_enums::Connector::Coinbase => Self::Coinbase, api_enums::Connector::Coingate => Self::Coingate, api_enums::Connector::Cryptopay => Self::Cryptopay, api_enums::Connector::Custombilling => Self::Custombilling, api_enums::Connector::CtpVisa => { Err(common_utils::errors::ValidationError::InvalidValue { message: "ctp visa is not a routable connector".to_string(), })? } api_enums::Connector::CtpMastercard => { Err(common_utils::errors::ValidationError::InvalidValue { message: "ctp mastercard is not a routable connector".to_string(), })? } api_enums::Connector::Cybersource => Self::Cybersource, api_enums::Connector::Datatrans => Self::Datatrans, api_enums::Connector::Deutschebank => Self::Deutschebank, api_enums::Connector::Digitalvirgo => Self::Digitalvirgo, api_enums::Connector::Dlocal => Self::Dlocal, api_enums::Connector::Dwolla => Self::Dwolla, api_enums::Connector::Ebanx => Self::Ebanx, api_enums::Connector::Elavon => Self::Elavon, api_enums::Connector::Facilitapay => Self::Facilitapay, api_enums::Connector::Finix => Self::Finix, api_enums::Connector::Fiserv => Self::Fiserv, api_enums::Connector::Fiservemea => Self::Fiservemea, api_enums::Connector::Fiuu => Self::Fiuu, api_enums::Connector::Flexiti => Self::Flexiti, api_enums::Connector::Forte => Self::Forte, api_enums::Connector::Getnet => Self::Getnet, api_enums::Connector::Gigadat => Self::Gigadat, api_enums::Connector::Globalpay => Self::Globalpay, api_enums::Connector::Globepay => Self::Globepay, api_enums::Connector::Gocardless => Self::Gocardless, api_enums::Connector::Gpayments => { Err(common_utils::errors::ValidationError::InvalidValue { message: "gpayments is not a routable connector".to_string(), })? } api_enums::Connector::Hipay => Self::Hipay, api_enums::Connector::Helcim => Self::Helcim, api_enums::Connector::HyperswitchVault => { Err(common_utils::errors::ValidationError::InvalidValue { message: "Hyperswitch Vault is not a routable connector".to_string(), })? } api_enums::Connector::Iatapay => Self::Iatapay, api_enums::Connector::Inespay => Self::Inespay, api_enums::Connector::Itaubank => Self::Itaubank, api_enums::Connector::Jpmorgan => Self::Jpmorgan, api_enums::Connector::Juspaythreedsserver => { Err(common_utils::errors::ValidationError::InvalidValue { message: "juspaythreedsserver is not a routable connector".to_string(), })? } api_enums::Connector::Klarna => Self::Klarna, api_enums::Connector::Loonio => Self::Loonio, api_enums::Connector::Mifinity => Self::Mifinity, api_enums::Connector::Mollie => Self::Mollie, api_enums::Connector::Moneris => Self::Moneris, api_enums::Connector::Multisafepay => Self::Multisafepay, api_enums::Connector::Netcetera => { Err(common_utils::errors::ValidationError::InvalidValue { message: "netcetera is not a routable connector".to_string(), })? } api_enums::Connector::Nexinets => Self::Nexinets, api_enums::Connector::Nexixpay => Self::Nexixpay, api_enums::Connector::Nmi => Self::Nmi, api_enums::Connector::Nomupay => Self::Nomupay, api_enums::Connector::Noon => Self::Noon, api_enums::Connector::Nordea => Self::Nordea, api_enums::Connector::Novalnet => Self::Novalnet, api_enums::Connector::Nuvei => Self::Nuvei, api_enums::Connector::Opennode => Self::Opennode, api_enums::Connector::Paybox => Self::Paybox, api_enums::Connector::Payload => Self::Payload, api_enums::Connector::Payme => Self::Payme, api_enums::Connector::Payone => Self::Payone, api_enums::Connector::Paypal => Self::Paypal, api_enums::Connector::Paysafe => Self::Paysafe, api_enums::Connector::Paystack => Self::Paystack, api_enums::Connector::Payu => Self::Payu, api_enums::Connector::Peachpayments => Self::Peachpayments, api_models::enums::Connector::Placetopay => Self::Placetopay, api_enums::Connector::Plaid => Self::Plaid, api_enums::Connector::Powertranz => Self::Powertranz, api_enums::Connector::Prophetpay => Self::Prophetpay, api_enums::Connector::Rapyd => Self::Rapyd, api_enums::Connector::Razorpay => Self::Razorpay, api_enums::Connector::Recurly => Self::Recurly, api_enums::Connector::Redsys => Self::Redsys, api_enums::Connector::Santander => Self::Santander, api_enums::Connector::Shift4 => Self::Shift4, api_enums::Connector::Silverflow => Self::Silverflow, api_enums::Connector::Signifyd => { Err(common_utils::errors::ValidationError::InvalidValue { message: "signifyd is not a routable connector".to_string(), })? } api_enums::Connector::Riskified => { Err(common_utils::errors::ValidationError::InvalidValue { message: "riskified is not a routable connector".to_string(), })? } api_enums::Connector::Square => Self::Square, api_enums::Connector::Stax => Self::Stax, api_enums::Connector::Stripe => Self::Stripe, api_enums::Connector::Stripebilling => Self::Stripebilling, // api_enums::Connector::Thunes => Self::Thunes, api_enums::Connector::Tesouro => Self::Tesouro, api_enums::Connector::Tokenex => { Err(common_utils::errors::ValidationError::InvalidValue { message: "Tokenex is not a routable connector".to_string(), })? } api_enums::Connector::Tokenio => Self::Tokenio, api_enums::Connector::Trustpay => Self::Trustpay, api_enums::Connector::Trustpayments => Self::Trustpayments, api_enums::Connector::Tsys => Self::Tsys, // api_enums::Connector::UnifiedAuthenticationService => { // Self::UnifiedAuthenticationService // } api_enums::Connector::Vgs => { Err(common_utils::errors::ValidationError::InvalidValue { message: "Vgs is not a routable connector".to_string(), })? } api_enums::Connector::Volt => Self::Volt, api_enums::Connector::Wellsfargo => Self::Wellsfargo, // api_enums::Connector::Wellsfargopayout => Self::Wellsfargopayout, api_enums::Connector::Wise => Self::Wise, api_enums::Connector::Worldline => Self::Worldline, api_enums::Connector::Worldpay => Self::Worldpay, api_enums::Connector::Worldpayvantiv => Self::Worldpayvantiv, api_enums::Connector::Worldpayxml => Self::Worldpayxml, api_enums::Connector::Xendit => Self::Xendit, api_enums::Connector::Zen => Self::Zen, api_enums::Connector::Zsl => Self::Zsl, #[cfg(feature = "dummy_connector")] api_enums::Connector::DummyBillingConnector => { Err(common_utils::errors::ValidationError::InvalidValue { message: "stripe_billing_test is not a routable connector".to_string(), })? } #[cfg(feature = "dummy_connector")] api_enums::Connector::DummyConnector1 => Self::DummyConnector1, #[cfg(feature = "dummy_connector")] api_enums::Connector::DummyConnector2 => Self::DummyConnector2, #[cfg(feature = "dummy_connector")] api_enums::Connector::DummyConnector3 => Self::DummyConnector3, #[cfg(feature = "dummy_connector")] api_enums::Connector::DummyConnector4 => Self::DummyConnector4, #[cfg(feature = "dummy_connector")] api_enums::Connector::DummyConnector5 => Self::DummyConnector5, #[cfg(feature = "dummy_connector")] api_enums::Connector::DummyConnector6 => Self::DummyConnector6, #[cfg(feature = "dummy_connector")] api_enums::Connector::DummyConnector7 => Self::DummyConnector7, api_enums::Connector::Threedsecureio => { Err(common_utils::errors::ValidationError::InvalidValue { message: "threedsecureio is not a routable connector".to_string(), })? } api_enums::Connector::Taxjar => { Err(common_utils::errors::ValidationError::InvalidValue { message: "Taxjar is not a routable connector".to_string(), })? } api_enums::Connector::Phonepe => Self::Phonepe, api_enums::Connector::Paytm => Self::Paytm, }) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 456, "total_crates": null }
fn_clm_router_try_from_-3468684132368773582
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/transformers // Implementation of api_models::webhook_events::EventRetrieveResponse for TryFrom<domain::Event> fn try_from(item: domain::Event) -> Result<Self, Self::Error> { use crate::utils::OptionExt; // We only allow retrieving events with all required fields in `EventListItemResponse`, and // `request` and `response` populated. // We cannot retrieve events with only some of these fields populated. let event_information = api_models::webhook_events::EventListItemResponse::try_from(item.clone())?; let request = item .request .get_required_value("request") .change_context(errors::ApiErrorResponse::InternalServerError)? .peek() .parse_struct("OutgoingWebhookRequestContent") .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to parse webhook event request information")?; let response = item .response .get_required_value("response") .change_context(errors::ApiErrorResponse::InternalServerError)? .peek() .parse_struct("OutgoingWebhookResponseContent") .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to parse webhook event response information")?; Ok(Self { event_information, request, response, delivery_attempt: item.delivery_attempt, }) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 2685, "total_crates": null }
fn_clm_router_from_-3468684132368773582
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/transformers // Implementation of payments::AddressDetails for From<domain::Address> fn from(addr: domain::Address) -> Self { Self { city: addr.city, country: addr.country, line1: addr.line1.map(Encryptable::into_inner), line2: addr.line2.map(Encryptable::into_inner), line3: addr.line3.map(Encryptable::into_inner), zip: addr.zip.map(Encryptable::into_inner), state: addr.state.map(Encryptable::into_inner), first_name: addr.first_name.map(Encryptable::into_inner), last_name: addr.last_name.map(Encryptable::into_inner), origin_zip: addr.origin_zip.map(Encryptable::into_inner), } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 2616, "total_crates": null }
fn_clm_router_foreign_try_from_-3468684132368773582
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/transformers // Implementation of api_types::webhook_events::EventListConstraintsInternal for ForeignTryFrom<api_types::webhook_events::EventListConstraints> fn foreign_try_from( item: api_types::webhook_events::EventListConstraints, ) -> Result<Self, Self::Error> { if item.object_id.is_some() && (item.created_after.is_some() || item.created_before.is_some() || item.limit.is_some() || item.offset.is_some() || item.event_classes.is_some() || item.event_types.is_some()) { return Err(report!(errors::ApiErrorResponse::PreconditionFailed { message: "Either only `object_id` must be specified, or one or more of \ `created_after`, `created_before`, `limit`, `offset`, `event_classes` and `event_types` must be specified" .to_string() })); } match item.object_id { Some(object_id) => Ok(Self::ObjectIdFilter { object_id }), None => Ok(Self::GenericFilter { created_after: item.created_after, created_before: item.created_before, limit: item.limit.map(i64::from), offset: item.offset.map(i64::from), event_classes: item.event_classes, event_types: item.event_types, is_delivered: item.is_delivered, }), } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 446, "total_crates": null }
fn_clm_router_foreign_from_-3468684132368773582
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/transformers // Implementation of payments::AdditionalCardInfo for ForeignFrom<&revenue_recovery_redis_operation::PaymentProcessorTokenStatus> fn foreign_from(value: &revenue_recovery_redis_operation::PaymentProcessorTokenStatus) -> Self { let card_info = &value.payment_processor_token_details; // TODO! All other card info fields needs to be populated in redis. Self { card_issuer: card_info.card_issuer.to_owned(), card_network: card_info.card_network.to_owned(), card_type: card_info.card_type.to_owned(), card_issuing_country: None, bank_code: None, last4: card_info.last_four_digits.to_owned(), card_isin: None, card_extended_bin: None, card_exp_month: card_info.expiry_month.to_owned(), card_exp_year: card_info.expiry_year.to_owned(), card_holder_name: None, payment_checks: None, authentication_data: None, is_regulated: None, signature_network: None, } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 224, "total_crates": null }
fn_clm_router_foreign_into_-3468684132368773582
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/transformers // Implementation of F for ForeignInto<T> fn foreign_into(self) -> T { T::foreign_from(self) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 214, "total_crates": null }
fn_clm_router_new_5057633511689095702
