id
stringlengths
11
116
type
stringclasses
1 value
granularity
stringclasses
4 values
content
stringlengths
16
477k
metadata
dict
fn_clm_router_decide_flows_-7801497263982683577
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/payments/flows/session_update_flow // Implementation of types::RouterData< api::SdkSessionUpdate, types::SdkPaymentsSessionUpdateData, types::PaymentsResponseData, > for Feature<api::SdkSessionUpdate, types::SdkPaymentsSessionUpdateData> async fn decide_flows<'a>( self, state: &SessionState, connector: &api::ConnectorData, call_connector_action: payments::CallConnectorAction, connector_request: Option<services::Request>, _business_profile: &domain::Profile, _header_payload: hyperswitch_domain_models::payments::HeaderPayload, _return_raw_connector_response: Option<bool>, ) -> RouterResult<Self> { let connector_integration: services::BoxedPaymentConnectorIntegrationInterface< api::SdkSessionUpdate, types::SdkPaymentsSessionUpdateData, types::PaymentsResponseData, > = connector.connector.get_connector_integration(); let resp = services::execute_connector_processing_step( state, connector_integration, &self, call_connector_action, connector_request, None, ) .await .to_payment_failed_response()?; Ok(resp) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 29, "total_crates": null }
fn_clm_router_build_flow_specific_connector_request_-7801497263982683577
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/payments/flows/session_update_flow // Implementation of types::RouterData< api::SdkSessionUpdate, types::SdkPaymentsSessionUpdateData, types::PaymentsResponseData, > for Feature<api::SdkSessionUpdate, types::SdkPaymentsSessionUpdateData> async fn build_flow_specific_connector_request( &mut self, state: &SessionState, connector: &api::ConnectorData, call_connector_action: payments::CallConnectorAction, ) -> RouterResult<(Option<services::Request>, bool)> { let request = match call_connector_action { payments::CallConnectorAction::Trigger => { let connector_integration: services::BoxedPaymentConnectorIntegrationInterface< api::SdkSessionUpdate, types::SdkPaymentsSessionUpdateData, types::PaymentsResponseData, > = connector.connector.get_connector_integration(); connector_integration .build_request(self, &state.conf.connectors) .to_payment_failed_response()? } _ => None, }; Ok((request, true)) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 29, "total_crates": null }
fn_clm_router_add_access_token_2838707987983047515
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/payments/flows/post_session_tokens_flow // Implementation of types::RouterData< api::PostSessionTokens, types::PaymentsPostSessionTokensData, types::PaymentsResponseData, > for Feature<api::PostSessionTokens, types::PaymentsPostSessionTokensData> async fn add_access_token<'a>( &self, state: &SessionState, connector: &api::ConnectorData, merchant_context: &domain::MerchantContext, creds_identifier: Option<&str>, ) -> RouterResult<types::AddAccessTokenResult> { Box::pin(access_token::add_access_token( state, connector, merchant_context, self, creds_identifier, )) .await }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 84, "total_crates": null }
fn_clm_router_construct_router_data_2838707987983047515
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/payments/flows/post_session_tokens_flow // Implementation of PaymentData<api::PostSessionTokens> for ConstructFlowSpecificData< api::PostSessionTokens, types::PaymentsPostSessionTokensData, types::PaymentsResponseData, > async fn construct_router_data<'a>( &self, state: &SessionState, connector_id: &str, merchant_context: &domain::MerchantContext, customer: &Option<domain::Customer>, merchant_connector_account: &domain::MerchantConnectorAccountTypeDetails, merchant_recipient_data: Option<types::MerchantRecipientData>, header_payload: Option<hyperswitch_domain_models::payments::HeaderPayload>, ) -> RouterResult<types::PaymentsPostSessionTokensRouterData> { todo!() }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 47, "total_crates": null }
fn_clm_router_decide_flows_2838707987983047515
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/payments/flows/post_session_tokens_flow // Implementation of types::RouterData< api::PostSessionTokens, types::PaymentsPostSessionTokensData, types::PaymentsResponseData, > for Feature<api::PostSessionTokens, types::PaymentsPostSessionTokensData> async fn decide_flows<'a>( self, state: &SessionState, connector: &api::ConnectorData, call_connector_action: payments::CallConnectorAction, connector_request: Option<services::Request>, _business_profile: &domain::Profile, _header_payload: hyperswitch_domain_models::payments::HeaderPayload, _return_raw_connector_response: Option<bool>, ) -> RouterResult<Self> { let connector_integration: services::BoxedPaymentConnectorIntegrationInterface< api::PostSessionTokens, types::PaymentsPostSessionTokensData, types::PaymentsResponseData, > = connector.connector.get_connector_integration(); let resp = services::execute_connector_processing_step( state, connector_integration, &self, call_connector_action, connector_request, None, ) .await .to_payment_failed_response()?; Ok(resp) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 29, "total_crates": null }
fn_clm_router_build_flow_specific_connector_request_2838707987983047515
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/payments/flows/post_session_tokens_flow // Implementation of types::RouterData< api::PostSessionTokens, types::PaymentsPostSessionTokensData, types::PaymentsResponseData, > for Feature<api::PostSessionTokens, types::PaymentsPostSessionTokensData> async fn build_flow_specific_connector_request( &mut self, state: &SessionState, connector: &api::ConnectorData, call_connector_action: payments::CallConnectorAction, ) -> RouterResult<(Option<services::Request>, bool)> { let request = match call_connector_action { payments::CallConnectorAction::Trigger => { let connector_integration: services::BoxedPaymentConnectorIntegrationInterface< api::PostSessionTokens, types::PaymentsPostSessionTokensData, types::PaymentsResponseData, > = connector.connector.get_connector_integration(); connector_integration .build_request(self, &state.conf.connectors) .to_payment_failed_response()? } _ => None, }; Ok((request, true)) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 29, "total_crates": null }
fn_clm_router_foreign_try_from_6060596560344223837
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/payments/flows/authorize_flow // Implementation of types::PaymentsCaptureData for ForeignTryFrom<types::RouterData<F, types::PaymentsAuthorizeData, types::PaymentsResponseData>> fn foreign_try_from( item: types::RouterData<F, types::PaymentsAuthorizeData, types::PaymentsResponseData>, ) -> Result<Self, Self::Error> { let response = item .response .map_err(|err| ApiErrorResponse::ExternalConnectorError { code: err.code, message: err.message, connector: item.connector.clone(), status_code: err.status_code, reason: err.reason, })?; Ok(Self { amount_to_capture: item.request.amount, currency: item.request.currency, connector_transaction_id: types::PaymentsResponseData::get_connector_transaction_id( &response, )?, payment_amount: item.request.amount, multiple_capture_data: None, connector_meta: types::PaymentsResponseData::get_connector_metadata(&response) .map(|secret| secret.expose()), browser_info: None, metadata: None, capture_method: item.request.capture_method, minor_payment_amount: item.request.minor_amount, minor_amount_to_capture: item.request.minor_amount, integrity_object: None, split_payments: item.request.split_payments, webhook_url: item.request.webhook_url, }) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 440, "total_crates": null }
fn_clm_router_get_payment_method_data_6060596560344223837
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/payments/flows/authorize_flow // Implementation of types::PaymentsAuthorizeData for mandate::MandateBehaviour fn get_payment_method_data(&self) -> domain::payments::PaymentMethodData { self.payment_method_data.clone() }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 94, "total_crates": null }
fn_clm_router_add_access_token_6060596560344223837
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/payments/flows/authorize_flow // Implementation of types::PaymentsAuthorizeRouterData for Feature<api::Authorize, types::PaymentsAuthorizeData> async fn add_access_token<'a>( &self, state: &SessionState, connector: &api::ConnectorData, merchant_context: &domain::MerchantContext, creds_identifier: Option<&str>, ) -> RouterResult<types::AddAccessTokenResult> { Box::pin(access_token::add_access_token( state, connector, merchant_context, self, creds_identifier, )) .await }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 84, "total_crates": null }
fn_clm_router_call_unified_connector_service_repeat_payment_6060596560344223837
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/payments/flows/authorize_flow async fn call_unified_connector_service_repeat_payment( router_data: &mut types::RouterData< api::Authorize, types::PaymentsAuthorizeData, types::PaymentsResponseData, >, state: &SessionState, header_payload: &domain_payments::HeaderPayload, lineage_ids: grpc_client::LineageIds, #[cfg(feature = "v1")] merchant_connector_account: helpers::MerchantConnectorAccountType, #[cfg(feature = "v2")] merchant_connector_account: domain::MerchantConnectorAccountTypeDetails, merchant_context: &domain::MerchantContext, unified_connector_service_execution_mode: enums::ExecutionMode, ) -> RouterResult<()> { let client = state .grpc_client .unified_connector_service_client .clone() .ok_or(ApiErrorResponse::InternalServerError) .attach_printable("Failed to fetch Unified Connector Service client")?; let payment_repeat_request = payments_grpc::PaymentServiceRepeatEverythingRequest::foreign_try_from(&*router_data) .change_context(ApiErrorResponse::InternalServerError) .attach_printable("Failed to construct Payment Repeat Request")?; let connector_auth_metadata = build_unified_connector_service_auth_metadata(merchant_connector_account, merchant_context) .change_context(ApiErrorResponse::InternalServerError) .attach_printable("Failed to construct request metadata")?; let merchant_order_reference_id = header_payload .x_reference_id .clone() .map(|id| id_type::PaymentReferenceId::from_str(id.as_str())) .transpose() .inspect_err(|err| logger::warn!(error=?err, "Invalid Merchant ReferenceId found")) .ok() .flatten() .map(ucs_types::UcsReferenceId::Payment); let headers_builder = state .get_grpc_headers_ucs(unified_connector_service_execution_mode) .external_vault_proxy_metadata(None) .merchant_reference_id(merchant_order_reference_id) .lineage_ids(lineage_ids); let updated_router_data = Box::pin(ucs_logging_wrapper( router_data.clone(), state, payment_repeat_request, headers_builder, |mut router_data, payment_repeat_request, grpc_headers| async move { let response = client .payment_repeat( payment_repeat_request, connector_auth_metadata.clone(), grpc_headers, ) .await .change_context(ApiErrorResponse::InternalServerError) .attach_printable("Failed to repeat payment")?; let payment_repeat_response = response.into_inner(); let (router_data_response, status_code) = handle_unified_connector_service_response_for_payment_repeat( payment_repeat_response.clone(), ) .change_context(ApiErrorResponse::InternalServerError) .attach_printable("Failed to deserialize UCS response")?; let router_data_response = router_data_response.map(|(response, status)| { router_data.status = status; response }); router_data.response = router_data_response; router_data.raw_connector_response = payment_repeat_response .raw_connector_response .clone() .map(Secret::new); router_data.connector_http_status_code = Some(status_code); Ok((router_data, payment_repeat_response)) }, )) .await?; // Copy back the updated data *router_data = updated_router_data; Ok(()) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 77, "total_crates": null }
fn_clm_router_call_unified_connector_service_authorize_6060596560344223837
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/payments/flows/authorize_flow async fn call_unified_connector_service_authorize( router_data: &mut types::RouterData< api::Authorize, types::PaymentsAuthorizeData, types::PaymentsResponseData, >, state: &SessionState, header_payload: &domain_payments::HeaderPayload, lineage_ids: grpc_client::LineageIds, #[cfg(feature = "v1")] merchant_connector_account: helpers::MerchantConnectorAccountType, #[cfg(feature = "v2")] merchant_connector_account: domain::MerchantConnectorAccountTypeDetails, merchant_context: &domain::MerchantContext, unified_connector_service_execution_mode: enums::ExecutionMode, ) -> RouterResult<()> { let client = state .grpc_client .unified_connector_service_client .clone() .ok_or(ApiErrorResponse::InternalServerError) .attach_printable("Failed to fetch Unified Connector Service client")?; let payment_authorize_request = payments_grpc::PaymentServiceAuthorizeRequest::foreign_try_from(&*router_data) .change_context(ApiErrorResponse::InternalServerError) .attach_printable("Failed to construct Payment Authorize Request")?; let connector_auth_metadata = build_unified_connector_service_auth_metadata(merchant_connector_account, merchant_context) .change_context(ApiErrorResponse::InternalServerError) .attach_printable("Failed to construct request metadata")?; let merchant_order_reference_id = header_payload .x_reference_id .clone() .map(|id| id_type::PaymentReferenceId::from_str(id.as_str())) .transpose() .inspect_err(|err| logger::warn!(error=?err, "Invalid Merchant ReferenceId found")) .ok() .flatten() .map(ucs_types::UcsReferenceId::Payment); let headers_builder = state .get_grpc_headers_ucs(unified_connector_service_execution_mode) .external_vault_proxy_metadata(None) .merchant_reference_id(merchant_order_reference_id) .lineage_ids(lineage_ids); let updated_router_data = Box::pin(ucs_logging_wrapper( router_data.clone(), state, payment_authorize_request, headers_builder, |mut router_data, payment_authorize_request, grpc_headers| async move { let response = client .payment_authorize( payment_authorize_request, connector_auth_metadata, grpc_headers, ) .await .change_context(ApiErrorResponse::InternalServerError) .attach_printable("Failed to authorize payment")?; let payment_authorize_response = response.into_inner(); let (router_data_response, status_code) = handle_unified_connector_service_response_for_payment_authorize( payment_authorize_response.clone(), ) .change_context(ApiErrorResponse::InternalServerError) .attach_printable("Failed to deserialize UCS response")?; let router_data_response = router_data_response.map(|(response, status)| { router_data.status = status; response }); router_data.response = router_data_response; router_data.raw_connector_response = payment_authorize_response .raw_connector_response .clone() .map(Secret::new); router_data.connector_http_status_code = Some(status_code); Ok((router_data, payment_authorize_response)) }, )) .await?; // Copy back the updated data *router_data = updated_router_data; Ok(()) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 75, "total_crates": null }
fn_clm_router_add_access_token_8990765474666681495
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/payments/flows/capture_flow // Implementation of types::RouterData<api::Capture, types::PaymentsCaptureData, types::PaymentsResponseData> for Feature<api::Capture, types::PaymentsCaptureData> async fn add_access_token<'a>( &self, state: &SessionState, connector: &api::ConnectorData, merchant_context: &domain::MerchantContext, creds_identifier: Option<&str>, ) -> RouterResult<types::AddAccessTokenResult> { Box::pin(access_token::add_access_token( state, connector, merchant_context, self, creds_identifier, )) .await }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 84, "total_crates": null }
fn_clm_router_construct_router_data_8990765474666681495
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/payments/flows/capture_flow // Implementation of hyperswitch_domain_models::payments::PaymentCaptureData<api::Capture> for ConstructFlowSpecificData<api::Capture, types::PaymentsCaptureData, types::PaymentsResponseData> async fn construct_router_data<'a>( &self, state: &SessionState, connector_id: &str, merchant_context: &domain::MerchantContext, customer: &Option<domain::Customer>, merchant_connector_account: &domain::MerchantConnectorAccountTypeDetails, merchant_recipient_data: Option<types::MerchantRecipientData>, header_payload: Option<hyperswitch_domain_models::payments::HeaderPayload>, ) -> RouterResult< types::RouterData<api::Capture, types::PaymentsCaptureData, types::PaymentsResponseData>, > { Box::pin(transformers::construct_payment_router_data_for_capture( state, self.clone(), connector_id, merchant_context, customer, merchant_connector_account, merchant_recipient_data, header_payload, )) .await }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 53, "total_crates": null }
fn_clm_router_decide_flows_8990765474666681495
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/payments/flows/capture_flow // Implementation of types::RouterData<api::Capture, types::PaymentsCaptureData, types::PaymentsResponseData> for Feature<api::Capture, types::PaymentsCaptureData> async fn decide_flows<'a>( self, state: &SessionState, connector: &api::ConnectorData, call_connector_action: payments::CallConnectorAction, connector_request: Option<services::Request>, _business_profile: &domain::Profile, _header_payload: hyperswitch_domain_models::payments::HeaderPayload, _return_raw_connector_response: Option<bool>, ) -> RouterResult<Self> { let connector_integration: services::BoxedPaymentConnectorIntegrationInterface< api::Capture, types::PaymentsCaptureData, types::PaymentsResponseData, > = connector.connector.get_connector_integration(); let mut new_router_data = services::execute_connector_processing_step( state, connector_integration, &self, call_connector_action, connector_request, None, ) .await .to_payment_failed_response()?; // Initiating Integrity check let integrity_result = helpers::check_integrity_based_on_flow( &new_router_data.request, &new_router_data.response, ); new_router_data.integrity_check = integrity_result; Ok(new_router_data) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 31, "total_crates": null }
fn_clm_router_build_flow_specific_connector_request_8990765474666681495
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/payments/flows/capture_flow // Implementation of types::RouterData<api::Capture, types::PaymentsCaptureData, types::PaymentsResponseData> for Feature<api::Capture, types::PaymentsCaptureData> async fn build_flow_specific_connector_request( &mut self, state: &SessionState, connector: &api::ConnectorData, call_connector_action: payments::CallConnectorAction, ) -> RouterResult<(Option<services::Request>, bool)> { let request = match call_connector_action { payments::CallConnectorAction::Trigger => { let connector_integration: services::BoxedPaymentConnectorIntegrationInterface< api::Capture, types::PaymentsCaptureData, types::PaymentsResponseData, > = connector.connector.get_connector_integration(); connector_integration .build_request(self, &state.conf.connectors) .to_payment_failed_response()? } _ => None, }; Ok((request, true)) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 29, "total_crates": null }
fn_clm_router_to_domain_8834763702262216253
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/fraud_check/operation fn to_domain(&self) -> RouterResult<&dyn Domain<F, D>> { Err(report!(errors::ApiErrorResponse::InternalServerError)) .attach_printable_lazy(|| format!("domain interface not found for {self:?}")) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 86, "total_crates": null }
fn_clm_router_to_update_tracker_8834763702262216253
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/fraud_check/operation fn to_update_tracker(&self) -> RouterResult<&(dyn UpdateTracker<FrmData, F, D> + Send + Sync)> { Err(report!(errors::ApiErrorResponse::InternalServerError)) .attach_printable_lazy(|| format!("get tracker interface not found for {self:?}")) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 50, "total_crates": null }
fn_clm_router_to_get_tracker_8834763702262216253
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/fraud_check/operation fn to_get_tracker(&self) -> RouterResult<&(dyn GetTracker<PaymentToFrmData> + Send + Sync)> { Err(report!(errors::ApiErrorResponse::InternalServerError)) .attach_printable_lazy(|| format!("get tracker interface not found for {self:?}")) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 38, "total_crates": null }
fn_clm_router_execute_post_tasks_8834763702262216253
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/fraud_check/operation async fn execute_post_tasks( &self, _state: &SessionState, _req_state: ReqState, frm_data: &mut FrmData, _merchant_context: &domain::MerchantContext, _frm_configs: FrmConfigsObject, _frm_suggestion: &mut Option<FrmSuggestion>, _payment_data: &mut D, _customer: &Option<domain::Customer>, _should_continue_capture: &mut bool, ) -> RouterResult<Option<FrmData>> where F: Send + Clone, { return Ok(Some(frm_data.to_owned())); }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 5, "total_crates": null }
fn_clm_router_to_domain_4480308078784258509
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/fraud_check/operation/fraud_check_pre // Implementation of FraudCheckPre for FraudCheckOperation<F, D> fn to_domain(&self) -> RouterResult<&dyn Domain<F, D>> { Ok(self) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 92, "total_crates": null }
fn_clm_router_get_trackers_4480308078784258509
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/fraud_check/operation/fraud_check_pre // Implementation of FraudCheckPre for GetTracker<PaymentToFrmData> async fn get_trackers<'a>( &'a self, state: &'a SessionState, payment_data: PaymentToFrmData, frm_connector_details: ConnectorDetailsCore, ) -> RouterResult<Option<FrmData>> { let db = &*state.store; let payment_details: Option<serde_json::Value> = PaymentDetails::from(payment_data.clone()) .encode_to_value() .ok(); let existing_fraud_check = db .find_fraud_check_by_payment_id_if_present( payment_data.payment_intent.get_id().to_owned(), payment_data.merchant_account.get_id().clone(), ) .await .ok(); let fraud_check = match existing_fraud_check { Some(Some(fraud_check)) => Ok(fraud_check), _ => { db.insert_fraud_check_response(FraudCheckNew { frm_id: Uuid::new_v4().simple().to_string(), payment_id: payment_data.payment_intent.get_id().to_owned(), merchant_id: payment_data.merchant_account.get_id().clone(), attempt_id: payment_data.payment_attempt.attempt_id.clone(), created_at: common_utils::date_time::now(), frm_name: frm_connector_details.connector_name, frm_transaction_id: None, frm_transaction_type: FraudCheckType::PreFrm, frm_status: FraudCheckStatus::Pending, frm_score: None, frm_reason: None, frm_error: None, payment_details, metadata: None, modified_at: common_utils::date_time::now(), last_step: FraudCheckLastStep::Processing, payment_capture_method: payment_data.payment_attempt.capture_method, }) .await } }; match fraud_check { Ok(fraud_check_value) => { let frm_data = FrmData { payment_intent: payment_data.payment_intent, payment_attempt: payment_data.payment_attempt, merchant_account: payment_data.merchant_account, address: payment_data.address, fraud_check: fraud_check_value, connector_details: payment_data.connector_details, order_details: payment_data.order_details, refund: None, frm_metadata: payment_data.frm_metadata, }; Ok(Some(frm_data)) } Err(error) => { router_env::logger::error!("inserting into fraud_check table failed {error:?}"); Ok(None) } } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 83, "total_crates": null }
fn_clm_router_update_tracker_4480308078784258509
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/fraud_check/operation/fraud_check_pre // Implementation of FraudCheckPre for UpdateTracker<FrmData, F, D> async fn update_tracker<'b>( &'b self, state: &SessionState, _key_store: &domain::MerchantKeyStore, mut frm_data: FrmData, payment_data: &mut D, _frm_suggestion: Option<FrmSuggestion>, frm_router_data: FrmRouterData, ) -> RouterResult<FrmData> { let frm_check_update = match frm_router_data.response { FrmResponse::Checkout(response) => match response { Err(err) => Some(FraudCheckUpdate::ErrorUpdate { status: FraudCheckStatus::TransactionFailure, error_message: Some(Some(err.message)), }), Ok(payments_response) => match payments_response { FraudCheckResponseData::TransactionResponse { resource_id, connector_metadata, status, reason, score, } => { let connector_transaction_id = match resource_id { ResponseId::NoResponseId => None, ResponseId::ConnectorTransactionId(id) => Some(id), ResponseId::EncodedData(id) => Some(id), }; let fraud_check_update = FraudCheckUpdate::ResponseUpdate { frm_status: status, frm_transaction_id: connector_transaction_id, frm_reason: reason, frm_score: score, metadata: connector_metadata, modified_at: common_utils::date_time::now(), last_step: frm_data.fraud_check.last_step, payment_capture_method: frm_data.fraud_check.payment_capture_method, }; Some(fraud_check_update) } FraudCheckResponseData::FulfillmentResponse { order_id: _, shipment_ids: _, } => None, FraudCheckResponseData::RecordReturnResponse { resource_id: _, connector_metadata: _, return_id: _, } => Some(FraudCheckUpdate::ErrorUpdate { status: FraudCheckStatus::TransactionFailure, error_message: Some(Some( "Error: Got Record Return Response response in current Checkout flow" .to_string(), )), }), }, }, FrmResponse::Transaction(response) => match response { Err(err) => Some(FraudCheckUpdate::ErrorUpdate { status: FraudCheckStatus::TransactionFailure, error_message: Some(Some(err.message)), }), Ok(payments_response) => match payments_response { FraudCheckResponseData::TransactionResponse { resource_id, connector_metadata, status, reason, score, } => { let connector_transaction_id = match resource_id { ResponseId::NoResponseId => None, ResponseId::ConnectorTransactionId(id) => Some(id), ResponseId::EncodedData(id) => Some(id), }; let frm_status = payment_data .get_frm_message() .as_ref() .map_or(status, |frm_data| frm_data.frm_status); let fraud_check_update = FraudCheckUpdate::ResponseUpdate { frm_status, frm_transaction_id: connector_transaction_id, frm_reason: reason, frm_score: score, metadata: connector_metadata, modified_at: common_utils::date_time::now(), last_step: frm_data.fraud_check.last_step, payment_capture_method: None, }; Some(fraud_check_update) } FraudCheckResponseData::FulfillmentResponse { order_id: _, shipment_ids: _, } => None, FraudCheckResponseData::RecordReturnResponse { resource_id: _, connector_metadata: _, return_id: _, } => Some(FraudCheckUpdate::ErrorUpdate { status: FraudCheckStatus::TransactionFailure, error_message: Some(Some( "Error: Got Record Return Response response in current Checkout flow" .to_string(), )), }), }, }, FrmResponse::Sale(_response) | FrmResponse::Fulfillment(_response) | FrmResponse::RecordReturn(_response) => Some(FraudCheckUpdate::ErrorUpdate { status: FraudCheckStatus::TransactionFailure, error_message: Some(Some( "Error: Got Pre(Sale) flow response in current post flow".to_string(), )), }), }; let db = &*state.store; frm_data.fraud_check = match frm_check_update { Some(fraud_check_update) => db .update_fraud_check_response_with_attempt_id( frm_data.clone().fraud_check, fraud_check_update, ) .await .map_err(|error| error.change_context(errors::ApiErrorResponse::PaymentNotFound))?, None => frm_data.clone().fraud_check, }; Ok(frm_data) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 58, "total_crates": null }