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/api // Inherent implementation for SessionConnectorData pub fn new( payment_method_sub_type: api_enums::PaymentMethodType, connector: ConnectorData, business_sub_label: Option<String>, payment_method_type: api_enums::PaymentMethod, ) -> Self { Self { payment_method_sub_type, connector, business_sub_label, payment_method_type, } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 14463, "total_crates": null }
fn_clm_router_from_5057633511689095702
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/api // Implementation of ConnectorRoutingData for From<ConnectorData> fn from(connector_data: ConnectorData) -> Self { Self { connector_data, network: None, action_type: None, } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 2600, "total_crates": null }
fn_clm_router_foreign_try_from_5057633511689095702
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/api // Implementation of RoutableConnectorChoice for ForeignTryFrom<ConnectorData> fn foreign_try_from(from: ConnectorData) -> Result<Self, Self::Error> { match RoutableConnectors::foreign_try_from(from.connector_name) { Ok(connector) => Ok(Self { choice_kind: api_routing::RoutableChoiceKind::FullStruct, connector, merchant_connector_id: from.merchant_connector_id, }), Err(e) => Err(common_utils::errors::ValidationError::InvalidValue { message: format!("This is not a routable connector: {e:?}"), })?, } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 430, "total_crates": null }
fn_clm_router_get_connector_by_name_5057633511689095702
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/api // Inherent implementation for TaxCalculateConnectorData pub fn get_connector_by_name(name: &str) -> CustomResult<Self, errors::ApiErrorResponse> { let connector_name = enums::TaxConnectors::from_str(name) .change_context(errors::ApiErrorResponse::IncorrectConnectorNameGiven) .attach_printable_lazy(|| format!("unable to parse connector: {name}"))?; let connector = Self::convert_connector(connector_name)?; Ok(Self { connector, connector_name, }) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 188, "total_crates": null }
fn_clm_router_convert_connector_5057633511689095702
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/api // Inherent implementation for TaxCalculateConnectorData fn convert_connector( connector_name: enums::TaxConnectors, ) -> CustomResult<ConnectorEnum, errors::ApiErrorResponse> { match connector_name { enums::TaxConnectors::Taxjar => { Ok(ConnectorEnum::Old(Box::new(connector::Taxjar::new()))) } } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 44, "total_crates": null }
fn_clm_router_get_connector_by_name_5928816163238806951
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/pm_auth // Implementation of PaymentAuthConnectorData for PaymentAuthConnectorDataExt fn get_connector_by_name(name: &str) -> errors::CustomResult<Self, ApiErrorResponse> { let connector_name = pm_auth_types::PaymentMethodAuthConnectors::from_str(name) .change_context(ApiErrorResponse::IncorrectConnectorNameGiven) .attach_printable_lazy(|| { format!("unable to parse connector: {:?}", name.to_string()) })?; let connector = Self::convert_connector(connector_name.clone())?; Ok(Self { connector, connector_name, }) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 180, "total_crates": null }
fn_clm_router_convert_connector_5928816163238806951
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/pm_auth // Implementation of PaymentAuthConnectorData for PaymentAuthConnectorDataExt fn convert_connector( connector_name: pm_auth_types::PaymentMethodAuthConnectors, ) -> errors::CustomResult<BoxedPaymentAuthConnector, ApiErrorResponse> { match connector_name { pm_auth_types::PaymentMethodAuthConnectors::Plaid => Ok(Box::new(&plaid::Plaid)), } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 40, "total_crates": null }
fn_clm_router_filter_by_constraints_6516686473793249018
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/storage/dispute // Implementation of Dispute for DisputeDbExt async fn filter_by_constraints( conn: &PgPooledConn, merchant_id: &common_utils::id_type::MerchantId, dispute_list_constraints: &disputes::DisputeListConstraints, ) -> CustomResult<Vec<Self>, errors::DatabaseError> { let mut filter = <Self as HasTable>::table() .filter(dsl::merchant_id.eq(merchant_id.to_owned())) .order(dsl::modified_at.desc()) .into_boxed(); let mut search_by_payment_or_dispute_id = false; if let (Some(payment_id), Some(dispute_id)) = ( &dispute_list_constraints.payment_id, &dispute_list_constraints.dispute_id, ) { search_by_payment_or_dispute_id = true; filter = filter.filter( dsl::payment_id .eq(payment_id.to_owned()) .or(dsl::dispute_id.eq(dispute_id.to_owned())), ); }; if !search_by_payment_or_dispute_id { if let Some(payment_id) = &dispute_list_constraints.payment_id { filter = filter.filter(dsl::payment_id.eq(payment_id.to_owned())); }; } if !search_by_payment_or_dispute_id { if let Some(dispute_id) = &dispute_list_constraints.dispute_id { filter = filter.filter(dsl::dispute_id.eq(dispute_id.clone())); }; } if let Some(time_range) = dispute_list_constraints.time_range { filter = filter.filter(dsl::created_at.ge(time_range.start_time)); if let Some(end_time) = time_range.end_time { filter = filter.filter(dsl::created_at.le(end_time)); } } if let Some(profile_id) = &dispute_list_constraints.profile_id { filter = filter.filter(dsl::profile_id.eq_any(profile_id.clone())); } if let Some(connector_list) = &dispute_list_constraints.connector { filter = filter.filter(dsl::connector.eq_any(connector_list.clone())); } if let Some(reason) = &dispute_list_constraints.reason { filter = filter.filter(dsl::connector_reason.eq(reason.clone())); } if let Some(dispute_stage) = &dispute_list_constraints.dispute_stage { filter = filter.filter(dsl::dispute_stage.eq_any(dispute_stage.clone())); } if let Some(dispute_status) = &dispute_list_constraints.dispute_status { filter = filter.filter(dsl::dispute_status.eq_any(dispute_status.clone())); } if let Some(currency_list) = &dispute_list_constraints.currency { filter = filter.filter(dsl::dispute_currency.eq_any(currency_list.clone())); } if let Some(merchant_connector_id) = &dispute_list_constraints.merchant_connector_id { filter = filter.filter(dsl::merchant_connector_id.eq(merchant_connector_id.clone())) } if let Some(limit) = dispute_list_constraints.limit { filter = filter.limit(limit.into()); } if let Some(offset) = dispute_list_constraints.offset { filter = filter.offset(offset.into()); } logger::debug!(query = %diesel::debug_query::<diesel::pg::Pg, _>(&filter).to_string()); db_metrics::track_database_call::<<Self as HasTable>::Table, _, _>( filter.get_results_async(conn), db_metrics::DatabaseOperation::Filter, ) .await .change_context(errors::DatabaseError::NotFound) .attach_printable_lazy(|| "Error filtering records by predicate") }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 113, "total_crates": null }
fn_clm_router_get_dispute_status_with_count_6516686473793249018
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/storage/dispute // Implementation of Dispute for DisputeDbExt async fn get_dispute_status_with_count( conn: &PgPooledConn, merchant_id: &common_utils::id_type::MerchantId, profile_id_list: Option<Vec<common_utils::id_type::ProfileId>>, time_range: &common_utils::types::TimeRange, ) -> CustomResult<Vec<(common_enums::DisputeStatus, i64)>, errors::DatabaseError> { let mut query = <Self as HasTable>::table() .group_by(dsl::dispute_status) .select((dsl::dispute_status, diesel::dsl::count_star())) .filter(dsl::merchant_id.eq(merchant_id.to_owned())) .into_boxed(); if let Some(profile_id) = profile_id_list { query = query.filter(dsl::profile_id.eq_any(profile_id)); } query = query.filter(dsl::created_at.ge(time_range.start_time)); query = match time_range.end_time { Some(ending_at) => query.filter(dsl::created_at.le(ending_at)), None => query, }; logger::debug!(query = %diesel::debug_query::<diesel::pg::Pg,_>(&query).to_string()); db_metrics::track_database_call::<<Self as HasTable>::Table, _, _>( query.get_results_async::<(common_enums::DisputeStatus, i64)>(conn), db_metrics::DatabaseOperation::Count, ) .await .change_context(errors::DatabaseError::NotFound) .attach_printable_lazy(|| "Error filtering records by predicate") }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 46, "total_crates": null }
fn_clm_router_get_total_amount_9097859931397791850
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/storage/payment_attempt // Implementation of PaymentAttempt for PaymentAttemptExt fn get_total_amount(&self) -> MinorUnit { todo!() }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 170, "total_crates": null }
fn_clm_router_test_payment_attempt_mandate_field_9097859931397791850
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/storage/payment_attempt /// Example of unit test /// Kind of test: state-based testing async fn test_payment_attempt_mandate_field() { let state = create_single_connection_test_transaction_pool().await; let uuid = Uuid::new_v4().to_string(); let merchant_id = common_utils::id_type::MerchantId::try_from(std::borrow::Cow::from("merchant1")) .unwrap(); let payment_id = common_utils::id_type::PaymentId::generate_test_payment_id_for_sample_data(); let current_time = common_utils::date_time::now(); let connector = types::Connector::DummyConnector1.to_string(); let payment_attempt = PaymentAttemptNew { payment_id: payment_id.clone(), merchant_id: merchant_id.clone(), connector: Some(connector), created_at: current_time.into(), modified_at: current_time.into(), mandate_id: Some("man_121212".to_string()), attempt_id: uuid.clone(), status: Default::default(), net_amount: Default::default(), currency: Default::default(), save_to_locker: Default::default(), error_message: Default::default(), offer_amount: Default::default(), payment_method_id: Default::default(), payment_method: Default::default(), capture_method: Default::default(), capture_on: Default::default(), confirm: Default::default(), authentication_type: Default::default(), last_synced: Default::default(), cancellation_reason: Default::default(), amount_to_capture: Default::default(), browser_info: Default::default(), payment_token: Default::default(), error_code: Default::default(), connector_metadata: Default::default(), payment_experience: Default::default(), payment_method_type: Default::default(), payment_method_data: Default::default(), business_sub_label: Default::default(), straight_through_algorithm: Default::default(), preprocessing_step_id: Default::default(), mandate_details: Default::default(), error_reason: Default::default(), connector_response_reference_id: Default::default(), multiple_capture_count: Default::default(), amount_capturable: Default::default(), updated_by: Default::default(), authentication_data: Default::default(), encoded_data: Default::default(), merchant_connector_id: Default::default(), unified_code: Default::default(), unified_message: Default::default(), external_three_ds_authentication_attempted: Default::default(), authentication_connector: Default::default(), authentication_id: Default::default(), mandate_data: Default::default(), payment_method_billing_address_id: Default::default(), fingerprint_id: Default::default(), client_source: Default::default(), client_version: Default::default(), customer_acceptance: Default::default(), profile_id: common_utils::generate_profile_id_of_default_length(), organization_id: Default::default(), connector_mandate_detail: Default::default(), request_extended_authorization: Default::default(), extended_authorization_applied: Default::default(), capture_before: Default::default(), card_discovery: Default::default(), processor_merchant_id: Default::default(), created_by: None, setup_future_usage_applied: Default::default(), routing_approach: Default::default(), connector_request_reference_id: Default::default(), network_transaction_id: Default::default(), network_details: Default::default(), is_stored_credential: Default::default(), authorized_amount: Default::default(), }; let store = state .stores .get(state.conf.multitenancy.get_tenant_ids().first().unwrap()) .unwrap(); store .insert_payment_attempt(payment_attempt, enums::MerchantStorageScheme::PostgresOnly) .await .unwrap(); let response = store .find_payment_attempt_by_payment_id_merchant_id_attempt_id( &payment_id, &merchant_id, &uuid, enums::MerchantStorageScheme::PostgresOnly, ) .await .unwrap(); // checking it after fetch assert_eq!(response.mandate_id, Some("man_121212".to_string())); }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 158, "total_crates": null }