fn_clm_router_to_update_tracker_4480308078784258509
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/fraud_check/operation/fraud_check_pre // Implementation of FraudCheckPre for FraudCheckOperation<F, D> fn to_update_tracker(&self) -> RouterResult<&(dyn UpdateTracker<FrmData, F, D> + Send + Sync)> { Ok(self) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 56, "total_crates": null }
fn_clm_router_to_get_tracker_4480308078784258509
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/fraud_check/operation/fraud_check_pre // Implementation of FraudCheckPre for FraudCheckOperation<F, D> fn to_get_tracker(&self) -> RouterResult<&(dyn GetTracker<PaymentToFrmData> + Send + Sync)> { Ok(self) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 44, "total_crates": null }
fn_clm_router_update_tracker_535555780006497253
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/fraud_check/operation/fraud_check_post // Implementation of FraudCheckPost for UpdateTracker<FrmData, F, D> async fn update_tracker<'b>( &'b self, state: &SessionState, key_store: &domain::MerchantKeyStore, mut frm_data: FrmData, payment_data: &mut D, frm_suggestion: Option<FrmSuggestion>, frm_router_data: FrmRouterData, ) -> RouterResult<FrmData> { let db = &*state.store; let key_manager_state = &state.into(); let frm_check_update = match frm_router_data.response { FrmResponse::Sale(response) => match response { Err(err) => Some(FraudCheckUpdate::ErrorUpdate { status: FraudCheckStatus::TransactionFailure, error_message: Some(Some(err.message)), }), Ok(payments_response) => match payments_response { FraudCheckResponseData::TransactionResponse { resource_id, connector_metadata, status, reason, score, } => { let connector_transaction_id = match resource_id { ResponseId::NoResponseId => None, ResponseId::ConnectorTransactionId(id) => Some(id), ResponseId::EncodedData(id) => Some(id), }; let fraud_check_update = FraudCheckUpdate::ResponseUpdate { frm_status: status, frm_transaction_id: connector_transaction_id, frm_reason: reason, frm_score: score, metadata: connector_metadata, modified_at: common_utils::date_time::now(), last_step: frm_data.fraud_check.last_step, payment_capture_method: frm_data.fraud_check.payment_capture_method, }; Some(fraud_check_update) }, FraudCheckResponseData::RecordReturnResponse { resource_id: _, connector_metadata: _, return_id: _ } => { Some(FraudCheckUpdate::ErrorUpdate { status: FraudCheckStatus::TransactionFailure, error_message: Some(Some( "Error: Got Record Return Response response in current Sale flow".to_string(), )), }) } FraudCheckResponseData::FulfillmentResponse { order_id: _, shipment_ids: _, } => None, }, }, FrmResponse::Fulfillment(response) => match response { Err(err) => Some(FraudCheckUpdate::ErrorUpdate { status: FraudCheckStatus::TransactionFailure, error_message: Some(Some(err.message)), }), Ok(payments_response) => match payments_response { FraudCheckResponseData::TransactionResponse { resource_id, connector_metadata, status, reason, score, } => { let connector_transaction_id = match resource_id { ResponseId::NoResponseId => None, ResponseId::ConnectorTransactionId(id) => Some(id), ResponseId::EncodedData(id) => Some(id), }; let fraud_check_update = FraudCheckUpdate::ResponseUpdate { frm_status: status, frm_transaction_id: connector_transaction_id, frm_reason: reason, frm_score: score, metadata: connector_metadata, modified_at: common_utils::date_time::now(), last_step: frm_data.fraud_check.last_step, payment_capture_method: frm_data.fraud_check.payment_capture_method, }; Some(fraud_check_update) } FraudCheckResponseData::FulfillmentResponse { order_id: _, shipment_ids: _, } => None, FraudCheckResponseData::RecordReturnResponse { resource_id: _, connector_metadata: _, return_id: _ } => None, }, }, FrmResponse::RecordReturn(response) => match response { Err(err) => Some(FraudCheckUpdate::ErrorUpdate { status: FraudCheckStatus::TransactionFailure, error_message: Some(Some(err.message)), }), Ok(payments_response) => match payments_response { FraudCheckResponseData::TransactionResponse { resource_id: _, connector_metadata: _, status: _, reason: _, score: _, } => { Some(FraudCheckUpdate::ErrorUpdate { status: FraudCheckStatus::TransactionFailure, error_message: Some(Some( "Error: Got Transaction Response response in current Record Return flow".to_string(), )), }) }, FraudCheckResponseData::FulfillmentResponse {order_id: _, shipment_ids: _ } => { None }, FraudCheckResponseData::RecordReturnResponse { resource_id, connector_metadata, return_id: _ } => { let connector_transaction_id = match resource_id { ResponseId::NoResponseId => None, ResponseId::ConnectorTransactionId(id) => Some(id), ResponseId::EncodedData(id) => Some(id), }; let fraud_check_update = FraudCheckUpdate::ResponseUpdate { frm_status: frm_data.fraud_check.frm_status, frm_transaction_id: connector_transaction_id, frm_reason: frm_data.fraud_check.frm_reason.clone(), frm_score: frm_data.fraud_check.frm_score, metadata: connector_metadata, modified_at: common_utils::date_time::now(), last_step: frm_data.fraud_check.last_step, payment_capture_method: frm_data.fraud_check.payment_capture_method, }; Some(fraud_check_update) } }, }, FrmResponse::Checkout(_) | FrmResponse::Transaction(_) => { Some(FraudCheckUpdate::ErrorUpdate { status: FraudCheckStatus::TransactionFailure, error_message: Some(Some( "Error: Got Pre(Sale) flow response in current post flow".to_string(), )), }) } }; if let Some(frm_suggestion) = frm_suggestion { let (payment_attempt_status, payment_intent_status, merchant_decision, error_message) = match frm_suggestion { FrmSuggestion::FrmCancelTransaction => ( AttemptStatus::Failure, IntentStatus::Failed, Some(MerchantDecision::Rejected.to_string()), Some(Some(CANCEL_INITIATED.to_string())), ), FrmSuggestion::FrmManualReview => ( AttemptStatus::Unresolved, IntentStatus::RequiresMerchantAction, None, None, ), FrmSuggestion::FrmAuthorizeTransaction => ( AttemptStatus::Authorized, IntentStatus::RequiresCapture, None, None, ), }; let payment_attempt_update = PaymentAttemptUpdate::RejectUpdate { status: payment_attempt_status, error_code: Some(Some(frm_data.fraud_check.frm_status.to_string())), error_message, updated_by: frm_data.merchant_account.storage_scheme.to_string(), }; #[cfg(feature = "v1")] let payment_attempt = db .update_payment_attempt_with_attempt_id( payment_data.get_payment_attempt().clone(), payment_attempt_update, frm_data.merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::PaymentNotFound)?; #[cfg(feature = "v2")] let payment_attempt = db .update_payment_attempt_with_attempt_id( key_manager_state, key_store, payment_data.get_payment_attempt().clone(), payment_attempt_update, frm_data.merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::PaymentNotFound)?; payment_data.set_payment_attempt(payment_attempt); let payment_intent = db .update_payment_intent( key_manager_state, payment_data.get_payment_intent().clone(), PaymentIntentUpdate::RejectUpdate { status: payment_intent_status, merchant_decision, updated_by: frm_data.merchant_account.storage_scheme.to_string(), }, key_store, frm_data.merchant_account.storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::PaymentNotFound)?; payment_data.set_payment_intent(payment_intent); } frm_data.fraud_check = match frm_check_update { Some(fraud_check_update) => db .update_fraud_check_response_with_attempt_id( frm_data.fraud_check.clone(), fraud_check_update, ) .await .map_err(|error| error.change_context(errors::ApiErrorResponse::PaymentNotFound))?, None => frm_data.fraud_check.clone(), }; Ok(frm_data) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 96, "total_crates": null }
fn_clm_router_to_domain_535555780006497253
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/fraud_check/operation/fraud_check_post // Implementation of FraudCheckPost for FraudCheckOperation<F, D> fn to_domain(&self) -> RouterResult<&dyn Domain<F, D>> { Ok(self) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 92, "total_crates": null }
fn_clm_router_get_trackers_535555780006497253
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/fraud_check/operation/fraud_check_post // Implementation of FraudCheckPost for GetTracker<PaymentToFrmData> async fn get_trackers<'a>( &'a self, state: &'a SessionState, payment_data: PaymentToFrmData, frm_connector_details: ConnectorDetailsCore, ) -> RouterResult<Option<FrmData>> { let db = &*state.store; let payment_details: Option<serde_json::Value> = PaymentDetails::from(payment_data.clone()) .encode_to_value() .ok(); let existing_fraud_check = db .find_fraud_check_by_payment_id_if_present( payment_data.payment_intent.get_id().to_owned(), payment_data.merchant_account.get_id().clone(), ) .await .ok(); let fraud_check = match existing_fraud_check { Some(Some(fraud_check)) => Ok(fraud_check), _ => { db.insert_fraud_check_response(FraudCheckNew { frm_id: utils::generate_id(consts::ID_LENGTH, "frm"), payment_id: payment_data.payment_intent.get_id().to_owned(), merchant_id: payment_data.merchant_account.get_id().clone(), attempt_id: payment_data.payment_attempt.attempt_id.clone(), created_at: common_utils::date_time::now(), frm_name: frm_connector_details.connector_name, frm_transaction_id: None, frm_transaction_type: FraudCheckType::PostFrm, frm_status: FraudCheckStatus::Pending, frm_score: None, frm_reason: None, frm_error: None, payment_details, metadata: None, modified_at: common_utils::date_time::now(), last_step: FraudCheckLastStep::Processing, payment_capture_method: payment_data.payment_attempt.capture_method, }) .await } }; match fraud_check { Ok(fraud_check_value) => { let frm_data = FrmData { payment_intent: payment_data.payment_intent, payment_attempt: payment_data.payment_attempt, merchant_account: payment_data.merchant_account, address: payment_data.address, fraud_check: fraud_check_value, connector_details: payment_data.connector_details, order_details: payment_data.order_details, refund: None, frm_metadata: payment_data.frm_metadata, }; Ok(Some(frm_data)) } Err(error) => { router_env::logger::error!("inserting into fraud_check table failed {error:?}"); Ok(None) } } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 79, "total_crates": null }
fn_clm_router_to_update_tracker_535555780006497253
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/fraud_check/operation/fraud_check_post // Implementation of FraudCheckPost for FraudCheckOperation<F, D> fn to_update_tracker(&self) -> RouterResult<&(dyn UpdateTracker<FrmData, F, D> + Send + Sync)> { Ok(self) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 56, "total_crates": null }
fn_clm_router_execute_post_tasks_535555780006497253
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/fraud_check/operation/fraud_check_post // Implementation of FraudCheckPost for Domain<F, D> async fn execute_post_tasks( &self, state: &SessionState, req_state: ReqState, frm_data: &mut FrmData, merchant_context: &domain::MerchantContext, _frm_configs: FrmConfigsObject, frm_suggestion: &mut Option<FrmSuggestion>, payment_data: &mut D, customer: &Option<domain::Customer>, _should_continue_capture: &mut bool, ) -> RouterResult<Option<FrmData>> { if matches!(frm_data.fraud_check.frm_status, FraudCheckStatus::Fraud) && matches!( frm_data.fraud_check.last_step, FraudCheckLastStep::CheckoutOrSale ) { *frm_suggestion = Some(FrmSuggestion::FrmCancelTransaction); let cancel_req = api_models::payments::PaymentsCancelRequest { payment_id: frm_data.payment_intent.get_id().to_owned(), cancellation_reason: frm_data.fraud_check.frm_error.clone(), merchant_connector_details: None, }; let cancel_res = Box::pin(payments::payments_core::< Void, payment_types::PaymentsResponse, _, _, _, payments::PaymentData<Void>, >( state.clone(), req_state.clone(), merchant_context.clone(), None, payments::PaymentCancel, cancel_req, api::AuthFlow::Merchant, payments::CallConnectorAction::Trigger, None, HeaderPayload::default(), )) .await?; logger::debug!("payment_id : {:?} has been cancelled since it has been found fraudulent by configured frm connector",payment_data.get_payment_attempt().payment_id); if let services::ApplicationResponse::JsonWithHeaders((payments_response, _)) = cancel_res { payment_data.set_payment_intent_status(payments_response.status); } let _router_data = frm_core::call_frm_service::<F, frm_api::RecordReturn, _, D>( state, payment_data, &mut frm_data.to_owned(), merchant_context, customer, ) .await?; frm_data.fraud_check.last_step = FraudCheckLastStep::TransactionOrRecordRefund; } else if matches!( frm_data.fraud_check.frm_status, FraudCheckStatus::ManualReview ) { *frm_suggestion = Some(FrmSuggestion::FrmManualReview); } else if matches!(frm_data.fraud_check.frm_status, FraudCheckStatus::Legit) && matches!( frm_data.fraud_check.payment_capture_method, Some(CaptureMethod::Automatic) | Some(CaptureMethod::SequentialAutomatic) ) { let capture_request = api_models::payments::PaymentsCaptureRequest { payment_id: frm_data.payment_intent.get_id().to_owned(), merchant_id: None, amount_to_capture: None, refund_uncaptured_amount: None, statement_descriptor_suffix: None, statement_descriptor_prefix: None, merchant_connector_details: None, }; let capture_response = Box::pin(payments::payments_core::< Capture, payment_types::PaymentsResponse, _, _, _, payments::PaymentData<Capture>, >( state.clone(), req_state.clone(), merchant_context.clone(), None, payments::PaymentCapture, capture_request, api::AuthFlow::Merchant, payments::CallConnectorAction::Trigger, None, HeaderPayload::default(), )) .await?; logger::debug!("payment_id : {:?} has been captured since it has been found legit by configured frm connector",payment_data.get_payment_attempt().payment_id); if let services::ApplicationResponse::JsonWithHeaders((payments_response, _)) = capture_response { payment_data.set_payment_intent_status(payments_response.status); } }; return Ok(Some(frm_data.to_owned())); }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 49, "total_crates": null }
fn_clm_router_construct_router_data_4629892687201923230
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/fraud_check/flows/checkout_flow // Implementation of FrmData for ConstructFlowSpecificData<frm_api::Checkout, FraudCheckCheckoutData, FraudCheckResponseData> async fn construct_router_data<'a>( &self, state: &SessionState, connector_id: &str, merchant_context: &domain::MerchantContext, customer: &Option<domain::Customer>, merchant_connector_account: &helpers::MerchantConnectorAccountType, _merchant_recipient_data: Option<MerchantRecipientData>, header_payload: Option<hyperswitch_domain_models::payments::HeaderPayload>, _payment_method: Option<common_enums::PaymentMethod>, _payment_method_type: Option<common_enums::PaymentMethodType>, ) -> RouterResult<RouterData<frm_api::Checkout, FraudCheckCheckoutData, FraudCheckResponseData>> { use crate::connector::utils::PaymentsAttemptData; let status = storage_enums::AttemptStatus::Pending; let auth_type: ConnectorAuthType = merchant_connector_account .get_connector_account_details() .parse_value("ConnectorAuthType") .change_context(errors::ApiErrorResponse::MerchantConnectorAccountNotFound { id: "ConnectorAuthType".to_string(), })?; let browser_info: Option<BrowserInformation> = self.payment_attempt.get_browser_info().ok(); let customer_id = customer.to_owned().map(|customer| customer.customer_id); let router_data = RouterData { flow: std::marker::PhantomData, merchant_id: merchant_context.get_merchant_account().get_id().clone(), customer_id, tenant_id: state.tenant.tenant_id.clone(), connector: connector_id.to_string(), payment_id: self.payment_intent.payment_id.get_string_repr().to_owned(), attempt_id: self.payment_attempt.attempt_id.clone(), status, payment_method: self .payment_attempt .payment_method .ok_or(errors::ApiErrorResponse::PaymentMethodNotFound)?, payment_method_type: self.payment_attempt.payment_method_type, connector_auth_type: auth_type, description: None, payment_method_status: None, address: self.address.clone(), auth_type: storage_enums::AuthenticationType::NoThreeDs, connector_meta_data: None, connector_wallets_details: None, amount_captured: None, minor_amount_captured: None, request: FraudCheckCheckoutData { amount: self .payment_attempt .net_amount .get_total_amount() .get_amount_as_i64(), order_details: self.order_details.clone(), currency: self.payment_attempt.currency, browser_info, payment_method_data: self .payment_attempt .payment_method_data .as_ref() .map(|pm_data| { pm_data .clone() .parse_value::<api_models::payments::AdditionalPaymentData>( "AdditionalPaymentData", ) }) .transpose() .unwrap_or_default(), email: customer .clone() .and_then(|customer_data| { customer_data .email .map(|email| Email::try_from(email.into_inner().expose())) }) .transpose() .change_context(errors::ApiErrorResponse::InvalidDataValue { field_name: "customer.customer_data.email", })?, gateway: self.payment_attempt.connector.clone(), }, // self.order_details response: Ok(FraudCheckResponseData::TransactionResponse { resource_id: ResponseId::ConnectorTransactionId("".to_string()), connector_metadata: None, status: storage_enums::FraudCheckStatus::Pending, score: None, reason: None, }), access_token: None, session_token: None, reference_id: None, payment_method_token: None, connector_customer: None, preprocessing_id: None, connector_request_reference_id: uuid::Uuid::new_v4().to_string(), test_mode: None, recurring_mandate_payment_data: None, #[cfg(feature = "payouts")] payout_method_data: None, #[cfg(feature = "payouts")] quote_id: None, payment_method_balance: None, connector_http_status_code: None, external_latency: None, connector_api_version: None, apple_pay_flow: None, frm_metadata: self.frm_metadata.clone(), refund_id: None, dispute_id: None, connector_response: None, integrity_check: Ok(()), additional_merchant_data: None, header_payload, connector_mandate_request_reference_id: None, authentication_id: None, psd2_sca_exemption_type: None, raw_connector_response: None, is_payment_id_from_merchant: None, l2_l3_data: None, minor_amount_capturable: None, authorized_amount: None, }; Ok(router_data) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 127, "total_crates": null }
fn_clm_router_decide_frm_flow_4629892687201923230
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/fraud_check/flows/checkout_flow pub async fn decide_frm_flow( router_data: &mut FrmCheckoutRouterData, state: &SessionState, connector: &FraudCheckConnectorData, call_connector_action: payments::CallConnectorAction, _merchant_context: &domain::MerchantContext, ) -> RouterResult<FrmCheckoutRouterData> { let connector_integration: services::BoxedFrmConnectorIntegrationInterface< frm_api::Checkout, FraudCheckCheckoutData, FraudCheckResponseData, > = connector.connector.get_connector_integration(); let resp = services::execute_connector_processing_step( state, connector_integration, router_data, call_connector_action, None, None, ) .await .to_payment_failed_response()?; Ok(resp) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 28, "total_crates": null }
fn_clm_router_decide_frm_flows_4629892687201923230
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/fraud_check/flows/checkout_flow // Implementation of FrmCheckoutRouterData for FeatureFrm<frm_api::Checkout, FraudCheckCheckoutData> async fn decide_frm_flows<'a>( mut self, state: &SessionState, connector: &FraudCheckConnectorData, call_connector_action: payments::CallConnectorAction, merchant_context: &domain::MerchantContext, ) -> RouterResult<Self> { decide_frm_flow( &mut self, state, connector, call_connector_action, merchant_context, ) .await }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 13, "total_crates": null }
fn_clm_router_construct_router_data_-8304536785660957512
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/fraud_check/flows/transaction_flow // Implementation of FrmData for ConstructFlowSpecificData< frm_api::Transaction, FraudCheckTransactionData, FraudCheckResponseData, > async fn construct_router_data<'a>( &self, state: &SessionState, connector_id: &str, merchant_context: &domain::MerchantContext, customer: &Option<domain::Customer>, merchant_connector_account: &helpers::MerchantConnectorAccountType, _merchant_recipient_data: Option<MerchantRecipientData>, header_payload: Option<hyperswitch_domain_models::payments::HeaderPayload>, _payment_method: Option<common_enums::PaymentMethod>, _payment_method_type: Option<common_enums::PaymentMethodType>, ) -> RouterResult< RouterData<frm_api::Transaction, FraudCheckTransactionData, FraudCheckResponseData>, > { let status = storage_enums::AttemptStatus::Pending; let auth_type: ConnectorAuthType = merchant_connector_account .get_connector_account_details() .parse_value("ConnectorAuthType") .change_context(errors::ApiErrorResponse::MerchantConnectorAccountNotFound { id: "ConnectorAuthType".to_string(), })?; let customer_id = customer.to_owned().map(|customer| customer.customer_id); let payment_method = self.payment_attempt.payment_method; let currency = self.payment_attempt.currency; let router_data = RouterData { flow: std::marker::PhantomData, merchant_id: merchant_context.get_merchant_account().get_id().clone(), tenant_id: state.tenant.tenant_id.clone(), customer_id, connector: connector_id.to_string(), payment_id: self.payment_intent.payment_id.get_string_repr().to_owned(), attempt_id: self.payment_attempt.attempt_id.clone(), status, payment_method: self .payment_attempt .payment_method .ok_or(errors::ApiErrorResponse::PaymentMethodNotFound)?, payment_method_type: self.payment_attempt.payment_method_type, connector_auth_type: auth_type, description: None, address: self.address.clone(), auth_type: storage_enums::AuthenticationType::NoThreeDs, connector_meta_data: None, connector_wallets_details: None, amount_captured: None, minor_amount_captured: None, request: FraudCheckTransactionData { amount: self .payment_attempt .net_amount .get_total_amount() .get_amount_as_i64(), order_details: self.order_details.clone(), currency, payment_method, error_code: self.payment_attempt.error_code.clone(), error_message: self.payment_attempt.error_message.clone(), connector_transaction_id: self .payment_attempt .get_connector_payment_id() .map(ToString::to_string), connector: self.payment_attempt.connector.clone(), }, // self.order_details response: Ok(FraudCheckResponseData::TransactionResponse { resource_id: ResponseId::ConnectorTransactionId("".to_string()), connector_metadata: None, status: storage_enums::FraudCheckStatus::Pending, score: None, reason: None, }), access_token: None, session_token: None, reference_id: None, payment_method_token: None, connector_customer: None, preprocessing_id: None, connector_request_reference_id: uuid::Uuid::new_v4().to_string(), test_mode: None, recurring_mandate_payment_data: None, #[cfg(feature = "payouts")] payout_method_data: None, #[cfg(feature = "payouts")] quote_id: None, payment_method_balance: None, connector_http_status_code: None, external_latency: None, connector_api_version: None, payment_method_status: None, apple_pay_flow: None, frm_metadata: self.frm_metadata.clone(), refund_id: None, dispute_id: None, connector_response: None, integrity_check: Ok(()), additional_merchant_data: None, header_payload, connector_mandate_request_reference_id: None, authentication_id: None, psd2_sca_exemption_type: None, raw_connector_response: None, is_payment_id_from_merchant: None, l2_l3_data: None, minor_amount_capturable: None, authorized_amount: None, }; Ok(router_data) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 105, "total_crates": null }
fn_clm_router_decide_frm_flow_-8304536785660957512
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/fraud_check/flows/transaction_flow pub async fn decide_frm_flow( router_data: &mut FrmTransactionRouterData, state: &SessionState, connector: &frm_api::FraudCheckConnectorData, call_connector_action: payments::CallConnectorAction, _merchant_context: &domain::MerchantContext, ) -> RouterResult<FrmTransactionRouterData> { let connector_integration: services::BoxedFrmConnectorIntegrationInterface< frm_api::Transaction, FraudCheckTransactionData, FraudCheckResponseData, > = connector.connector.get_connector_integration(); let resp = services::execute_connector_processing_step( state, connector_integration, router_data, call_connector_action, None, None, ) .await .to_payment_failed_response()?; Ok(resp) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 28, "total_crates": null }
fn_clm_router_decide_frm_flows_-8304536785660957512
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/fraud_check/flows/transaction_flow // Implementation of FrmTransactionRouterData for FeatureFrm<frm_api::Transaction, FraudCheckTransactionData> async fn decide_frm_flows<'a>( mut self, state: &SessionState, connector: &frm_api::FraudCheckConnectorData, call_connector_action: payments::CallConnectorAction, merchant_context: &domain::MerchantContext, ) -> RouterResult<Self> { decide_frm_flow( &mut self, state, connector, call_connector_action, merchant_context, ) .await }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 13, "total_crates": null }
fn_clm_router_construct_router_data_-7729875027106564496