fn_clm_router_test_find_payment_attempt_9097859931397791850
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/storage/payment_attempt /// Example of unit test /// Kind of test: state-based testing async fn test_find_payment_attempt() { let state = create_single_connection_test_transaction_pool().await; let current_time = common_utils::date_time::now(); let payment_id = common_utils::id_type::PaymentId::generate_test_payment_id_for_sample_data(); let attempt_id = Uuid::new_v4().to_string(); let merchant_id = common_utils::id_type::MerchantId::new_from_unix_timestamp(); let connector = types::Connector::DummyConnector1.to_string(); let payment_attempt = PaymentAttemptNew { payment_id: payment_id.clone(), merchant_id: merchant_id.clone(), connector: Some(connector), created_at: current_time.into(), modified_at: current_time.into(), attempt_id: attempt_id.clone(), status: Default::default(), net_amount: Default::default(), currency: Default::default(), save_to_locker: Default::default(), error_message: Default::default(), offer_amount: Default::default(), payment_method_id: Default::default(), payment_method: Default::default(), capture_method: Default::default(), capture_on: Default::default(), confirm: Default::default(), authentication_type: Default::default(), last_synced: Default::default(), cancellation_reason: Default::default(), amount_to_capture: Default::default(), mandate_id: Default::default(), browser_info: Default::default(), payment_token: Default::default(), error_code: Default::default(), connector_metadata: Default::default(), payment_experience: Default::default(), payment_method_type: Default::default(), payment_method_data: Default::default(), business_sub_label: Default::default(), straight_through_algorithm: Default::default(), preprocessing_step_id: Default::default(), mandate_details: Default::default(), error_reason: Default::default(), connector_response_reference_id: Default::default(), multiple_capture_count: Default::default(), amount_capturable: Default::default(), updated_by: Default::default(), authentication_data: Default::default(), encoded_data: Default::default(), merchant_connector_id: Default::default(), unified_code: Default::default(), unified_message: Default::default(), external_three_ds_authentication_attempted: Default::default(), authentication_connector: Default::default(), authentication_id: Default::default(), mandate_data: Default::default(), payment_method_billing_address_id: Default::default(), fingerprint_id: Default::default(), client_source: Default::default(), client_version: Default::default(), customer_acceptance: Default::default(), profile_id: common_utils::generate_profile_id_of_default_length(), organization_id: Default::default(), connector_mandate_detail: Default::default(), request_extended_authorization: Default::default(), extended_authorization_applied: Default::default(), capture_before: Default::default(), card_discovery: Default::default(), processor_merchant_id: Default::default(), created_by: None, setup_future_usage_applied: Default::default(), routing_approach: Default::default(), connector_request_reference_id: Default::default(), network_transaction_id: Default::default(), network_details: Default::default(), is_stored_credential: Default::default(), authorized_amount: Default::default(), }; let store = state .stores .get(state.conf.multitenancy.get_tenant_ids().first().unwrap()) .unwrap(); store .insert_payment_attempt(payment_attempt, enums::MerchantStorageScheme::PostgresOnly) .await .unwrap(); let response = store .find_payment_attempt_by_payment_id_merchant_id_attempt_id( &payment_id, &merchant_id, &attempt_id, enums::MerchantStorageScheme::PostgresOnly, ) .await .unwrap(); eprintln!("{response:?}"); assert_eq!(response.payment_id, payment_id); }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 156, "total_crates": null }
fn_clm_router_test_payment_attempt_insert_9097859931397791850
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/storage/payment_attempt async fn test_payment_attempt_insert() { let state = create_single_connection_test_transaction_pool().await; let payment_id = common_utils::id_type::PaymentId::generate_test_payment_id_for_sample_data(); let current_time = common_utils::date_time::now(); let connector = types::Connector::DummyConnector1.to_string(); let payment_attempt = PaymentAttemptNew { payment_id: payment_id.clone(), connector: Some(connector), created_at: current_time.into(), modified_at: current_time.into(), merchant_id: Default::default(), attempt_id: Default::default(), status: Default::default(), net_amount: Default::default(), currency: Default::default(), save_to_locker: Default::default(), error_message: Default::default(), offer_amount: Default::default(), payment_method_id: Default::default(), payment_method: Default::default(), capture_method: Default::default(), capture_on: Default::default(), confirm: Default::default(), authentication_type: Default::default(), last_synced: Default::default(), cancellation_reason: Default::default(), amount_to_capture: Default::default(), mandate_id: Default::default(), browser_info: Default::default(), payment_token: Default::default(), error_code: Default::default(), connector_metadata: Default::default(), payment_experience: Default::default(), payment_method_type: Default::default(), payment_method_data: Default::default(), business_sub_label: Default::default(), straight_through_algorithm: Default::default(), preprocessing_step_id: Default::default(), mandate_details: Default::default(), error_reason: Default::default(), connector_response_reference_id: Default::default(), multiple_capture_count: Default::default(), amount_capturable: Default::default(), updated_by: Default::default(), authentication_data: Default::default(), encoded_data: Default::default(), merchant_connector_id: Default::default(), unified_code: Default::default(), unified_message: Default::default(), external_three_ds_authentication_attempted: Default::default(), authentication_connector: Default::default(), authentication_id: Default::default(), mandate_data: Default::default(), payment_method_billing_address_id: Default::default(), fingerprint_id: Default::default(), client_source: Default::default(), client_version: Default::default(), customer_acceptance: Default::default(), profile_id: common_utils::generate_profile_id_of_default_length(), organization_id: Default::default(), connector_mandate_detail: Default::default(), request_extended_authorization: Default::default(), extended_authorization_applied: Default::default(), capture_before: Default::default(), card_discovery: Default::default(), processor_merchant_id: Default::default(), created_by: None, setup_future_usage_applied: Default::default(), routing_approach: Default::default(), connector_request_reference_id: Default::default(), network_transaction_id: Default::default(), network_details: Default::default(), is_stored_credential: None, authorized_amount: Default::default(), }; let store = state .stores .get(state.conf.multitenancy.get_tenant_ids().first().unwrap()) .unwrap(); let response = store .insert_payment_attempt(payment_attempt, enums::MerchantStorageScheme::PostgresOnly) .await .unwrap(); eprintln!("{response:?}"); assert_eq!(response.payment_id, payment_id.clone()); }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 146, "total_crates": null }
fn_clm_router_make_new_capture_9097859931397791850
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/storage/payment_attempt // Implementation of PaymentAttempt for PaymentAttemptExt fn make_new_capture( &self, capture_amount: MinorUnit, capture_status: enums::CaptureStatus, ) -> RouterResult<CaptureNew> { let capture_sequence = self.multiple_capture_count.unwrap_or_default() + 1; let now = common_utils::date_time::now(); Ok(CaptureNew { payment_id: self.payment_id.clone(), merchant_id: self.merchant_id.clone(), capture_id: self.get_next_capture_id(), status: capture_status, amount: capture_amount, currency: self.currency, connector: self .connector .clone() .get_required_value("connector") .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable( "connector field is required in payment_attempt to create a capture", )?, error_message: None, tax_amount: None, created_at: now, modified_at: now, error_code: None, error_reason: None, authorized_attempt_id: self.attempt_id.clone(), capture_sequence, connector_capture_id: None, connector_response_reference_id: None, processor_capture_data: None, // Below fields are deprecated. Please add any new fields above this line. connector_capture_data: None, }) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 31, "total_crates": null }
fn_clm_router_update_payment_processor_token_error_code_from_process_tracker_8181439378200417214
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/storage/revenue_recovery_redis_operation // Implementation of None for RedisTokenManager pub async fn update_payment_processor_token_error_code_from_process_tracker( state: &SessionState, connector_customer_id: &str, error_code: &Option<String>, is_hard_decline: &Option<bool>, payment_processor_token_id: Option<&str>, ) -> CustomResult<bool, errors::StorageError> { let today = OffsetDateTime::now_utc().date(); let updated_token = match payment_processor_token_id { Some(token_id) => { Self::get_connector_customer_payment_processor_tokens(state, connector_customer_id) .await? .values() .find(|status| { status .payment_processor_token_details .payment_processor_token == token_id }) .map(|status| PaymentProcessorTokenStatus { payment_processor_token_details: status .payment_processor_token_details .clone(), inserted_by_attempt_id: status.inserted_by_attempt_id.clone(), error_code: error_code.clone(), daily_retry_history: status.daily_retry_history.clone(), scheduled_at: None, is_hard_decline: *is_hard_decline, }) } None => None, }; match updated_token { Some(mut token) => { Self::normalize_retry_window(&mut token, today); match token.error_code { None => token.daily_retry_history.clear(), Some(_) => { let current_count = token .daily_retry_history .get(&today) .copied() .unwrap_or(INITIAL_RETRY_COUNT); token.daily_retry_history.insert(today, current_count + 1); } } let mut tokens_map = HashMap::new(); tokens_map.insert( token .payment_processor_token_details .payment_processor_token .clone(), token.clone(), ); Self::update_or_add_connector_customer_payment_processor_tokens( state, connector_customer_id, tokens_map, ) .await?; tracing::debug!( connector_customer_id = connector_customer_id, "Updated payment processor tokens with error code", ); Ok(true) } None => { tracing::debug!( connector_customer_id = connector_customer_id, "No Token found with token id to update error code", ); Ok(false) } } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 78, "total_crates": null }
fn_clm_router_update_redis_token_with_comprehensive_card_data_8181439378200417214
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/storage/revenue_recovery_redis_operation // Implementation of None for RedisTokenManager pub async fn update_redis_token_with_comprehensive_card_data( state: &SessionState, customer_id: &str, token: &str, card_data: &revenue_recovery_data_backfill::ComprehensiveCardData, cutoff_datetime: Option<PrimitiveDateTime>, ) -> CustomResult<(), errors::StorageError> { // Get existing token data let mut token_map = Self::get_connector_customer_payment_processor_tokens(state, customer_id).await?; // Find the token to update let existing_token = token_map.get_mut(token).ok_or_else(|| { tracing::warn!( customer_id = customer_id, "Token not found in parsed Redis data - may be corrupted or missing for " ); error_stack::Report::new(errors::StorageError::ValueNotFound( "Token not found in Redis".to_string(), )) })?; // Update the token details with new card data card_data.card_type.as_ref().map(|card_type| { existing_token.payment_processor_token_details.card_type = Some(card_type.clone()) }); card_data.card_exp_month.as_ref().map(|exp_month| { existing_token.payment_processor_token_details.expiry_month = Some(exp_month.clone()) }); card_data.card_exp_year.as_ref().map(|exp_year| { existing_token.payment_processor_token_details.expiry_year = Some(exp_year.clone()) }); card_data.card_network.as_ref().map(|card_network| { existing_token.payment_processor_token_details.card_network = Some(card_network.clone()) }); card_data.card_issuer.as_ref().map(|card_issuer| { existing_token.payment_processor_token_details.card_issuer = Some(card_issuer.clone()) }); // Update daily retry history if provided card_data .daily_retry_history .as_ref() .map(|retry_history| existing_token.daily_retry_history = retry_history.clone()); // If cutoff_datetime is provided and existing scheduled_at < cutoff_datetime, set to None // If no scheduled_at value exists, leave it as None existing_token.scheduled_at = existing_token .scheduled_at .and_then(|existing_scheduled_at| { cutoff_datetime .map(|cutoff| { if existing_scheduled_at < cutoff { tracing::info!( customer_id = customer_id, existing_scheduled_at = %existing_scheduled_at, cutoff_datetime = %cutoff, "Set scheduled_at to None because existing time is before cutoff time" ); None } else { Some(existing_scheduled_at) } }) .unwrap_or(Some(existing_scheduled_at)) // No cutoff provided, keep existing value }); // Save the updated token map back to Redis Self::update_or_add_connector_customer_payment_processor_tokens( state, customer_id, token_map, ) .await?; tracing::info!( customer_id = customer_id, "Updated Redis token data with comprehensive card data using struct" ); Ok(()) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 77, "total_crates": null }
fn_clm_router_get_connector_customer_payment_processor_tokens_8181439378200417214
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/storage/revenue_recovery_redis_operation // Implementation of None for RedisTokenManager pub async fn get_connector_customer_payment_processor_tokens( state: &SessionState, connector_customer_id: &str, ) -> CustomResult<HashMap<String, PaymentProcessorTokenStatus>, errors::StorageError> { let redis_conn = state .store .get_redis_conn() .change_context(errors::StorageError::RedisError( errors::RedisError::RedisConnectionError.into(), ))?; let tokens_key = Self::get_connector_customer_tokens_key(connector_customer_id); let get_hash_err = errors::StorageError::RedisError(errors::RedisError::GetHashFieldFailed.into()); let payment_processor_tokens: HashMap<String, String> = redis_conn .get_hash_fields(&tokens_key.into()) .await .change_context(get_hash_err)?; let payment_processor_token_info_map: HashMap<String, PaymentProcessorTokenStatus> = payment_processor_tokens .into_iter() .filter_map(|(token_id, token_data)| { match serde_json::from_str::<PaymentProcessorTokenStatus>(&token_data) { Ok(token_status) => Some((token_id, token_status)), Err(err) => { tracing::warn!( connector_customer_id = %connector_customer_id, token_id = %token_id, error = %err, "Failed to deserialize token data, skipping", ); None } } }) .collect(); tracing::debug!( connector_customer_id = connector_customer_id, "Fetched payment processor tokens", ); Ok(payment_processor_token_info_map) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 68, "total_crates": null }
fn_clm_router_update_or_add_connector_customer_payment_processor_tokens_8181439378200417214
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/storage/revenue_recovery_redis_operation // Implementation of None for RedisTokenManager pub async fn update_or_add_connector_customer_payment_processor_tokens( state: &SessionState, connector_customer_id: &str, payment_processor_token_info_map: HashMap<String, PaymentProcessorTokenStatus>, ) -> CustomResult<(), errors::StorageError> { let redis_conn = state .store .get_redis_conn() .change_context(errors::StorageError::RedisError( errors::RedisError::RedisConnectionError.into(), ))?; let tokens_key = Self::get_connector_customer_tokens_key(connector_customer_id); // allocate capacity up-front to avoid rehashing let mut serialized_payment_processor_tokens: HashMap<String, String> = HashMap::with_capacity(payment_processor_token_info_map.len()); // serialize all tokens, preserving explicit error handling and attachable diagnostics for (payment_processor_token_id, payment_processor_token_status) in payment_processor_token_info_map { let serialized = serde_json::to_string(&payment_processor_token_status) .change_context(errors::StorageError::SerializationFailed) .attach_printable("Failed to serialize token status")?; serialized_payment_processor_tokens.insert(payment_processor_token_id, serialized); } let seconds = &state.conf.revenue_recovery.redis_ttl_in_seconds; // Update or add tokens redis_conn .set_hash_fields( &tokens_key.into(), serialized_payment_processor_tokens, Some(*seconds), ) .await .change_context(errors::StorageError::RedisError( errors::RedisError::SetHashFieldFailed.into(), ))?; tracing::info!( connector_customer_id = %connector_customer_id, "Successfully updated or added customer tokens", ); Ok(()) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 65, "total_crates": null }
fn_clm_router_get_redis_key_data_raw_8181439378200417214
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/storage/revenue_recovery_redis_operation // Implementation of None for RedisTokenManager pub async fn get_redis_key_data_raw( state: &SessionState, connector_customer_id: &str, key_type: &RedisKeyType, ) -> CustomResult<(bool, i64, Option<serde_json::Value>), errors::StorageError> { let redis_conn = state .store .get_redis_conn() .change_context(errors::StorageError::RedisError( errors::RedisError::RedisConnectionError.into(), ))?; let redis_key = match key_type { RedisKeyType::Status => Self::get_connector_customer_lock_key(connector_customer_id), RedisKeyType::Tokens => Self::get_connector_customer_tokens_key(connector_customer_id), }; // Get TTL let ttl = redis_conn .get_ttl(&redis_key.clone().into()) .await .map_err(|error| { tracing::error!(operation = "get_ttl", err = ?error); errors::StorageError::RedisError(errors::RedisError::GetHashFieldFailed.into()) })?; // Get data based on key type and determine existence let (key_exists, data) = match key_type { RedisKeyType::Status => match redis_conn.get_key::<String>(&redis_key.into()).await { Ok(status_value) => (true, serde_json::Value::String(status_value)), Err(error) => { tracing::error!(operation = "get_status_key", err = ?error); ( false, serde_json::Value::String(format!( "Error retrieving status key: {}", error )), ) } }, RedisKeyType::Tokens => { match redis_conn .get_hash_fields::<HashMap<String, String>>(&redis_key.into()) .await { Ok(hash_fields) => { let exists = !hash_fields.is_empty(); let data = if exists { serde_json::to_value(hash_fields).unwrap_or(serde_json::Value::Null) } else { serde_json::Value::Object(serde_json::Map::new()) }; (exists, data) } Err(error) => { tracing::error!(operation = "get_tokens_hash", err = ?error); (false, serde_json::Value::Null) } } } }; tracing::debug!( connector_customer_id = connector_customer_id, key_type = ?key_type, exists = key_exists, ttl = ttl, "Retrieved Redis key data" ); Ok((key_exists, ttl, Some(data))) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 63, "total_crates": null }
fn_clm_router_temporary_generic_-511987267632802507
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/storage/payment_method // Inherent implementation for PaymentTokenData pub fn temporary_generic(token: String) -> Self { Self::TemporaryGeneric(GenericTokenData { token }) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 38, "total_crates": null }
fn_clm_router_permanent_card_-511987267632802507
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/storage/payment_method // Inherent implementation for PaymentTokenData pub fn permanent_card( payment_method_id: common_utils::id_type::GlobalPaymentMethodId, locker_id: Option<String>, token: String, ) -> Self { Self::PermanentCard(CardTokenData { payment_method_id, locker_id, token, }) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 26, "total_crates": null }
fn_clm_router_wallet_token_-511987267632802507
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/storage/payment_method // Inherent implementation for PaymentTokenData pub fn wallet_token(payment_method_id: String) -> Self { Self::WalletToken(WalletTokenData { payment_method_id }) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 23, "total_crates": null }
fn_clm_router_get_token_data_-511987267632802507
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/storage/payment_method // Inherent implementation for PaymentMethodListContext pub(crate) fn get_token_data(&self) -> Option<PaymentTokenData> { match self { Self::Card { token_data, .. } | Self::Bank { token_data } | Self::BankTransfer { token_data, .. } | Self::TemporaryToken { token_data } => token_data.clone(), } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 23, "total_crates": null }
fn_clm_router_is_permanent_card_-511987267632802507
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/storage/payment_method // Inherent implementation for PaymentTokenData pub fn is_permanent_card(&self) -> bool { matches!(self, Self::PermanentCard(_)) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 18, "total_crates": null }
fn_clm_router_filter_by_constraints_6377147393414243021
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/storage/refund // Implementation of Refund for RefundDbExt async fn filter_by_constraints( conn: &PgPooledConn, merchant_id: &common_utils::id_type::MerchantId, refund_list_details: refunds::RefundListConstraints, limit: i64, offset: i64, ) -> CustomResult<Vec<Self>, errors::DatabaseError> { let mut filter = <Self as HasTable>::table() .filter(dsl::merchant_id.eq(merchant_id.to_owned())) .order(dsl::modified_at.desc()) .into_boxed(); if let Some(payment_id) = &refund_list_details.payment_id { filter = filter.filter(dsl::payment_id.eq(payment_id.to_owned())); } if let Some(refund_id) = &refund_list_details.refund_id { filter = filter.filter(dsl::id.eq(refund_id.to_owned())); } if let Some(time_range) = &refund_list_details.time_range { filter = filter.filter(dsl::created_at.ge(time_range.start_time)); if let Some(end_time) = time_range.end_time { filter = filter.filter(dsl::created_at.le(end_time)); } } filter = match refund_list_details.amount_filter { Some(AmountFilter { start_amount: Some(start), end_amount: Some(end), }) => filter.filter(dsl::refund_amount.between(start, end)), Some(AmountFilter { start_amount: Some(start), end_amount: None, }) => filter.filter(dsl::refund_amount.ge(start)), Some(AmountFilter { start_amount: None, end_amount: Some(end), }) => filter.filter(dsl::refund_amount.le(end)), _ => filter, }; if let Some(connector) = refund_list_details.connector { filter = filter.filter(dsl::connector.eq_any(connector)); } if let Some(connector_id_list) = refund_list_details.connector_id_list { filter = filter.filter(dsl::connector_id.eq_any(connector_id_list)); } if let Some(filter_currency) = refund_list_details.currency { filter = filter.filter(dsl::currency.eq_any(filter_currency)); } if let Some(filter_refund_status) = refund_list_details.refund_status { filter = filter.filter(dsl::refund_status.eq_any(filter_refund_status)); } filter = filter.limit(limit).offset(offset); logger::debug!(query = %diesel::debug_query::<diesel::pg::Pg, _>(&filter).to_string()); db_metrics::track_database_call::<<Self as HasTable>::Table, _, _>( filter.get_results_async(conn), db_metrics::DatabaseOperation::Filter, ) .await .change_context(errors::DatabaseError::NotFound) .attach_printable_lazy(|| "Error filtering records by predicate") // todo!() }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 83, "total_crates": null }
fn_clm_router_filter_by_meta_constraints_6377147393414243021