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/fraud_check/flows/sale_flow // Implementation of FrmData for ConstructFlowSpecificData<frm_api::Sale, FraudCheckSaleData, FraudCheckResponseData> async fn construct_router_data<'a>( &self, state: &SessionState, connector_id: &str, merchant_context: &domain::MerchantContext, customer: &Option<domain::Customer>, merchant_connector_account: &helpers::MerchantConnectorAccountType, _merchant_recipient_data: Option<MerchantRecipientData>, header_payload: Option<hyperswitch_domain_models::payments::HeaderPayload>, _payment_method: Option<common_enums::PaymentMethod>, _payment_method_type: Option<common_enums::PaymentMethodType>, ) -> RouterResult<RouterData<frm_api::Sale, FraudCheckSaleData, FraudCheckResponseData>> { let status = storage_enums::AttemptStatus::Pending; let auth_type: ConnectorAuthType = merchant_connector_account .get_connector_account_details() .parse_value("ConnectorAuthType") .change_context(errors::ApiErrorResponse::MerchantConnectorAccountNotFound { id: "ConnectorAuthType".to_string(), })?; let customer_id = customer.to_owned().map(|customer| customer.customer_id); let router_data = RouterData { flow: std::marker::PhantomData, merchant_id: merchant_context.get_merchant_account().get_id().clone(), customer_id, connector: connector_id.to_string(), payment_id: self.payment_intent.payment_id.get_string_repr().to_owned(), attempt_id: self.payment_attempt.attempt_id.clone(), tenant_id: state.tenant.tenant_id.clone(), status, payment_method: self .payment_attempt .payment_method .ok_or(errors::ApiErrorResponse::PaymentMethodNotFound)?, payment_method_type: self.payment_attempt.payment_method_type, connector_auth_type: auth_type, description: None, address: self.address.clone(), auth_type: storage_enums::AuthenticationType::NoThreeDs, connector_meta_data: None, connector_wallets_details: None, amount_captured: None, minor_amount_captured: None, request: FraudCheckSaleData { amount: self .payment_attempt .net_amount .get_total_amount() .get_amount_as_i64(), order_details: self.order_details.clone(), currency: self.payment_attempt.currency, email: customer .clone() .and_then(|customer_data| { customer_data .email .map(|email| Email::try_from(email.into_inner().expose())) }) .transpose() .change_context(errors::ApiErrorResponse::InvalidDataValue { field_name: "customer.customer_data.email", })?, }, response: Ok(FraudCheckResponseData::TransactionResponse { resource_id: ResponseId::ConnectorTransactionId("".to_string()), connector_metadata: None, status: storage_enums::FraudCheckStatus::Pending, score: None, reason: None, }), access_token: None, session_token: None, reference_id: None, payment_method_token: None, connector_customer: None, preprocessing_id: None, payment_method_status: None, connector_request_reference_id: uuid::Uuid::new_v4().to_string(), test_mode: None, recurring_mandate_payment_data: None, #[cfg(feature = "payouts")] payout_method_data: None, #[cfg(feature = "payouts")] quote_id: None, payment_method_balance: None, connector_http_status_code: None, external_latency: None, connector_api_version: None, apple_pay_flow: None, frm_metadata: self.frm_metadata.clone(), refund_id: None, dispute_id: None, connector_response: None, integrity_check: Ok(()), additional_merchant_data: None, header_payload, connector_mandate_request_reference_id: None, authentication_id: None, psd2_sca_exemption_type: None, raw_connector_response: None, is_payment_id_from_merchant: None, l2_l3_data: None, minor_amount_capturable: None, authorized_amount: None, }; Ok(router_data) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 111, "total_crates": null }
fn_clm_router_decide_frm_flow_-7729875027106564496
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/fraud_check/flows/sale_flow pub async fn decide_frm_flow( router_data: &mut FrmSaleRouterData, state: &SessionState, connector: &FraudCheckConnectorData, call_connector_action: payments::CallConnectorAction, _merchant_context: &domain::MerchantContext, ) -> RouterResult<FrmSaleRouterData> { let connector_integration: services::BoxedFrmConnectorIntegrationInterface< frm_api::Sale, FraudCheckSaleData, FraudCheckResponseData, > = connector.connector.get_connector_integration(); let resp = services::execute_connector_processing_step( state, connector_integration, router_data, call_connector_action, None, None, ) .await .to_payment_failed_response()?; Ok(resp) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 28, "total_crates": null }
fn_clm_router_decide_frm_flows_-7729875027106564496
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/fraud_check/flows/sale_flow // Implementation of FrmSaleRouterData for FeatureFrm<frm_api::Sale, FraudCheckSaleData> async fn decide_frm_flows<'a>( mut self, state: &SessionState, connector: &FraudCheckConnectorData, call_connector_action: payments::CallConnectorAction, merchant_context: &domain::MerchantContext, ) -> RouterResult<Self> { decide_frm_flow( &mut self, state, connector, call_connector_action, merchant_context, ) .await }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 13, "total_crates": null }
fn_clm_router_construct_router_data_9180001861969444233
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/fraud_check/flows/record_return // Implementation of FrmData for ConstructFlowSpecificData<RecordReturn, FraudCheckRecordReturnData, FraudCheckResponseData> async fn construct_router_data<'a>( &self, state: &SessionState, connector_id: &str, merchant_context: &domain::MerchantContext, customer: &Option<domain::Customer>, merchant_connector_account: &helpers::MerchantConnectorAccountType, _merchant_recipient_data: Option<MerchantRecipientData>, header_payload: Option<hyperswitch_domain_models::payments::HeaderPayload>, _payment_method: Option<common_enums::PaymentMethod>, _payment_method_type: Option<common_enums::PaymentMethodType>, ) -> RouterResult<RouterData<RecordReturn, FraudCheckRecordReturnData, FraudCheckResponseData>> { let status = storage_enums::AttemptStatus::Pending; let auth_type: ConnectorAuthType = merchant_connector_account .get_connector_account_details() .parse_value("ConnectorAuthType") .change_context(errors::ApiErrorResponse::MerchantConnectorAccountNotFound { id: "ConnectorAuthType".to_string(), })?; let customer_id = customer.to_owned().map(|customer| customer.customer_id); let currency = self.payment_attempt.clone().currency; let router_data = RouterData { flow: std::marker::PhantomData, merchant_id: merchant_context.get_merchant_account().get_id().clone(), tenant_id: state.tenant.tenant_id.clone(), customer_id, connector: connector_id.to_string(), payment_id: self.payment_intent.payment_id.get_string_repr().to_owned(), attempt_id: self.payment_attempt.attempt_id.clone(), status, payment_method: utils::OptionExt::get_required_value( self.payment_attempt.payment_method, "payment_method", )?, payment_method_type: self.payment_attempt.payment_method_type, connector_auth_type: auth_type, description: None, address: self.address.clone(), auth_type: storage_enums::AuthenticationType::NoThreeDs, connector_meta_data: None, connector_wallets_details: None, amount_captured: None, minor_amount_captured: None, request: FraudCheckRecordReturnData { amount: self .payment_attempt .net_amount .get_total_amount() .get_amount_as_i64(), refund_method: RefundMethod::OriginalPaymentInstrument, //we dont consume this data now in payments...hence hardcoded currency, refund_transaction_id: self.refund.clone().map(|refund| refund.refund_id), }, // self.order_details response: Ok(FraudCheckResponseData::RecordReturnResponse { resource_id: ResponseId::ConnectorTransactionId("".to_string()), connector_metadata: None, return_id: None, }), access_token: None, session_token: None, reference_id: None, payment_method_token: None, connector_customer: None, preprocessing_id: None, payment_method_status: None, connector_request_reference_id: uuid::Uuid::new_v4().to_string(), test_mode: None, recurring_mandate_payment_data: None, #[cfg(feature = "payouts")] payout_method_data: None, #[cfg(feature = "payouts")] quote_id: None, payment_method_balance: None, connector_http_status_code: None, external_latency: None, connector_api_version: None, apple_pay_flow: None, frm_metadata: None, refund_id: None, dispute_id: None, connector_response: None, integrity_check: Ok(()), additional_merchant_data: None, header_payload, connector_mandate_request_reference_id: None, authentication_id: None, psd2_sca_exemption_type: None, raw_connector_response: None, is_payment_id_from_merchant: None, l2_l3_data: None, minor_amount_capturable: None, authorized_amount: None, }; Ok(router_data) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 97, "total_crates": null }
fn_clm_router_decide_frm_flow_9180001861969444233
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/fraud_check/flows/record_return pub async fn decide_frm_flow( router_data: &mut FrmRecordReturnRouterData, state: &SessionState, connector: &FraudCheckConnectorData, call_connector_action: payments::CallConnectorAction, _merchant_context: &domain::MerchantContext, ) -> RouterResult<FrmRecordReturnRouterData> { let connector_integration: services::BoxedFrmConnectorIntegrationInterface< RecordReturn, FraudCheckRecordReturnData, FraudCheckResponseData, > = connector.connector.get_connector_integration(); let resp = services::execute_connector_processing_step( state, connector_integration, router_data, call_connector_action, None, None, ) .await .to_payment_failed_response()?; Ok(resp) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 28, "total_crates": null }
fn_clm_router_decide_frm_flows_9180001861969444233
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/fraud_check/flows/record_return // Implementation of FrmRecordReturnRouterData for FeatureFrm<RecordReturn, FraudCheckRecordReturnData> async fn decide_frm_flows<'a>( mut self, state: &SessionState, connector: &FraudCheckConnectorData, call_connector_action: payments::CallConnectorAction, merchant_context: &domain::MerchantContext, ) -> RouterResult<Self> { decide_frm_flow( &mut self, state, connector, call_connector_action, merchant_context, ) .await }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 13, "total_crates": null }
fn_clm_router_construct_fulfillment_router_data_-9098697960182794111
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/fraud_check/flows/fulfillment_flow pub async fn construct_fulfillment_router_data<'a>( state: &'a SessionState, payment_intent: &'a storage::PaymentIntent, payment_attempt: &storage::PaymentAttempt, merchant_context: &domain::MerchantContext, connector: String, fulfillment_request: FrmFulfillmentRequest, ) -> RouterResult<FrmFulfillmentRouterData> { let profile_id = payment_intent .profile_id .as_ref() .get_required_value("profile_id") .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("profile_id is not set in payment_intent")? .clone(); let connector_id = connector.clone(); let merchant_connector_account = helpers::get_merchant_connector_account( state, merchant_context.get_merchant_account().get_id(), None, merchant_context.get_merchant_key_store(), &profile_id, &connector, None, ) .await?; let test_mode: Option<bool> = merchant_connector_account.is_test_mode_on(); let auth_type: ConnectorAuthType = merchant_connector_account .get_connector_account_details() .parse_value("ConnectorAuthType") .change_context(errors::ApiErrorResponse::InternalServerError)?; let payment_method = utils::OptionExt::get_required_value(payment_attempt.payment_method, "payment_method")?; let router_data = RouterData { flow: std::marker::PhantomData, merchant_id: merchant_context.get_merchant_account().get_id().clone(), tenant_id: state.tenant.tenant_id.clone(), connector, payment_id: payment_attempt.payment_id.get_string_repr().to_owned(), attempt_id: payment_attempt.attempt_id.clone(), status: payment_attempt.status, payment_method, payment_method_type: payment_attempt.payment_method_type, connector_auth_type: auth_type, description: None, address: PaymentAddress::default(), auth_type: payment_attempt.authentication_type.unwrap_or_default(), connector_meta_data: merchant_connector_account.get_metadata(), connector_wallets_details: merchant_connector_account.get_connector_wallets_details(), amount_captured: payment_intent .amount_captured .map(|amt| amt.get_amount_as_i64()), minor_amount_captured: payment_intent.amount_captured, payment_method_status: None, request: FraudCheckFulfillmentData { amount: payment_attempt .net_amount .get_total_amount() .get_amount_as_i64(), order_details: payment_intent.order_details.clone(), fulfillment_req: fulfillment_request, }, response: Err(ErrorResponse::default()), access_token: None, session_token: None, reference_id: None, payment_method_token: None, connector_customer: None, customer_id: None, recurring_mandate_payment_data: None, preprocessing_id: None, payment_method_balance: None, connector_request_reference_id: core_utils::get_connector_request_reference_id( &state.conf, merchant_context.get_merchant_account().get_id(), payment_intent, payment_attempt, &connector_id, )?, #[cfg(feature = "payouts")] payout_method_data: None, #[cfg(feature = "payouts")] quote_id: None, test_mode, connector_api_version: None, connector_http_status_code: None, external_latency: None, apple_pay_flow: None, frm_metadata: None, refund_id: None, dispute_id: None, connector_response: None, integrity_check: Ok(()), additional_merchant_data: None, header_payload: None, connector_mandate_request_reference_id: None, authentication_id: None, psd2_sca_exemption_type: None, raw_connector_response: None, is_payment_id_from_merchant: None, l2_l3_data: None, minor_amount_capturable: None, authorized_amount: None, }; Ok(router_data) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 83, "total_crates": null }
fn_clm_router_get_headers_-4112462360567573136
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/proxy/utils // Inherent implementation for ProxyRequestWrapper pub fn get_headers(&self) -> Vec<(String, masking::Maskable<String>)> { self.0 .headers .as_map() .iter() .map(|(key, value)| (key.clone(), value.clone().into_masked())) .collect() }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 404, "total_crates": null }
fn_clm_router_get_proxy_record_-4112462360567573136
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/proxy/utils // Inherent implementation for ProxyRequestWrapper pub async fn get_proxy_record( &self, state: &SessionState, key_store: &domain::MerchantKeyStore, storage_scheme: common_enums::enums::MerchantStorageScheme, ) -> RouterResult<ProxyRecord> { let token = &self.0.token; match self.0.token_type { proxy_api_models::TokenType::PaymentMethodId => { let pm_id = PaymentMethodId { payment_method_id: token.clone(), }; let pm_id = id_type::GlobalPaymentMethodId::generate_from_string(pm_id.payment_method_id) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Unable to generate GlobalPaymentMethodId")?; let payment_method_record = state .store .find_payment_method(&((state).into()), key_store, &pm_id, storage_scheme) .await .change_context(errors::ApiErrorResponse::PaymentMethodNotFound)?; Ok(ProxyRecord::PaymentMethodRecord(Box::new( payment_method_record, ))) } proxy_api_models::TokenType::TokenizationId => { let token_id = id_type::GlobalTokenId::from_string(token.clone().as_str()) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable( "Error while coneverting from string to GlobalTokenId type", )?; let db = state.store.as_ref(); let key_manager_state = &(state).into(); let tokenization_record = db .get_entity_id_vault_id_by_token_id(&token_id, key_store, key_manager_state) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error while fetching tokenization record from vault")?; Ok(ProxyRecord::TokenizationRecord(Box::new( tokenization_record, ))) } } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 63, "total_crates": null }
fn_clm_router_get_customer_id_-4112462360567573136
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/proxy/utils // Inherent implementation for ProxyRecord fn get_customer_id(&self) -> id_type::GlobalCustomerId { match self { Self::PaymentMethodRecord(payment_method) => payment_method.customer_id.clone(), Self::TokenizationRecord(tokenization_record) => { tokenization_record.customer_id.clone() } } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 54, "total_crates": null }
fn_clm_router_get_vault_data_-4112462360567573136
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/proxy/utils // Inherent implementation for ProxyRecord pub async fn get_vault_data( &self, state: &SessionState, merchant_context: domain::MerchantContext, ) -> RouterResult<Value> { match self { Self::PaymentMethodRecord(_) => { let vault_resp = vault::retrieve_payment_method_from_vault_internal( state, &merchant_context, &self.get_vault_id()?, &self.get_customer_id(), ) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error while fetching data from vault")?; Ok(vault_resp .data .encode_to_value() .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to serialize vault data")?) } Self::TokenizationRecord(_) => { let vault_request = pm_types::VaultRetrieveRequest { entity_id: self.get_customer_id(), vault_id: self.get_vault_id()?, }; let vault_data = vault::retrieve_value_from_vault(state, vault_request) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Failed to retrieve vault data")?; Ok(vault_data.get("data").cloned().unwrap_or(Value::Null)) } } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 53, "total_crates": null }
fn_clm_router_parse_token_-4112462360567573136
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/proxy/utils pub fn parse_token(input: &str) -> IResult<&str, TokenReference> { let (input, field) = delimited( tag("{{"), preceded( multispace0, preceded( char('$'), terminated( take_while1(|c: char| c.is_alphanumeric() || c == '_'), multispace0, ), ), ), tag("}}"), )(input)?; Ok(( input, TokenReference { field: field.to_string(), }, )) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 36, "total_crates": null }
fn_clm_router_validate_card_testing_guard_checks_-5596547759769186536
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/card_testing_guard/utils pub async fn validate_card_testing_guard_checks( state: &SessionState, #[cfg(feature = "v1")] browser_info: Option<&serde_json::Value>, #[cfg(feature = "v2")] browser_info: Option<&BrowserInformation>, card_number: cards::CardNumber, customer_id: &Option<common_utils::id_type::CustomerId>, business_profile: &domain::Profile, ) -> RouterResult<Option<CardTestingGuardData>> { match &business_profile.card_testing_guard_config { Some(card_testing_guard_config) => { let fingerprint = generate_fingerprint(card_number, business_profile).await?; let card_testing_guard_expiry = card_testing_guard_config.card_testing_guard_expiry; let mut card_ip_blocking_cache_key = String::new(); let mut guest_user_card_blocking_cache_key = String::new(); let mut customer_id_blocking_cache_key = String::new(); if card_testing_guard_config.is_card_ip_blocking_enabled { if let Some(browser_info) = browser_info { #[cfg(feature = "v1")] { let browser_info = serde_json::from_value::<BrowserInformation>(browser_info.clone()) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("could not parse browser_info")?; if let Some(browser_info_ip) = browser_info.ip_address { card_ip_blocking_cache_key = helpers::validate_card_ip_blocking_for_business_profile( state, browser_info_ip, fingerprint.clone(), card_testing_guard_config, ) .await?; } } #[cfg(feature = "v2")] { if let Some(browser_info_ip) = browser_info.ip_address { card_ip_blocking_cache_key = helpers::validate_card_ip_blocking_for_business_profile( state, browser_info_ip, fingerprint.clone(), card_testing_guard_config, ) .await?; } } } } if card_testing_guard_config.is_guest_user_card_blocking_enabled { guest_user_card_blocking_cache_key = helpers::validate_guest_user_card_blocking_for_business_profile( state, fingerprint.clone(), customer_id.clone(), card_testing_guard_config, ) .await?; } if card_testing_guard_config.is_customer_id_blocking_enabled { if let Some(customer_id) = customer_id.clone() { customer_id_blocking_cache_key = helpers::validate_customer_id_blocking_for_business_profile( state, customer_id.clone(), business_profile.get_id(), card_testing_guard_config, ) .await?; } } Ok(Some(CardTestingGuardData { is_card_ip_blocking_enabled: card_testing_guard_config.is_card_ip_blocking_enabled, card_ip_blocking_cache_key, is_guest_user_card_blocking_enabled: card_testing_guard_config .is_guest_user_card_blocking_enabled, guest_user_card_blocking_cache_key, is_customer_id_blocking_enabled: card_testing_guard_config .is_customer_id_blocking_enabled, customer_id_blocking_cache_key, card_testing_guard_expiry, })) } None => Ok(None), } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 49, "total_crates": null }
fn_clm_router_generate_fingerprint_-5596547759769186536
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/card_testing_guard/utils pub async fn generate_fingerprint( card_number: cards::CardNumber, business_profile: &domain::Profile, ) -> RouterResult<Secret<String>> { let card_testing_secret_key = &business_profile.card_testing_secret_key; match card_testing_secret_key { Some(card_testing_secret_key) => { let card_number_fingerprint = crypto::HmacSha512::sign_message( &crypto::HmacSha512, card_testing_secret_key.get_inner().peek().as_bytes(), card_number.clone().get_card_no().as_bytes(), ) .attach_printable("error in pm fingerprint creation") .map_or_else( |err| { logger::error!(error=?err); None }, Some, ) .map(hex::encode); card_number_fingerprint.map(Secret::new).ok_or_else(|| { error_stack::report!(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error while masking fingerprint") }) } None => Err(errors::ApiErrorResponse::InternalServerError) .attach_printable("card testing secret key not configured")?, } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 47, "total_crates": null }
fn_clm_router_increment_blocked_count_in_cache_-5596547759769186536
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/card_testing_guard/utils pub async fn increment_blocked_count_in_cache( state: &SessionState, card_testing_guard_data: Option<CardTestingGuardData>, ) -> RouterResult<()> { if let Some(card_testing_guard_data) = card_testing_guard_data.clone() { if card_testing_guard_data.is_card_ip_blocking_enabled && !card_testing_guard_data .card_ip_blocking_cache_key .is_empty() { let _ = services::card_testing_guard::increment_blocked_count_in_cache( state, &card_testing_guard_data.card_ip_blocking_cache_key, card_testing_guard_data.card_testing_guard_expiry.into(), ) .await; } if card_testing_guard_data.is_guest_user_card_blocking_enabled && !card_testing_guard_data .guest_user_card_blocking_cache_key .is_empty() { let _ = services::card_testing_guard::increment_blocked_count_in_cache( state, &card_testing_guard_data.guest_user_card_blocking_cache_key, card_testing_guard_data.card_testing_guard_expiry.into(), ) .await; } if card_testing_guard_data.is_customer_id_blocking_enabled && !card_testing_guard_data .customer_id_blocking_cache_key .is_empty() { let _ = services::card_testing_guard::increment_blocked_count_in_cache( state, &card_testing_guard_data.customer_id_blocking_cache_key, card_testing_guard_data.card_testing_guard_expiry.into(), ) .await; } } Ok(()) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 42, "total_crates": null }
fn_clm_router_sync_merchant_onboarding_status_306329075154772619
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/connector_onboarding/paypal pub async fn sync_merchant_onboarding_status( state: SessionState, tracking_id: String, ) -> RouterResult<api::OnboardingStatus> { let access_token = utils::paypal::generate_access_token(state.clone()).await?; let Some(seller_status_response) = find_paypal_merchant_by_tracking_id(state.clone(), tracking_id, &access_token).await? else { return Ok(api::OnboardingStatus::PayPal( api::PayPalOnboardingStatus::AccountNotFound, )); }; let merchant_details_url = seller_status_response .extract_merchant_details_url(&state.conf.connectors.paypal.base_url)?; let merchant_details_request = utils::paypal::build_paypal_get_request(merchant_details_url, access_token.token.expose())?; let merchant_details_response = http_client::send_request(&state.conf.proxy, merchant_details_request, None) .await .change_context(ApiErrorResponse::InternalServerError) .attach_printable("Failed to send request to paypal merchant details")?; let parsed_response: types::paypal::SellerStatusDetailsResponse = merchant_details_response .json() .await .change_context(ApiErrorResponse::InternalServerError) .attach_printable("Failed to parse paypal merchant details response")?; let eligibity = parsed_response.get_eligibility_status().await?; Ok(api::OnboardingStatus::PayPal(eligibity)) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 45, "total_crates": null }
fn_clm_router_get_action_url_from_paypal_306329075154772619
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/connector_onboarding/paypal pub async fn get_action_url_from_paypal( state: SessionState, tracking_id: String, return_url: String, ) -> RouterResult<String> { let referral_request = Box::pin(build_referral_request( state.clone(), tracking_id, return_url, )) .await?; let referral_response = http_client::send_request(&state.conf.proxy, referral_request, None) .await .change_context(ApiErrorResponse::InternalServerError) .attach_printable("Failed to send request to paypal referrals")?; let parsed_response: types::paypal::PartnerReferralResponse = referral_response .json() .await .change_context(ApiErrorResponse::InternalServerError) .attach_printable("Failed to parse paypal response")?; parsed_response.extract_action_url() }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 33, "total_crates": null }
fn_clm_router_update_mca_306329075154772619
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/connector_onboarding/paypal pub async fn update_mca( state: &SessionState, merchant_id: common_utils::id_type::MerchantId, connector_id: common_utils::id_type::MerchantConnectorAccountId, auth_details: oss_types::ConnectorAuthType, ) -> RouterResult<oss_api_types::MerchantConnectorResponse> { let connector_auth_json = auth_details .encode_to_value() .change_context(ApiErrorResponse::InternalServerError) .attach_printable("Error while deserializing connector_account_details")?; #[cfg(feature = "v1")] let request = MerchantConnectorUpdate { connector_type: common_enums::ConnectorType::PaymentProcessor, connector_account_details: Some(Secret::new(connector_auth_json)), disabled: Some(false), status: Some(common_enums::ConnectorStatus::Active), connector_label: None, payment_methods_enabled: None, metadata: None, frm_configs: None, connector_webhook_details: None, pm_auth_config: None, test_mode: None, additional_merchant_data: None, connector_wallets_details: None, }; #[cfg(feature = "v2")] let request = MerchantConnectorUpdate { connector_type: common_enums::ConnectorType::PaymentProcessor, connector_account_details: Some(Secret::new(connector_auth_json)), disabled: Some(false), status: Some(common_enums::ConnectorStatus::Active), connector_label: None, payment_methods_enabled: None, metadata: None, frm_configs: None, connector_webhook_details: None, pm_auth_config: None, merchant_id: merchant_id.clone(), additional_merchant_data: None, connector_wallets_details: None, feature_metadata: None, }; let mca_response = admin::update_connector(state.clone(), &merchant_id, None, &connector_id, request).await?; match mca_response { ApplicationResponse::Json(mca_data) => Ok(mca_data), _ => Err(ApiErrorResponse::InternalServerError.into()), } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 31, "total_crates": null }