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/storage/refund // Implementation of Refund for RefundDbExt async fn filter_by_meta_constraints( conn: &PgPooledConn, merchant_id: &common_utils::id_type::MerchantId, refund_list_details: &common_utils::types::TimeRange, ) -> CustomResult<api_models::refunds::RefundListMetaData, errors::DatabaseError> { let start_time = refund_list_details.start_time; let end_time = refund_list_details .end_time .unwrap_or_else(common_utils::date_time::now); let filter = <Self as HasTable>::table() .filter(dsl::merchant_id.eq(merchant_id.to_owned())) .order(dsl::modified_at.desc()) .filter(dsl::created_at.ge(start_time)) .filter(dsl::created_at.le(end_time)); let filter_connector: Vec<String> = filter .clone() .select(dsl::connector) .distinct() .order_by(dsl::connector.asc()) .get_results_async(conn) .await .change_context(errors::DatabaseError::Others) .attach_printable("Error filtering records by connector")?; let filter_currency: Vec<Currency> = filter .clone() .select(dsl::currency) .distinct() .order_by(dsl::currency.asc()) .get_results_async(conn) .await .change_context(errors::DatabaseError::Others) .attach_printable("Error filtering records by currency")?; let filter_status: Vec<RefundStatus> = filter .select(dsl::refund_status) .distinct() .order_by(dsl::refund_status.asc()) .get_results_async(conn) .await .change_context(errors::DatabaseError::Others) .attach_printable("Error filtering records by refund status")?; let meta = api_models::refunds::RefundListMetaData { connector: filter_connector, currency: filter_currency, refund_status: filter_status, }; Ok(meta) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 76, "total_crates": null }
fn_clm_router_get_refunds_count_6377147393414243021
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/storage/refund // Implementation of Refund for RefundDbExt async fn get_refunds_count( conn: &PgPooledConn, merchant_id: &common_utils::id_type::MerchantId, refund_list_details: refunds::RefundListConstraints, ) -> CustomResult<i64, errors::DatabaseError> { let mut filter = <Self as HasTable>::table() .count() .filter(dsl::merchant_id.eq(merchant_id.to_owned())) .into_boxed(); if let Some(payment_id) = &refund_list_details.payment_id { filter = filter.filter(dsl::payment_id.eq(payment_id.to_owned())); } if let Some(refund_id) = &refund_list_details.refund_id { filter = filter.filter(dsl::id.eq(refund_id.to_owned())); } if let Some(time_range) = refund_list_details.time_range { filter = filter.filter(dsl::created_at.ge(time_range.start_time)); if let Some(end_time) = time_range.end_time { filter = filter.filter(dsl::created_at.le(end_time)); } } filter = match refund_list_details.amount_filter { Some(AmountFilter { start_amount: Some(start), end_amount: Some(end), }) => filter.filter(dsl::refund_amount.between(start, end)), Some(AmountFilter { start_amount: Some(start), end_amount: None, }) => filter.filter(dsl::refund_amount.ge(start)), Some(AmountFilter { start_amount: None, end_amount: Some(end), }) => filter.filter(dsl::refund_amount.le(end)), _ => filter, }; if let Some(connector) = refund_list_details.connector { filter = filter.filter(dsl::connector.eq_any(connector)); } if let Some(connector_id_list) = refund_list_details.connector_id_list { filter = filter.filter(dsl::connector_id.eq_any(connector_id_list)); } if let Some(filter_currency) = refund_list_details.currency { filter = filter.filter(dsl::currency.eq_any(filter_currency)); } if let Some(filter_refund_status) = refund_list_details.refund_status { filter = filter.filter(dsl::refund_status.eq_any(filter_refund_status)); } logger::debug!(query = %diesel::debug_query::<diesel::pg::Pg, _>(&filter).to_string()); filter .get_result_async::<i64>(conn) .await .change_context(errors::DatabaseError::NotFound) .attach_printable_lazy(|| "Error filtering count of refunds") }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 72, "total_crates": null }
fn_clm_router_get_refund_status_with_count_6377147393414243021
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/storage/refund // Implementation of Refund for RefundDbExt async fn get_refund_status_with_count( conn: &PgPooledConn, merchant_id: &common_utils::id_type::MerchantId, profile_id_list: Option<Vec<common_utils::id_type::ProfileId>>, time_range: &common_utils::types::TimeRange, ) -> CustomResult<Vec<(RefundStatus, i64)>, errors::DatabaseError> { let mut query = <Self as HasTable>::table() .group_by(dsl::refund_status) .select((dsl::refund_status, diesel::dsl::count_star())) .filter(dsl::merchant_id.eq(merchant_id.to_owned())) .into_boxed(); if let Some(profile_id) = profile_id_list { query = query.filter(dsl::profile_id.eq_any(profile_id)); } query = query.filter(dsl::created_at.ge(time_range.start_time)); query = match time_range.end_time { Some(ending_at) => query.filter(dsl::created_at.le(ending_at)), None => query, }; logger::debug!(filter = %diesel::debug_query::<diesel::pg::Pg,_>(&query).to_string()); db_metrics::track_database_call::<<Self as HasTable>::Table, _, _>( query.get_results_async::<(RefundStatus, i64)>(conn), db_metrics::DatabaseOperation::Count, ) .await .change_context(errors::DatabaseError::NotFound) .attach_printable_lazy(|| "Error filtering status count of refunds") }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 46, "total_crates": null }
fn_clm_router_filter_by_constraints_-1848225134979559463
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/storage/payment_link // Implementation of PaymentLink for PaymentLinkDbExt async fn filter_by_constraints( conn: &PgPooledConn, merchant_id: &common_utils::id_type::MerchantId, payment_link_list_constraints: api_models::payments::PaymentLinkListConstraints, ) -> CustomResult<Vec<Self>, errors::DatabaseError> { let mut filter = <Self as HasTable>::table() .filter(dsl::merchant_id.eq(merchant_id.to_owned())) .order(dsl::created_at.desc()) .into_boxed(); if let Some(created_time) = payment_link_list_constraints.created { filter = filter.filter(dsl::created_at.eq(created_time)); } if let Some(created_time_lt) = payment_link_list_constraints.created_lt { filter = filter.filter(dsl::created_at.lt(created_time_lt)); } if let Some(created_time_gt) = payment_link_list_constraints.created_gt { filter = filter.filter(dsl::created_at.gt(created_time_gt)); } if let Some(created_time_lte) = payment_link_list_constraints.created_lte { filter = filter.filter(dsl::created_at.le(created_time_lte)); } if let Some(created_time_gte) = payment_link_list_constraints.created_gte { filter = filter.filter(dsl::created_at.ge(created_time_gte)); } if let Some(limit) = payment_link_list_constraints.limit { filter = filter.limit(limit); } logger::debug!(query = %diesel::debug_query::<diesel::pg::Pg, _>(&filter).to_string()); filter .get_results_async(conn) .await // The query built here returns an empty Vec when no records are found, and if any error does occur, // it would be an internal database error, due to which we are raising a DatabaseError::Unknown error .change_context(errors::DatabaseError::Others) .attach_printable("Error filtering payment link by specified constraints") }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 53, "total_crates": null }
fn_clm_router_default_4925700548039270482
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/storage/revenue_recovery // Implementation of RecoveryTimestamp for Default fn default() -> Self { Self { initial_timestamp_in_seconds: 1, job_schedule_buffer_time_in_seconds: 15, reopen_workflow_buffer_time_in_seconds: 60, max_random_schedule_delay_in_seconds: 300, redis_ttl_buffer_in_seconds: 300, } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 7703, "total_crates": null }
fn_clm_router_get_network_config_4925700548039270482
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/storage/revenue_recovery // Inherent implementation for RetryLimitsConfig pub fn get_network_config(&self, network: Option<CardNetwork>) -> &NetworkRetryConfig { // Hardcoded fallback default config static DEFAULT_CONFIG: NetworkRetryConfig = NetworkRetryConfig { max_retries_per_day: 20, max_retry_count_for_thirty_day: 20, }; if let Some(net) = network { self.0.get(&net).unwrap_or(&DEFAULT_CONFIG) } else { self.0.get(&CardNetwork::Visa).unwrap_or(&DEFAULT_CONFIG) } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 35, "total_crates": null }
fn_clm_router_get_schedule_time_based_on_retry_type_4925700548039270482
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/storage/revenue_recovery // Implementation of None for RevenueRecoveryPaymentData pub async fn get_schedule_time_based_on_retry_type( &self, state: &SessionState, merchant_id: &id_type::MerchantId, retry_count: i32, payment_attempt: &PaymentAttempt, payment_intent: &PaymentIntent, is_hard_decline: bool, ) -> Option<time::PrimitiveDateTime> { if is_hard_decline { logger::info!("Hard Decline encountered"); return None; } match self.retry_algorithm { enums::RevenueRecoveryAlgorithmType::Monitoring => { logger::error!("Monitoring type found for Revenue Recovery retry payment"); None } enums::RevenueRecoveryAlgorithmType::Cascading => { logger::info!("Cascading type found for Revenue Recovery retry payment"); revenue_recovery::get_schedule_time_to_retry_mit_payments( state.store.as_ref(), merchant_id, retry_count, ) .await } enums::RevenueRecoveryAlgorithmType::Smart => None, } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 25, "total_crates": null }
fn_clm_router_foreign_try_from_8296608986570732757
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/storage/ephemeral_key // Implementation of api_models::ephemeral_key::ClientSecretResponse for ForeignTryFrom<ClientSecretType> fn foreign_try_from(from: ClientSecretType) -> Result<Self, errors::ApiErrorResponse> { match from.resource_id { common_utils::types::authentication::ResourceId::Payment(global_payment_id) => { Err(errors::ApiErrorResponse::InternalServerError) } common_utils::types::authentication::ResourceId::PaymentMethodSession( global_payment_id, ) => Err(errors::ApiErrorResponse::InternalServerError), common_utils::types::authentication::ResourceId::Customer(global_customer_id) => { Ok(Self { resource_id: api_models::ephemeral_key::ResourceId::Customer( global_customer_id.clone(), ), created_at: from.created_at, expires: from.expires, secret: from.secret, id: from.id, }) } } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 432, "total_crates": null }
fn_clm_router_filter_by_constraints_-5868333969207586278
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/storage/mandate // Implementation of Mandate for MandateDbExt async fn filter_by_constraints( conn: &PgPooledConn, merchant_id: &common_utils::id_type::MerchantId, mandate_list_constraints: api_models::mandates::MandateListConstraints, ) -> CustomResult<Vec<Self>, errors::DatabaseError> { let mut filter = <Self as HasTable>::table() .filter(dsl::merchant_id.eq(merchant_id.to_owned())) .order(dsl::created_at.desc()) .into_boxed(); if let Some(created_time) = mandate_list_constraints.created_time { filter = filter.filter(dsl::created_at.eq(created_time)); } if let Some(created_time_lt) = mandate_list_constraints.created_time_lt { filter = filter.filter(dsl::created_at.lt(created_time_lt)); } if let Some(created_time_gt) = mandate_list_constraints.created_time_gt { filter = filter.filter(dsl::created_at.gt(created_time_gt)); } if let Some(created_time_lte) = mandate_list_constraints.created_time_lte { filter = filter.filter(dsl::created_at.le(created_time_lte)); } if let Some(created_time_gte) = mandate_list_constraints.created_time_gte { filter = filter.filter(dsl::created_at.ge(created_time_gte)); } if let Some(connector) = mandate_list_constraints.connector { filter = filter.filter(dsl::connector.eq(connector)); } if let Some(mandate_status) = mandate_list_constraints.mandate_status { filter = filter.filter(dsl::mandate_status.eq(mandate_status)); } if let Some(limit) = mandate_list_constraints.limit { filter = filter.limit(limit); } if let Some(offset) = mandate_list_constraints.offset { filter = filter.offset(offset); } logger::debug!(query = %diesel::debug_query::<diesel::pg::Pg, _>(&filter).to_string()); filter .get_results_async(conn) .await // The query built here returns an empty Vec when no records are found, and if any error does occur, // it would be an internal database error, due to which we are raising a DatabaseError::Unknown error .change_context(errors::DatabaseError::Others) .attach_printable("Error filtering mandates by specified constraints") }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 63, "total_crates": null }
fn_clm_router_convert_connector_3161772835303060188