fn_clm_router_find_paypal_merchant_by_tracking_id_306329075154772619
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/connector_onboarding/paypal async fn find_paypal_merchant_by_tracking_id( state: SessionState, tracking_id: String, access_token: &oss_types::AccessToken, ) -> RouterResult<Option<types::paypal::SellerStatusResponse>> { let seller_status_request = utils::paypal::build_paypal_get_request( merchant_onboarding_status_url(state.clone(), tracking_id), access_token.token.peek().to_string(), )?; let seller_status_response = http_client::send_request(&state.conf.proxy, seller_status_request, None) .await .change_context(ApiErrorResponse::InternalServerError) .attach_printable("Failed to send request to paypal onboarding status")?; if seller_status_response.status().is_success() { return Ok(Some( seller_status_response .json() .await .change_context(ApiErrorResponse::InternalServerError) .attach_printable("Failed to parse paypal onboarding status response")?, )); } Ok(None) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 29, "total_crates": null }
fn_clm_router_build_referral_request_306329075154772619
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/connector_onboarding/paypal async fn build_referral_request( state: SessionState, tracking_id: String, return_url: String, ) -> RouterResult<Request> { let access_token = utils::paypal::generate_access_token(state.clone()).await?; let request_body = types::paypal::PartnerReferralRequest::new(tracking_id, return_url); utils::paypal::build_paypal_post_request( build_referral_url(state), request_body, access_token.token.expose(), ) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 15, "total_crates": null }
fn_clm_router_get_dispute_evidence_vec_-8746453068233281811
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/disputes/transformers pub async fn get_dispute_evidence_vec( state: &SessionState, merchant_context: domain::MerchantContext, dispute_evidence: DisputeEvidence, ) -> CustomResult<Vec<api_models::disputes::DisputeEvidenceBlock>, errors::ApiErrorResponse> { let mut dispute_evidence_blocks: Vec<api_models::disputes::DisputeEvidenceBlock> = vec![]; if let Some(cancellation_policy_block) = dispute_evidence.cancellation_policy { dispute_evidence_blocks.push( get_dispute_evidence_block( state, &merchant_context, EvidenceType::CancellationPolicy, cancellation_policy_block, ) .await?, ) } if let Some(customer_communication_block) = dispute_evidence.customer_communication { dispute_evidence_blocks.push( get_dispute_evidence_block( state, &merchant_context, EvidenceType::CustomerCommunication, customer_communication_block, ) .await?, ) } if let Some(customer_signature_block) = dispute_evidence.customer_signature { dispute_evidence_blocks.push( get_dispute_evidence_block( state, &merchant_context, EvidenceType::CustomerSignature, customer_signature_block, ) .await?, ) } if let Some(receipt_block) = dispute_evidence.receipt { dispute_evidence_blocks.push( get_dispute_evidence_block( state, &merchant_context, EvidenceType::Receipt, receipt_block, ) .await?, ) } if let Some(refund_policy_block) = dispute_evidence.refund_policy { dispute_evidence_blocks.push( get_dispute_evidence_block( state, &merchant_context, EvidenceType::RefundPolicy, refund_policy_block, ) .await?, ) } if let Some(service_documentation_block) = dispute_evidence.service_documentation { dispute_evidence_blocks.push( get_dispute_evidence_block( state, &merchant_context, EvidenceType::ServiceDocumentation, service_documentation_block, ) .await?, ) } if let Some(shipping_documentation_block) = dispute_evidence.shipping_documentation { dispute_evidence_blocks.push( get_dispute_evidence_block( state, &merchant_context, EvidenceType::ShippingDocumentation, shipping_documentation_block, ) .await?, ) } if let Some(invoice_showing_distinct_transactions_block) = dispute_evidence.invoice_showing_distinct_transactions { dispute_evidence_blocks.push( get_dispute_evidence_block( state, &merchant_context, EvidenceType::InvoiceShowingDistinctTransactions, invoice_showing_distinct_transactions_block, ) .await?, ) } if let Some(recurring_transaction_agreement_block) = dispute_evidence.recurring_transaction_agreement { dispute_evidence_blocks.push( get_dispute_evidence_block( state, &merchant_context, EvidenceType::RecurringTransactionAgreement, recurring_transaction_agreement_block, ) .await?, ) } if let Some(uncategorized_file_block) = dispute_evidence.uncategorized_file { dispute_evidence_blocks.push( get_dispute_evidence_block( state, &merchant_context, EvidenceType::UncategorizedFile, uncategorized_file_block, ) .await?, ) } Ok(dispute_evidence_blocks) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 53, "total_crates": null }
fn_clm_router_get_dispute_evidence_block_-8746453068233281811
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/disputes/transformers pub async fn get_dispute_evidence_block( state: &SessionState, merchant_context: &domain::MerchantContext, evidence_type: EvidenceType, file_id: String, ) -> CustomResult<api_models::disputes::DisputeEvidenceBlock, errors::ApiErrorResponse> { let file_metadata = state .store .find_file_metadata_by_merchant_id_file_id( merchant_context.get_merchant_account().get_id(), &file_id, ) .await .change_context(errors::ApiErrorResponse::FileNotFound) .attach_printable("Unable to retrieve file_metadata")?; let file_metadata_response = api_models::files::FileMetadataResponse::foreign_from(file_metadata); Ok(api_models::disputes::DisputeEvidenceBlock { evidence_type, file_metadata_response, }) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 52, "total_crates": null }
fn_clm_router_get_evidence_request_data_-8746453068233281811
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/disputes/transformers pub async fn get_evidence_request_data( state: &SessionState, merchant_context: &domain::MerchantContext, evidence_request: api_models::disputes::SubmitEvidenceRequest, dispute: &diesel_models::dispute::Dispute, ) -> CustomResult<SubmitEvidenceRequestData, errors::ApiErrorResponse> { let cancellation_policy_file_info = retrieve_file_and_provider_file_id_from_file_id( state, evidence_request.cancellation_policy, None, merchant_context, api::FileDataRequired::NotRequired, ) .await?; let customer_communication_file_info = retrieve_file_and_provider_file_id_from_file_id( state, evidence_request.customer_communication, None, merchant_context, api::FileDataRequired::NotRequired, ) .await?; let customer_sifnature_file_info = retrieve_file_and_provider_file_id_from_file_id( state, evidence_request.customer_signature, None, merchant_context, api::FileDataRequired::NotRequired, ) .await?; let receipt_file_info = retrieve_file_and_provider_file_id_from_file_id( state, evidence_request.receipt, None, merchant_context, api::FileDataRequired::NotRequired, ) .await?; let refund_policy_file_info = retrieve_file_and_provider_file_id_from_file_id( state, evidence_request.refund_policy, None, merchant_context, api::FileDataRequired::NotRequired, ) .await?; let service_documentation_file_info = retrieve_file_and_provider_file_id_from_file_id( state, evidence_request.service_documentation, None, merchant_context, api::FileDataRequired::NotRequired, ) .await?; let shipping_documentation_file_info = retrieve_file_and_provider_file_id_from_file_id( state, evidence_request.shipping_documentation, None, merchant_context, api::FileDataRequired::NotRequired, ) .await?; let invoice_showing_distinct_transactions_file_info = retrieve_file_and_provider_file_id_from_file_id( state, evidence_request.invoice_showing_distinct_transactions, None, merchant_context, api::FileDataRequired::NotRequired, ) .await?; let recurring_transaction_agreement_file_info = retrieve_file_and_provider_file_id_from_file_id( state, evidence_request.recurring_transaction_agreement, None, merchant_context, api::FileDataRequired::NotRequired, ) .await?; let uncategorized_file_info = retrieve_file_and_provider_file_id_from_file_id( state, evidence_request.uncategorized_file, None, merchant_context, api::FileDataRequired::NotRequired, ) .await?; Ok(SubmitEvidenceRequestData { dispute_id: dispute.dispute_id.clone(), dispute_status: dispute.dispute_status, connector_dispute_id: dispute.connector_dispute_id.clone(), access_activity_log: evidence_request.access_activity_log, billing_address: evidence_request.billing_address, cancellation_policy: cancellation_policy_file_info.file_data, cancellation_policy_provider_file_id: cancellation_policy_file_info.provider_file_id, cancellation_policy_disclosure: evidence_request.cancellation_policy_disclosure, cancellation_rebuttal: evidence_request.cancellation_rebuttal, customer_communication: customer_communication_file_info.file_data, customer_communication_provider_file_id: customer_communication_file_info.provider_file_id, customer_email_address: evidence_request.customer_email_address, customer_name: evidence_request.customer_name, customer_purchase_ip: evidence_request.customer_purchase_ip, customer_signature: customer_sifnature_file_info.file_data, customer_signature_provider_file_id: customer_sifnature_file_info.provider_file_id, product_description: evidence_request.product_description, receipt: receipt_file_info.file_data, receipt_provider_file_id: receipt_file_info.provider_file_id, refund_policy: refund_policy_file_info.file_data, refund_policy_provider_file_id: refund_policy_file_info.provider_file_id, refund_policy_disclosure: evidence_request.refund_policy_disclosure, refund_refusal_explanation: evidence_request.refund_refusal_explanation, service_date: evidence_request.service_date, service_documentation: service_documentation_file_info.file_data, service_documentation_provider_file_id: service_documentation_file_info.provider_file_id, shipping_address: evidence_request.shipping_address, shipping_carrier: evidence_request.shipping_carrier, shipping_date: evidence_request.shipping_date, shipping_documentation: shipping_documentation_file_info.file_data, shipping_documentation_provider_file_id: shipping_documentation_file_info.provider_file_id, shipping_tracking_number: evidence_request.shipping_tracking_number, invoice_showing_distinct_transactions: invoice_showing_distinct_transactions_file_info .file_data, invoice_showing_distinct_transactions_provider_file_id: invoice_showing_distinct_transactions_file_info.provider_file_id, recurring_transaction_agreement: recurring_transaction_agreement_file_info.file_data, recurring_transaction_agreement_provider_file_id: recurring_transaction_agreement_file_info .provider_file_id, uncategorized_file: uncategorized_file_info.file_data, uncategorized_file_provider_file_id: uncategorized_file_info.provider_file_id, uncategorized_text: evidence_request.uncategorized_text, cancellation_policy_file_type: cancellation_policy_file_info.file_type, customer_communication_file_type: customer_communication_file_info.file_type, customer_signature_file_type: customer_sifnature_file_info.file_type, receipt_file_type: receipt_file_info.file_type, refund_policy_file_type: refund_policy_file_info.file_type, service_documentation_file_type: service_documentation_file_info.file_type, shipping_documentation_file_type: shipping_documentation_file_info.file_type, invoice_showing_distinct_transactions_file_type: invoice_showing_distinct_transactions_file_info.file_type, recurring_transaction_agreement_file_type: recurring_transaction_agreement_file_info .file_type, uncategorized_file_type: uncategorized_file_info.file_type, }) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 37, "total_crates": null }
fn_clm_router_update_dispute_evidence_-8746453068233281811
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/disputes/transformers pub fn update_dispute_evidence( dispute_evidence: DisputeEvidence, evidence_type: api::EvidenceType, file_id: String, ) -> DisputeEvidence { match evidence_type { api::EvidenceType::CancellationPolicy => DisputeEvidence { cancellation_policy: Some(file_id), ..dispute_evidence }, api::EvidenceType::CustomerCommunication => DisputeEvidence { customer_communication: Some(file_id), ..dispute_evidence }, api::EvidenceType::CustomerSignature => DisputeEvidence { customer_signature: Some(file_id), ..dispute_evidence }, api::EvidenceType::Receipt => DisputeEvidence { receipt: Some(file_id), ..dispute_evidence }, api::EvidenceType::RefundPolicy => DisputeEvidence { refund_policy: Some(file_id), ..dispute_evidence }, api::EvidenceType::ServiceDocumentation => DisputeEvidence { service_documentation: Some(file_id), ..dispute_evidence }, api::EvidenceType::ShippingDocumentation => DisputeEvidence { shipping_documentation: Some(file_id), ..dispute_evidence }, api::EvidenceType::InvoiceShowingDistinctTransactions => DisputeEvidence { invoice_showing_distinct_transactions: Some(file_id), ..dispute_evidence }, api::EvidenceType::RecurringTransactionAgreement => DisputeEvidence { recurring_transaction_agreement: Some(file_id), ..dispute_evidence }, api::EvidenceType::UncategorizedFile => DisputeEvidence { uncategorized_file: Some(file_id), ..dispute_evidence }, } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 13, "total_crates": null }