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/api/connector_mapping // Implementation of None for ConnectorData pub fn convert_connector( connector_name: &str, ) -> CustomResult<ConnectorEnum, errors::ApiErrorResponse> { match enums::Connector::from_str(connector_name) { Ok(name) => match name { enums::Connector::Aci => Ok(ConnectorEnum::Old(Box::new(connector::Aci::new()))), enums::Connector::Adyen => { Ok(ConnectorEnum::Old(Box::new(connector::Adyen::new()))) } enums::Connector::Affirm => { Ok(ConnectorEnum::Old(Box::new(connector::Affirm::new()))) } enums::Connector::Adyenplatform => Ok(ConnectorEnum::Old(Box::new( connector::Adyenplatform::new(), ))), enums::Connector::Airwallex => { Ok(ConnectorEnum::Old(Box::new(connector::Airwallex::new()))) } enums::Connector::Amazonpay => { Ok(ConnectorEnum::Old(Box::new(connector::Amazonpay::new()))) } enums::Connector::Archipel => { Ok(ConnectorEnum::Old(Box::new(connector::Archipel::new()))) } enums::Connector::Authipay => { Ok(ConnectorEnum::Old(Box::new(connector::Authipay::new()))) } enums::Connector::Authorizedotnet => Ok(ConnectorEnum::Old(Box::new( connector::Authorizedotnet::new(), ))), enums::Connector::Bambora => { Ok(ConnectorEnum::Old(Box::new(connector::Bambora::new()))) } enums::Connector::Bamboraapac => { Ok(ConnectorEnum::Old(Box::new(connector::Bamboraapac::new()))) } enums::Connector::Bankofamerica => Ok(ConnectorEnum::Old(Box::new( connector::Bankofamerica::new(), ))), enums::Connector::Barclaycard => { Ok(ConnectorEnum::Old(Box::new(connector::Barclaycard::new()))) } enums::Connector::Billwerk => { Ok(ConnectorEnum::Old(Box::new(connector::Billwerk::new()))) } enums::Connector::Bitpay => { Ok(ConnectorEnum::Old(Box::new(connector::Bitpay::new()))) } enums::Connector::Blackhawknetwork => Ok(ConnectorEnum::Old(Box::new( connector::Blackhawknetwork::new(), ))), enums::Connector::Bluesnap => { Ok(ConnectorEnum::Old(Box::new(connector::Bluesnap::new()))) } enums::Connector::Calida => { Ok(ConnectorEnum::Old(Box::new(connector::Calida::new()))) } enums::Connector::Boku => Ok(ConnectorEnum::Old(Box::new(connector::Boku::new()))), enums::Connector::Braintree => { Ok(ConnectorEnum::Old(Box::new(connector::Braintree::new()))) } enums::Connector::Breadpay => { Ok(ConnectorEnum::Old(Box::new(connector::Breadpay::new()))) } enums::Connector::Cashtocode => { Ok(ConnectorEnum::Old(Box::new(connector::Cashtocode::new()))) } enums::Connector::Celero => { Ok(ConnectorEnum::Old(Box::new(connector::Celero::new()))) } enums::Connector::Chargebee => { Ok(ConnectorEnum::Old(Box::new(connector::Chargebee::new()))) } enums::Connector::Checkbook => { Ok(ConnectorEnum::Old(Box::new(connector::Checkbook::new()))) } enums::Connector::Checkout => { Ok(ConnectorEnum::Old(Box::new(connector::Checkout::new()))) } enums::Connector::Coinbase => { Ok(ConnectorEnum::Old(Box::new(connector::Coinbase::new()))) } enums::Connector::Coingate => { Ok(ConnectorEnum::Old(Box::new(connector::Coingate::new()))) } enums::Connector::Cryptopay => { Ok(ConnectorEnum::Old(Box::new(connector::Cryptopay::new()))) } enums::Connector::CtpMastercard => { Ok(ConnectorEnum::Old(Box::new(&connector::CtpMastercard))) } enums::Connector::Custombilling => Ok(ConnectorEnum::Old(Box::new( connector::Custombilling::new(), ))), enums::Connector::CtpVisa => Ok(ConnectorEnum::Old(Box::new( connector::UnifiedAuthenticationService::new(), ))), enums::Connector::Cybersource => { Ok(ConnectorEnum::Old(Box::new(connector::Cybersource::new()))) } enums::Connector::Datatrans => { Ok(ConnectorEnum::Old(Box::new(connector::Datatrans::new()))) } enums::Connector::Deutschebank => { Ok(ConnectorEnum::Old(Box::new(connector::Deutschebank::new()))) } enums::Connector::Digitalvirgo => { Ok(ConnectorEnum::Old(Box::new(connector::Digitalvirgo::new()))) } enums::Connector::Dlocal => { Ok(ConnectorEnum::Old(Box::new(connector::Dlocal::new()))) } #[cfg(feature = "dummy_connector")] enums::Connector::DummyConnector1 => Ok(ConnectorEnum::Old(Box::new( connector::DummyConnector::<1>::new(), ))), #[cfg(feature = "dummy_connector")] enums::Connector::DummyConnector2 => Ok(ConnectorEnum::Old(Box::new( connector::DummyConnector::<2>::new(), ))), #[cfg(feature = "dummy_connector")] enums::Connector::DummyConnector3 => Ok(ConnectorEnum::Old(Box::new( connector::DummyConnector::<3>::new(), ))), #[cfg(feature = "dummy_connector")] enums::Connector::DummyConnector4 => Ok(ConnectorEnum::Old(Box::new( connector::DummyConnector::<4>::new(), ))), #[cfg(feature = "dummy_connector")] enums::Connector::DummyConnector5 => Ok(ConnectorEnum::Old(Box::new( connector::DummyConnector::<5>::new(), ))), #[cfg(feature = "dummy_connector")] enums::Connector::DummyConnector6 => Ok(ConnectorEnum::Old(Box::new( connector::DummyConnector::<6>::new(), ))), #[cfg(feature = "dummy_connector")] enums::Connector::DummyConnector7 => Ok(ConnectorEnum::Old(Box::new( connector::DummyConnector::<7>::new(), ))), #[cfg(feature = "dummy_connector")] enums::Connector::DummyBillingConnector => Ok(ConnectorEnum::Old(Box::new( connector::DummyConnector::<8>::new(), ))), enums::Connector::Dwolla => { Ok(ConnectorEnum::Old(Box::new(connector::Dwolla::new()))) } enums::Connector::Ebanx => { Ok(ConnectorEnum::Old(Box::new(connector::Ebanx::new()))) } enums::Connector::Elavon => { Ok(ConnectorEnum::Old(Box::new(connector::Elavon::new()))) } enums::Connector::Facilitapay => { Ok(ConnectorEnum::Old(Box::new(connector::Facilitapay::new()))) } enums::Connector::Finix => { Ok(ConnectorEnum::Old(Box::new(connector::Finix::new()))) } enums::Connector::Fiserv => { Ok(ConnectorEnum::Old(Box::new(connector::Fiserv::new()))) } enums::Connector::Fiservemea => { Ok(ConnectorEnum::Old(Box::new(connector::Fiservemea::new()))) } enums::Connector::Fiuu => Ok(ConnectorEnum::Old(Box::new(connector::Fiuu::new()))), enums::Connector::Flexiti => { Ok(ConnectorEnum::Old(Box::new(connector::Flexiti::new()))) } enums::Connector::Forte => { Ok(ConnectorEnum::Old(Box::new(connector::Forte::new()))) } enums::Connector::Getnet => { Ok(ConnectorEnum::Old(Box::new(connector::Getnet::new()))) } enums::Connector::Gigadat => { Ok(ConnectorEnum::Old(Box::new(connector::Gigadat::new()))) } enums::Connector::Globalpay => { Ok(ConnectorEnum::Old(Box::new(connector::Globalpay::new()))) } enums::Connector::Globepay => { Ok(ConnectorEnum::Old(Box::new(connector::Globepay::new()))) } enums::Connector::Gocardless => { Ok(ConnectorEnum::Old(Box::new(connector::Gocardless::new()))) } enums::Connector::Hipay => { Ok(ConnectorEnum::Old(Box::new(connector::Hipay::new()))) } enums::Connector::Helcim => { Ok(ConnectorEnum::Old(Box::new(connector::Helcim::new()))) } enums::Connector::HyperswitchVault => { Ok(ConnectorEnum::Old(Box::new(&connector::HyperswitchVault))) } enums::Connector::Iatapay => { Ok(ConnectorEnum::Old(Box::new(connector::Iatapay::new()))) } enums::Connector::Inespay => { Ok(ConnectorEnum::Old(Box::new(connector::Inespay::new()))) } enums::Connector::Itaubank => { Ok(ConnectorEnum::Old(Box::new(connector::Itaubank::new()))) } enums::Connector::Jpmorgan => { Ok(ConnectorEnum::Old(Box::new(connector::Jpmorgan::new()))) } enums::Connector::Juspaythreedsserver => Ok(ConnectorEnum::Old(Box::new( connector::Juspaythreedsserver::new(), ))), enums::Connector::Klarna => { Ok(ConnectorEnum::Old(Box::new(connector::Klarna::new()))) } enums::Connector::Loonio => { Ok(ConnectorEnum::Old(Box::new(connector::Loonio::new()))) } enums::Connector::Mollie => { // enums::Connector::Moneris => Ok(ConnectorEnum::Old(Box::new(connector::Moneris))), Ok(ConnectorEnum::Old(Box::new(connector::Mollie::new()))) } enums::Connector::Moneris => { Ok(ConnectorEnum::Old(Box::new(connector::Moneris::new()))) } enums::Connector::Nexixpay => { Ok(ConnectorEnum::Old(Box::new(connector::Nexixpay::new()))) } enums::Connector::Nmi => Ok(ConnectorEnum::Old(Box::new(connector::Nmi::new()))), enums::Connector::Nomupay => { Ok(ConnectorEnum::Old(Box::new(connector::Nomupay::new()))) } enums::Connector::Noon => Ok(ConnectorEnum::Old(Box::new(connector::Noon::new()))), enums::Connector::Nordea => { Ok(ConnectorEnum::Old(Box::new(connector::Nordea::new()))) } enums::Connector::Novalnet => { Ok(ConnectorEnum::Old(Box::new(connector::Novalnet::new()))) } enums::Connector::Nuvei => { Ok(ConnectorEnum::Old(Box::new(connector::Nuvei::new()))) } enums::Connector::Opennode => { Ok(ConnectorEnum::Old(Box::new(connector::Opennode::new()))) } enums::Connector::Paybox => { Ok(ConnectorEnum::Old(Box::new(connector::Paybox::new()))) } // "payeezy" => Ok(ConnectorIntegrationEnum::Old(Box::new(&connector::Payeezy)), As psync and rsync are not supported by this connector, it is added as template code for future usage // enums::Connector::Payload => { // Ok(ConnectorEnum::Old(Box::new(connector::Paybload::new()))) // } enums::Connector::Payload => { Ok(ConnectorEnum::Old(Box::new(connector::Payload::new()))) } enums::Connector::Payme => { Ok(ConnectorEnum::Old(Box::new(connector::Payme::new()))) } enums::Connector::Payone => { Ok(ConnectorEnum::Old(Box::new(connector::Payone::new()))) } enums::Connector::Payu => Ok(ConnectorEnum::Old(Box::new(connector::Payu::new()))), enums::Connector::Peachpayments => Ok(ConnectorEnum::Old(Box::new( hyperswitch_connectors::connectors::Peachpayments::new(), ))), enums::Connector::Placetopay => { Ok(ConnectorEnum::Old(Box::new(connector::Placetopay::new()))) } enums::Connector::Powertranz => { Ok(ConnectorEnum::Old(Box::new(connector::Powertranz::new()))) } enums::Connector::Prophetpay => { Ok(ConnectorEnum::Old(Box::new(&connector::Prophetpay))) } enums::Connector::Razorpay => { Ok(ConnectorEnum::Old(Box::new(connector::Razorpay::new()))) } enums::Connector::Rapyd => { Ok(ConnectorEnum::Old(Box::new(connector::Rapyd::new()))) } enums::Connector::Recurly => { Ok(ConnectorEnum::New(Box::new(connector::Recurly::new()))) } enums::Connector::Redsys => { Ok(ConnectorEnum::Old(Box::new(connector::Redsys::new()))) } enums::Connector::Santander => { Ok(ConnectorEnum::Old(Box::new(connector::Santander::new()))) } enums::Connector::Shift4 => { Ok(ConnectorEnum::Old(Box::new(connector::Shift4::new()))) } enums::Connector::Silverflow => { Ok(ConnectorEnum::Old(Box::new(connector::Silverflow::new()))) } enums::Connector::Square => Ok(ConnectorEnum::Old(Box::new(&connector::Square))), enums::Connector::Stax => Ok(ConnectorEnum::Old(Box::new(&connector::Stax))), enums::Connector::Stripe => { Ok(ConnectorEnum::Old(Box::new(connector::Stripe::new()))) } enums::Connector::Stripebilling => Ok(ConnectorEnum::Old(Box::new( connector::Stripebilling::new(), ))), enums::Connector::Wise => Ok(ConnectorEnum::Old(Box::new(connector::Wise::new()))), enums::Connector::Worldline => { Ok(ConnectorEnum::Old(Box::new(&connector::Worldline))) } enums::Connector::Worldpay => { Ok(ConnectorEnum::Old(Box::new(connector::Worldpay::new()))) } enums::Connector::Worldpayvantiv => Ok(ConnectorEnum::Old(Box::new( connector::Worldpayvantiv::new(), ))), enums::Connector::Worldpayxml => { Ok(ConnectorEnum::Old(Box::new(connector::Worldpayxml::new()))) } enums::Connector::Xendit => { Ok(ConnectorEnum::Old(Box::new(connector::Xendit::new()))) } enums::Connector::Mifinity => { Ok(ConnectorEnum::Old(Box::new(connector::Mifinity::new()))) } enums::Connector::Multisafepay => { Ok(ConnectorEnum::Old(Box::new(connector::Multisafepay::new()))) } enums::Connector::Netcetera => { Ok(ConnectorEnum::Old(Box::new(&connector::Netcetera))) } enums::Connector::Nexinets => { Ok(ConnectorEnum::Old(Box::new(&connector::Nexinets))) } // enums::Connector::Nexixpay => { // Ok(ConnectorEnum::Old(Box::new(&connector::Nexixpay))) // } enums::Connector::Paypal => { Ok(ConnectorEnum::Old(Box::new(connector::Paypal::new()))) } enums::Connector::Paysafe => { Ok(ConnectorEnum::Old(Box::new(connector::Paysafe::new()))) } enums::Connector::Paystack => { Ok(ConnectorEnum::Old(Box::new(connector::Paystack::new()))) } // enums::Connector::Thunes => Ok(ConnectorEnum::Old(Box::new(connector::Thunes))), enums::Connector::Tesouro => { Ok(ConnectorEnum::Old(Box::new(connector::Tesouro::new()))) } enums::Connector::Tokenex => Ok(ConnectorEnum::Old(Box::new(&connector::Tokenex))), enums::Connector::Tokenio => { Ok(ConnectorEnum::Old(Box::new(connector::Tokenio::new()))) } enums::Connector::Trustpay => { Ok(ConnectorEnum::Old(Box::new(connector::Trustpay::new()))) } enums::Connector::Trustpayments => Ok(ConnectorEnum::Old(Box::new( connector::Trustpayments::new(), ))), enums::Connector::Tsys => Ok(ConnectorEnum::Old(Box::new(connector::Tsys::new()))), // enums::Connector::UnifiedAuthenticationService => Ok(ConnectorEnum::Old(Box::new( // connector::UnifiedAuthenticationService, // ))), enums::Connector::Vgs => Ok(ConnectorEnum::Old(Box::new(&connector::Vgs))), enums::Connector::Volt => Ok(ConnectorEnum::Old(Box::new(connector::Volt::new()))), enums::Connector::Wellsfargo => { Ok(ConnectorEnum::Old(Box::new(connector::Wellsfargo::new()))) } // enums::Connector::Wellsfargopayout => { // Ok(Box::new(connector::Wellsfargopayout::new())) // } enums::Connector::Zen => Ok(ConnectorEnum::Old(Box::new(&connector::Zen))), enums::Connector::Zsl => Ok(ConnectorEnum::Old(Box::new(&connector::Zsl))), enums::Connector::Plaid => { Ok(ConnectorEnum::Old(Box::new(connector::Plaid::new()))) } enums::Connector::Signifyd | enums::Connector::Riskified | enums::Connector::Gpayments | enums::Connector::Threedsecureio | enums::Connector::Cardinal | enums::Connector::Taxjar => { Err(report!(errors::ConnectorError::InvalidConnectorName) .attach_printable(format!("invalid connector name: {connector_name}"))) .change_context(errors::ApiErrorResponse::InternalServerError) } enums::Connector::Phonepe => Ok(ConnectorEnum::Old(Box::new(Phonepe::new()))), enums::Connector::Paytm => Ok(ConnectorEnum::Old(Box::new(Paytm::new()))), }, Err(_) => Err(report!(errors::ConnectorError::InvalidConnectorName) .attach_printable(format!("invalid connector name: {connector_name}"))) .change_context(errors::ApiErrorResponse::InternalServerError), } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 796, "total_crates": null }
fn_clm_router_get_connector_by_name_3161772835303060188
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/api/connector_mapping // Implementation of None for ConnectorData pub fn get_connector_by_name( _connectors: &Connectors, name: &str, connector_type: GetToken, connector_id: Option<common_utils::id_type::MerchantConnectorAccountId>, ) -> CustomResult<Self, errors::ApiErrorResponse> { let connector = Self::convert_connector(name)?; let connector_name = enums::Connector::from_str(name) .change_context(errors::ConnectorError::InvalidConnectorName) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable_lazy(|| format!("unable to parse connector name {name}"))?; Ok(Self { connector, connector_name, get_token: connector_type, merchant_connector_id: connector_id, }) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 190, "total_crates": null }
fn_clm_router_get_payout_connector_by_name_3161772835303060188
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/api/connector_mapping // Implementation of None for ConnectorData pub fn get_payout_connector_by_name( _connectors: &Connectors, name: &str, connector_type: GetToken, connector_id: Option<common_utils::id_type::MerchantConnectorAccountId>, ) -> CustomResult<Self, errors::ApiErrorResponse> { let connector = Self::convert_connector(name)?; let payout_connector_name = enums::PayoutConnectors::from_str(name) .change_context(errors::ConnectorError::InvalidConnectorName) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable_lazy(|| format!("unable to parse payout connector name {name}"))?; let connector_name = enums::Connector::from(payout_connector_name); Ok(Self { connector, connector_name, get_token: connector_type, merchant_connector_id: connector_id, }) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 45, "total_crates": null }
fn_clm_router_get_external_vault_connector_by_name_3161772835303060188
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/api/connector_mapping // Implementation of None for ConnectorData pub fn get_external_vault_connector_by_name( _connectors: &Connectors, connector: String, connector_type: GetToken, connector_id: Option<common_utils::id_type::MerchantConnectorAccountId>, ) -> CustomResult<Self, errors::ApiErrorResponse> { let connector_enum = Self::convert_connector(&connector)?; let external_vault_connector_name = enums::VaultConnectors::from_str(&connector) .change_context(errors::ConnectorError::InvalidConnectorName) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable_lazy(|| { format!("unable to parse external vault connector name {connector:?}") })?; let connector_name = enums::Connector::from(external_vault_connector_name); Ok(Self { connector: connector_enum, connector_name, get_token: connector_type, merchant_connector_id: connector_id, }) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 45, "total_crates": null }
fn_clm_router_validate_4973420165449926019
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/api/payment_methods // Implementation of PaymentMethodIntentConfirm for PaymentMethodCreateExt fn validate(&self) -> RouterResult<()> { utils::when( !validate_payment_method_type_against_payment_method( self.payment_method_type, self.payment_method_subtype, ), || { Err(report!(errors::ApiErrorResponse::InvalidRequestData { message: "Invalid 'payment_method_type' provided".to_string() }) .attach_printable("Invalid payment method type")) }, )?; utils::when( !Self::validate_payment_method_data_against_payment_method( self.payment_method_type, self.payment_method_data.clone(), ), || { Err(report!(errors::ApiErrorResponse::InvalidRequestData { message: "Invalid 'payment_method_data' provided".to_string() }) .attach_printable("Invalid payment method data")) }, )?; Ok(()) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 223, "total_crates": null }
fn_clm_router_foreign_from_-5497046619853540737
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/api/refunds // Implementation of RefundStatus for ForeignFrom<storage_enums::RefundStatus> fn foreign_from(status: storage_enums::RefundStatus) -> Self { match status { storage_enums::RefundStatus::Failure | storage_enums::RefundStatus::TransactionFailure => Self::Failed, storage_enums::RefundStatus::ManualReview => Self::Review, storage_enums::RefundStatus::Pending => Self::Pending, storage_enums::RefundStatus::Success => Self::Succeeded, } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 212, "total_crates": null }
fn_clm_router_get_connector_by_name_1888903689007091221
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/api/fraud_check // Inherent implementation for FraudCheckConnectorData pub fn get_connector_by_name(name: &str) -> CustomResult<Self, errors::ApiErrorResponse> { let connector_name = enums::FrmConnectors::from_str(name) .change_context(errors::ApiErrorResponse::IncorrectConnectorNameGiven) .attach_printable_lazy(|| { format!("unable to parse connector: {:?}", name.to_string()) })?; let connector = Self::convert_connector(connector_name)?; Ok(Self { connector, connector_name, }) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 188, "total_crates": null }
fn_clm_router_convert_connector_1888903689007091221
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/api/fraud_check // Inherent implementation for FraudCheckConnectorData fn convert_connector( connector_name: enums::FrmConnectors, ) -> CustomResult<ConnectorEnum, errors::ApiErrorResponse> { match connector_name { enums::FrmConnectors::Signifyd => { Ok(ConnectorEnum::Old(Box::new(&connector::Signifyd))) } enums::FrmConnectors::Riskified => { Ok(ConnectorEnum::Old(Box::new(connector::Riskified::new()))) } } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 48, "total_crates": null }
fn_clm_router_get_payment_intent_id_-6291202507307243748
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/api/payments // Implementation of PaymentIdType for PaymentIdTypeExt fn get_payment_intent_id( &self, ) -> errors::CustomResult<common_utils::id_type::GlobalPaymentId, errors::ValidationError> { match self { Self::PaymentIntentId(id) => Ok(id.clone()), Self::ConnectorTransactionId(_) | Self::PaymentAttemptId(_) | Self::PreprocessingId(_) => Err(errors::ValidationError::IncorrectValueProvided { field_name: "payment_id", }) .attach_printable("Expected payment intent ID but got connector transaction ID"), } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 66, "total_crates": null }
fn_clm_router_card_-6291202507307243748
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/api/payments fn card() -> Card { Card { card_number: "1234432112344321".to_string().try_into().unwrap(), card_exp_month: "12".to_string().into(), card_exp_year: "99".to_string().into(), card_holder_name: Some(masking::Secret::new("JohnDoe".to_string())), card_cvc: "123".to_string().into(), card_issuer: Some("HDFC".to_string()), card_network: Some(api_models::enums::CardNetwork::Visa), bank_code: None, card_issuing_country: None, card_type: None, nick_name: Some(masking::Secret::new("nick_name".into())), } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 29, "total_crates": null }
fn_clm_router_validate_and_get_mandate_type_-6291202507307243748
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/api/payments // Implementation of MandateValidationFields for MandateValidationFieldsExt fn validate_and_get_mandate_type( &self, ) -> errors::CustomResult<Option<MandateTransactionType>, errors::ValidationError> { match (&self.mandate_data, &self.recurring_details) { (None, None) => Ok(None), (Some(_), Some(_)) => Err(errors::ValidationError::InvalidValue { message: "Expected one out of recurring_details and mandate_data but got both" .to_string(), } .into()), (_, Some(_)) => Ok(Some(MandateTransactionType::RecurringMandateTransaction)), (Some(_), _) => Ok(Some(MandateTransactionType::NewMandateTransaction)), } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 15, "total_crates": null }
fn_clm_router_payments_request_-6291202507307243748
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/api/payments fn payments_request() -> PaymentsRequest { PaymentsRequest { amount: Some(Amount::from(common_utils::types::MinorUnit::new(200))), payment_method_data: Some(PaymentMethodDataRequest { payment_method_data: Some(PaymentMethodData::Card(card())), billing: None, }), ..PaymentsRequest::default() } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 13, "total_crates": null }
fn_clm_router_test_connector_id_type_-6291202507307243748
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/api/payments fn test_connector_id_type() { let sample_1 = PaymentIdType::PaymentIntentId( common_utils::id_type::PaymentId::try_from(std::borrow::Cow::Borrowed( "test_234565430uolsjdnf48i0", )) .unwrap(), ); let s_sample_1 = serde_json::to_string(&sample_1).unwrap(); let ds_sample_1 = serde_json::from_str::<PaymentIdType>(&s_sample_1).unwrap(); assert_eq!(ds_sample_1, sample_1) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 8, "total_crates": null }
fn_clm_router_foreign_try_from_2643980981202016043
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/api/files // Implementation of FileUploadProvider for ForeignTryFrom<&types::Connector> fn foreign_try_from(item: &types::Connector) -> Result<Self, Self::Error> { match *item { types::Connector::Stripe => Ok(Self::Stripe), types::Connector::Checkout => Ok(Self::Checkout), types::Connector::Worldpayvantiv => Ok(Self::Worldpayvantiv), _ => Err(errors::ApiErrorResponse::NotSupported { message: "Connector not supported as file provider".to_owned(), } .into()), } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 432, "total_crates": null }
fn_clm_router_get_payment_authorize_data_-2388628864099399410
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/api/verify_connector // Inherent implementation for VerifyConnectorData fn get_payment_authorize_data(&self) -> types::PaymentsAuthorizeData { types::PaymentsAuthorizeData { payment_method_data: domain::PaymentMethodData::Card(self.card_details.clone()), email: None, customer_name: None, amount: 1000, minor_amount: common_utils::types::MinorUnit::new(1000), confirm: true, order_tax_amount: None, currency: storage_enums::Currency::USD, metadata: None, mandate_id: None, webhook_url: None, customer_id: None, off_session: None, browser_info: None, session_token: None, order_details: None, order_category: None, capture_method: None, enrolled_for_3ds: false, router_return_url: None, surcharge_details: None, setup_future_usage: None, payment_experience: None, payment_method_type: None, statement_descriptor: None, setup_mandate_details: None, complete_authorize_url: None, related_transaction_id: None, statement_descriptor_suffix: None, request_extended_authorization: None, request_incremental_authorization: false, authentication_data: None, customer_acceptance: None, split_payments: None, merchant_order_reference_id: None, integrity_object: None, additional_payment_method_data: None, shipping_cost: None, merchant_account_id: None, merchant_config_currency: None, connector_testing_data: None, order_id: None, locale: None, payment_channel: None, enable_partial_authorization: None, enable_overcapture: None, is_stored_credential: None, mit_category: None, } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 221, "total_crates": null }
fn_clm_router_verify_-2388628864099399410
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/api/verify_connector async fn verify( state: &SessionState, connector_data: VerifyConnectorData, ) -> errors::RouterResponse<()> { let authorize_data = connector_data.get_payment_authorize_data(); let access_token = Self::get_access_token(state, connector_data.clone()).await?; let router_data = connector_data.get_router_data(state, authorize_data, access_token); let request = connector_data .connector .get_connector_integration() .build_request(&router_data, &state.conf.connectors) .change_context(errors::ApiErrorResponse::InvalidRequestData { message: "Payment request cannot be built".to_string(), })? .ok_or(errors::ApiErrorResponse::InternalServerError)?; let response = services::call_connector_api(&state.to_owned(), request, "verify_connector_request") .await .change_context(errors::ApiErrorResponse::InternalServerError)?; match response { Ok(_) => Ok(services::ApplicationResponse::StatusOk), Err(error_response) => { Self::handle_payment_error_response::< api::Authorize, types::PaymentFlowData, types::PaymentsAuthorizeData, types::PaymentsResponseData, >( connector_data.connector.get_connector_integration(), error_response, ) .await } } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 47, "total_crates": null }
fn_clm_router_get_router_data_-2388628864099399410
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/api/verify_connector // Inherent implementation for VerifyConnectorData fn get_router_data<F, R1, R2>( &self, state: &SessionState, request_data: R1, access_token: Option<types::AccessToken>, ) -> types::RouterData<F, R1, R2> { let attempt_id = common_utils::generate_id_with_default_len(consts::VERIFY_CONNECTOR_ID_PREFIX); types::RouterData { flow: std::marker::PhantomData, status: storage_enums::AttemptStatus::Started, request: request_data, response: Err(errors::ApiErrorResponse::InternalServerError.into()), connector: self.connector.id().to_string(), auth_type: storage_enums::AuthenticationType::NoThreeDs, test_mode: None, attempt_id: attempt_id.clone(), description: None, customer_id: None, tenant_id: state.tenant.tenant_id.clone(), merchant_id: common_utils::id_type::MerchantId::default(), reference_id: None, access_token, session_token: None, payment_method: storage_enums::PaymentMethod::Card, payment_method_type: None, amount_captured: None, minor_amount_captured: None, preprocessing_id: None, connector_customer: None, connector_auth_type: self.connector_auth.clone(), connector_meta_data: None, connector_wallets_details: None, payment_method_token: None, connector_api_version: None, recurring_mandate_payment_data: None, payment_method_status: None, connector_request_reference_id: attempt_id, address: types::PaymentAddress::new(None, None, None, None), payment_id: common_utils::id_type::PaymentId::default() .get_string_repr() .to_owned(), #[cfg(feature = "payouts")] payout_method_data: None, #[cfg(feature = "payouts")] quote_id: None, payment_method_balance: None, connector_http_status_code: None, external_latency: None, apple_pay_flow: None, frm_metadata: None, refund_id: None, dispute_id: None, connector_response: None, integrity_check: Ok(()), additional_merchant_data: None, header_payload: None, connector_mandate_request_reference_id: None, authentication_id: None, psd2_sca_exemption_type: None, raw_connector_response: None, is_payment_id_from_merchant: None, l2_l3_data: None, minor_amount_capturable: None, authorized_amount: None, } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 38, "total_crates": null }
fn_clm_router_get_access_token_-2388628864099399410
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/api/verify_connector async fn get_access_token( _state: &SessionState, _connector_data: VerifyConnectorData, ) -> errors::CustomResult<Option<types::AccessToken>, errors::ApiErrorResponse> { // AccessToken is None for the connectors without the AccessToken Flow. // If a connector has that, then it should override this implementation. Ok(None) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 33, "total_crates": null }
fn_clm_router_handle_payment_error_response_-2388628864099399410
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/api/verify_connector async fn handle_payment_error_response<F, ResourceCommonData, Req, Resp>( // connector: &(dyn api::Connector + Sync), connector: BoxedConnectorIntegrationInterface<F, ResourceCommonData, Req, Resp>, error_response: types::Response, ) -> errors::RouterResponse<()> { let error = connector .get_error_response(error_response, None) .change_context(errors::ApiErrorResponse::InternalServerError)?; Err(errors::ApiErrorResponse::InvalidRequestData { message: error.reason.unwrap_or(error.message), } .into()) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 8, "total_crates": null }
fn_clm_router_from_db_payment_link_2104118499589004105
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/api/payment_link // Implementation of RetrievePaymentLinkResponse for PaymentLinkResponseExt async fn from_db_payment_link(payment_link: storage::PaymentLink) -> RouterResult<Self> { let session_expiry = payment_link.fulfilment_time.unwrap_or_else(|| { payment_link .created_at .saturating_add(time::Duration::seconds(DEFAULT_SESSION_EXPIRY)) }); let status = payment_link::check_payment_link_status(session_expiry); Ok(Self { link_to_pay: payment_link.link_to_pay, payment_link_id: payment_link.payment_link_id, amount: payment_link.amount, description: payment_link.description, created_at: payment_link.created_at, merchant_id: payment_link.merchant_id, expiry: payment_link.fulfilment_time, currency: payment_link.currency, status, secure_link: payment_link.secure_link, }) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 19, "total_crates": null }
fn_clm_router_foreign_from_-8060588312794801528
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/api/customers // Implementation of CustomerResponse for ForeignFrom<customer::Customer> fn foreign_from(cust: domain::Customer) -> Self { customers::CustomerResponse { id: cust.id, merchant_reference_id: cust.merchant_reference_id, connector_customer_ids: cust.connector_customer, name: cust.name, email: cust.email, phone: cust.phone, phone_country_code: cust.phone_country_code, description: cust.description, created_at: cust.created_at, metadata: cust.metadata, default_billing_address: None, default_shipping_address: None, default_payment_method_id: cust.default_payment_method_id, tax_registration_id: cust.tax_registration_id, } .into() }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 214, "total_crates": null }
fn_clm_router_get_api_event_type_-8060588312794801528
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/api/customers // Implementation of CustomerResponse for common_utils::events::ApiEventMetric fn get_api_event_type(&self) -> Option<common_utils::events::ApiEventsType> { self.0.get_api_event_type() }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 28, "total_crates": null }
fn_clm_router_try_from_2536832215170875581
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/api/authentication // Implementation of AuthenticationResponse for TryFrom<storage::Authentication> fn try_from(authentication: storage::Authentication) -> Result<Self, Self::Error> { let trans_status = authentication.trans_status.ok_or(errors::ApiErrorResponse::InternalServerError).attach_printable("trans_status must be populated in authentication table authentication call is successful")?; let acs_url = authentication .acs_url .map(|url| url::Url::from_str(&url)) .transpose() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("not a valid URL")?; Ok(Self { trans_status, acs_url, challenge_request: authentication.challenge_request, acs_reference_number: authentication.acs_reference_number, acs_trans_id: authentication.acs_trans_id, three_dsserver_trans_id: authentication.threeds_server_transaction_id, acs_signed_content: authentication.acs_signed_content, challenge_request_key: authentication.challenge_request_key, }) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 2671, "total_crates": null }
fn_clm_router_get_connector_by_name_2536832215170875581
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/api/authentication // Inherent implementation for AuthenticationConnectorData pub fn get_connector_by_name(name: &str) -> CustomResult<Self, errors::ApiErrorResponse> { let connector_name = enums::AuthenticationConnectors::from_str(name) .change_context(errors::ApiErrorResponse::IncorrectConnectorNameGiven) .attach_printable_lazy(|| format!("unable to parse connector: {name}"))?; let connector = Self::convert_connector(connector_name)?; Ok(Self { connector, connector_name, }) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 188, "total_crates": null }
fn_clm_router_convert_connector_2536832215170875581
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/api/authentication // Inherent implementation for AuthenticationConnectorData fn convert_connector( connector_name: enums::AuthenticationConnectors, ) -> CustomResult<ConnectorEnum, errors::ApiErrorResponse> { match connector_name { enums::AuthenticationConnectors::Threedsecureio => { Ok(ConnectorEnum::Old(Box::new(&connector::Threedsecureio))) } enums::AuthenticationConnectors::Netcetera => { Ok(ConnectorEnum::Old(Box::new(&connector::Netcetera))) } enums::AuthenticationConnectors::Gpayments => { Ok(ConnectorEnum::Old(Box::new(connector::Gpayments::new()))) } enums::AuthenticationConnectors::CtpMastercard => { Ok(ConnectorEnum::Old(Box::new(&connector::CtpMastercard))) } enums::AuthenticationConnectors::CtpVisa => Ok(ConnectorEnum::Old(Box::new( connector::UnifiedAuthenticationService::new(), ))), enums::AuthenticationConnectors::UnifiedAuthenticationService => Ok( ConnectorEnum::Old(Box::new(connector::UnifiedAuthenticationService::new())), ), enums::AuthenticationConnectors::Juspaythreedsserver => Ok(ConnectorEnum::Old( Box::new(connector::Juspaythreedsserver::new()), )), enums::AuthenticationConnectors::Cardinal => Ok(ConnectorEnum::Old(Box::new( connector::UnifiedAuthenticationService::new(), ))), } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 80, "total_crates": null }
fn_clm_router_from_1210704699228309202
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/api/mandates // Implementation of MandateCardDetails for From<api::payment_methods::CardDetailFromLocker> fn from(card_details_from_locker: api::payment_methods::CardDetailFromLocker) -> Self { mandates::MandateCardDetails { last4_digits: card_details_from_locker.last4_digits, card_exp_month: card_details_from_locker.expiry_month.clone(), card_exp_year: card_details_from_locker.expiry_year.clone(), card_holder_name: card_details_from_locker.card_holder_name, card_token: None, scheme: None, issuer_country: card_details_from_locker .issuer_country .map(|country| country.to_string()), card_fingerprint: card_details_from_locker.card_fingerprint, card_isin: card_details_from_locker.card_isin, card_issuer: card_details_from_locker.card_issuer, card_network: card_details_from_locker.card_network, card_type: card_details_from_locker .card_type .as_ref() .map(|c| c.to_string()), nick_name: card_details_from_locker.nick_name, } .into() }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 2616, "total_crates": null }
fn_clm_router_from_db_mandate_1210704699228309202
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/types/api/mandates // Implementation of MandateResponse for MandateResponseExt async fn from_db_mandate( state: &SessionState, key_store: domain::MerchantKeyStore, mandate: storage::Mandate, merchant_account: &domain::MerchantAccount, ) -> RouterResult<Self> { todo!() }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 20, "total_crates": null }