fn_clm_router_delete_evidence_file_-8746453068233281811
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/disputes/transformers pub fn delete_evidence_file( dispute_evidence: DisputeEvidence, evidence_type: EvidenceType, ) -> DisputeEvidence { match evidence_type { EvidenceType::CancellationPolicy => DisputeEvidence { cancellation_policy: None, ..dispute_evidence }, EvidenceType::CustomerCommunication => DisputeEvidence { customer_communication: None, ..dispute_evidence }, EvidenceType::CustomerSignature => DisputeEvidence { customer_signature: None, ..dispute_evidence }, EvidenceType::Receipt => DisputeEvidence { receipt: None, ..dispute_evidence }, EvidenceType::RefundPolicy => DisputeEvidence { refund_policy: None, ..dispute_evidence }, EvidenceType::ServiceDocumentation => DisputeEvidence { service_documentation: None, ..dispute_evidence }, EvidenceType::ShippingDocumentation => DisputeEvidence { shipping_documentation: None, ..dispute_evidence }, EvidenceType::InvoiceShowingDistinctTransactions => DisputeEvidence { invoice_showing_distinct_transactions: None, ..dispute_evidence }, EvidenceType::RecurringTransactionAgreement => DisputeEvidence { recurring_transaction_agreement: None, ..dispute_evidence }, EvidenceType::UncategorizedFile => DisputeEvidence { uncategorized_file: None, ..dispute_evidence }, } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 13, "total_crates": null }
fn_clm_router_foreign_from_-8306550401884627146
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/three_ds_decision_rule/utils // Implementation of dsl_inputs::BackendInput for ForeignFrom<api_threedsecure::ThreeDsDecisionRuleExecuteRequest> fn foreign_from(request: api_threedsecure::ThreeDsDecisionRuleExecuteRequest) -> Self { Self { metadata: None, payment: dsl_inputs::PaymentInput::foreign_from(request.payment), payment_method: dsl_inputs::PaymentMethodInput::foreign_from(request.payment_method), mandate: dsl_inputs::MandateData { mandate_acceptance_type: None, mandate_type: None, payment_type: None, }, acquirer_data: request.acquirer.map(ForeignFrom::foreign_from), customer_device_data: request.customer_device.map(ForeignFrom::foreign_from), issuer_data: request.issuer.map(ForeignFrom::foreign_from), } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 222, "total_crates": null }
fn_clm_router_apply_psd2_validations_during_execute_-8306550401884627146
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/three_ds_decision_rule/utils pub fn apply_psd2_validations_during_execute( decision: ThreeDSDecision, request: &api_models::three_ds_decision_rule::ThreeDsDecisionRuleExecuteRequest, ) -> ThreeDSDecision { let issuer_in_psd2 = request .issuer .as_ref() .and_then(|issuer| issuer.country) .map(|country| PSD2_COUNTRIES.contains(&country)) .unwrap_or(false); let acquirer_in_psd2 = request .acquirer .as_ref() .and_then(|acquirer| acquirer.country) .map(|country| PSD2_COUNTRIES.contains(&country)) .unwrap_or(false); if issuer_in_psd2 && acquirer_in_psd2 { // If both issuer and acquirer are in PSD2 region match decision { // If the decision is to enforce no 3DS, override it to enforce 3DS ThreeDSDecision::NoThreeDs => ThreeDSDecision::ChallengeRequested, _ => decision, } } else { // If PSD2 doesn't apply, exemptions cannot be applied match decision { ThreeDSDecision::NoThreeDs => ThreeDSDecision::NoThreeDs, // For all other decisions (including exemptions), enforce challenge as exemptions are only valid in PSD2 regions _ => ThreeDSDecision::ChallengeRequested, } } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 33, "total_crates": null }
fn_clm_router_list_roles_with_info_-889932564324717968
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/user_role/role pub async fn list_roles_with_info( state: SessionState, user_from_token: UserFromToken, request: role_api::ListRolesQueryParams, ) -> UserResponse<role_api::ListRolesResponse> { let user_role_info = user_from_token .get_role_info_from_db(&state) .await .attach_printable("Invalid role_id in JWT")?; if user_role_info.is_internal() { return Err(UserErrors::InvalidRoleOperationWithMessage( "Internal roles are not allowed for this operation".to_string(), ) .into()); } let mut role_info_vec = PREDEFINED_ROLES .values() .filter(|role| role.is_internal().not()) .cloned() .collect::<Vec<_>>(); let user_role_entity = user_role_info.get_entity_type(); let is_lineage_data_required = request.entity_type.is_none(); let tenant_id = user_from_token .tenant_id .as_ref() .unwrap_or(&state.tenant.tenant_id) .to_owned(); let custom_roles = match utils::user_role::get_min_entity(user_role_entity, request.entity_type)? { EntityType::Tenant | EntityType::Organization => state .global_store .generic_list_roles_by_entity_type( ListRolesByEntityPayload::Organization, is_lineage_data_required, tenant_id, user_from_token.org_id, ) .await .change_context(UserErrors::InternalServerError) .attach_printable("Failed to get roles")?, EntityType::Merchant => state .global_store .generic_list_roles_by_entity_type( ListRolesByEntityPayload::Merchant(user_from_token.merchant_id), is_lineage_data_required, tenant_id, user_from_token.org_id, ) .await .change_context(UserErrors::InternalServerError) .attach_printable("Failed to get roles")?, EntityType::Profile => state .global_store .generic_list_roles_by_entity_type( ListRolesByEntityPayload::Profile( user_from_token.merchant_id, user_from_token.profile_id, ), is_lineage_data_required, tenant_id, user_from_token.org_id, ) .await .change_context(UserErrors::InternalServerError) .attach_printable("Failed to get roles")?, }; role_info_vec.extend(custom_roles.into_iter().map(roles::RoleInfo::from)); if request.groups == Some(true) { let list_role_info_response = role_info_vec .into_iter() .filter_map(|role_info| { let is_lower_entity = user_role_entity >= role_info.get_entity_type(); let request_filter = request .entity_type .is_none_or(|entity_type| entity_type == role_info.get_entity_type()); (is_lower_entity && request_filter).then_some({ let permission_groups = role_info.get_permission_groups(); let parent_group_details = utils::user_role::permission_groups_to_parent_group_info( &permission_groups, role_info.get_entity_type(), ); let parent_group_descriptions: Vec<role_api::ParentGroupDescription> = parent_group_details .into_iter() .filter_map(|group_details| { let description = utils::user_role::resources_to_description( group_details.resources, role_info.get_entity_type(), )?; Some(role_api::ParentGroupDescription { name: group_details.name, description, scopes: group_details.scopes, }) }) .collect(); role_api::RoleInfoResponseWithParentsGroup { role_id: role_info.get_role_id().to_string(), role_name: role_info.get_role_name().to_string(), entity_type: role_info.get_entity_type(), parent_groups: parent_group_descriptions, role_scope: role_info.get_scope(), } }) }) .collect::<Vec<_>>(); Ok(ApplicationResponse::Json( role_api::ListRolesResponse::WithParentGroups(list_role_info_response), )) } // TODO: To be deprecated else { let list_role_info_response = role_info_vec .into_iter() .filter_map(|role_info| { let is_lower_entity = user_role_entity >= role_info.get_entity_type(); let request_filter = request .entity_type .is_none_or(|entity_type| entity_type == role_info.get_entity_type()); (is_lower_entity && request_filter).then_some(role_api::RoleInfoResponseNew { role_id: role_info.get_role_id().to_string(), role_name: role_info.get_role_name().to_string(), groups: role_info.get_permission_groups().to_vec(), entity_type: role_info.get_entity_type(), scope: role_info.get_scope(), }) }) .collect::<Vec<_>>(); Ok(ApplicationResponse::Json( role_api::ListRolesResponse::WithGroups(list_role_info_response), )) } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 151, "total_crates": null }
fn_clm_router_list_roles_at_entity_level_-889932564324717968
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/user_role/role pub async fn list_roles_at_entity_level( state: SessionState, user_from_token: UserFromToken, req: role_api::ListRolesAtEntityLevelRequest, check_type: role_api::RoleCheckType, ) -> UserResponse<Vec<role_api::MinimalRoleInfo>> { let user_entity_type = user_from_token .get_role_info_from_db(&state) .await .attach_printable("Invalid role_id in JWT")? .get_entity_type(); if req.entity_type > user_entity_type { return Err(UserErrors::InvalidRoleOperationWithMessage( "User is attempting to request list roles above the current entity level".to_string(), ) .into()); } let mut role_info_vec = PREDEFINED_ROLES.values().cloned().collect::<Vec<_>>(); let tenant_id = user_from_token .tenant_id .as_ref() .unwrap_or(&state.tenant.tenant_id) .to_owned(); let is_lineage_data_required = false; let custom_roles = match req.entity_type { EntityType::Tenant | EntityType::Organization => state .global_store .generic_list_roles_by_entity_type( ListRolesByEntityPayload::Organization, is_lineage_data_required, tenant_id, user_from_token.org_id, ) .await .change_context(UserErrors::InternalServerError) .attach_printable("Failed to get roles")?, EntityType::Merchant => state .global_store .generic_list_roles_by_entity_type( ListRolesByEntityPayload::Merchant(user_from_token.merchant_id), is_lineage_data_required, tenant_id, user_from_token.org_id, ) .await .change_context(UserErrors::InternalServerError) .attach_printable("Failed to get roles")?, EntityType::Profile => state .global_store .generic_list_roles_by_entity_type( ListRolesByEntityPayload::Profile( user_from_token.merchant_id, user_from_token.profile_id, ), is_lineage_data_required, tenant_id, user_from_token.org_id, ) .await .change_context(UserErrors::InternalServerError) .attach_printable("Failed to get roles")?, }; role_info_vec.extend(custom_roles.into_iter().map(roles::RoleInfo::from)); let list_minimal_role_info = role_info_vec .into_iter() .filter_map(|role_info| { let check_type = match check_type { role_api::RoleCheckType::Invite => role_info.is_invitable(), role_api::RoleCheckType::Update => role_info.is_updatable(), }; if check_type && role_info.get_entity_type() == req.entity_type { Some(role_api::MinimalRoleInfo { role_id: role_info.get_role_id().to_string(), role_name: role_info.get_role_name().to_string(), }) } else { None } }) .collect::<Vec<_>>(); Ok(ApplicationResponse::Json(list_minimal_role_info)) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 86, "total_crates": null }
fn_clm_router_get_parent_info_for_role_-889932564324717968
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/user_role/role pub async fn get_parent_info_for_role( state: SessionState, user_from_token: UserFromToken, role: role_api::GetRoleRequest, ) -> UserResponse<role_api::RoleInfoWithParents> { let role_info = roles::RoleInfo::from_role_id_org_id_tenant_id( &state, &role.role_id, &user_from_token.org_id, user_from_token .tenant_id .as_ref() .unwrap_or(&state.tenant.tenant_id), ) .await .to_not_found_response(UserErrors::InvalidRoleId)?; if role_info.is_internal() { return Err(UserErrors::InvalidRoleId.into()); } let parent_groups = ParentGroup::get_descriptions_for_groups( role_info.get_entity_type(), role_info.get_permission_groups().to_vec(), ) .ok_or(UserErrors::InternalServerError) .attach_printable(format!( "No group descriptions found for role_id: {}", role.role_id ))? .into_iter() .map( |(parent_group, description)| role_api::ParentGroupDescription { name: parent_group.clone(), description, scopes: role_info .get_permission_groups() .iter() .filter_map(|group| (group.parent() == parent_group).then_some(group.scope())) // TODO: Remove this hashset conversion when merchant access // and organization access groups are removed .collect::<HashSet<_>>() .into_iter() .collect(), }, ) .collect(); Ok(ApplicationResponse::Json(role_api::RoleInfoWithParents { role_id: role.role_id, parent_groups, role_name: role_info.get_role_name().to_string(), role_scope: role_info.get_scope(), })) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 69, "total_crates": null }
fn_clm_router_create_role_v2_-889932564324717968
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/user_role/role pub async fn create_role_v2( state: SessionState, user_from_token: UserFromToken, req: role_api::CreateRoleV2Request, _req_state: ReqState, ) -> UserResponse<role_api::RoleInfoResponseWithParentsGroup> { let now = common_utils::date_time::now(); let user_entity_type = user_from_token .get_role_info_from_db(&state) .await .attach_printable("Invalid role_id in JWT")? .get_entity_type(); let role_entity_type = req.entity_type.unwrap_or(EntityType::Merchant); if matches!(role_entity_type, EntityType::Organization) { return Err(report!(UserErrors::InvalidRoleOperation)) .attach_printable("User trying to create org level custom role"); } let requestor_entity_from_role_scope = EntityType::from(req.role_scope); if requestor_entity_from_role_scope < role_entity_type { return Err(report!(UserErrors::InvalidRoleOperation)).attach_printable(format!( "User is trying to create role of type {role_entity_type} and scope {requestor_entity_from_role_scope}", )); } let max_from_scope_and_entity = cmp::max(requestor_entity_from_role_scope, role_entity_type); if user_entity_type < max_from_scope_and_entity { return Err(report!(UserErrors::InvalidRoleOperation)).attach_printable(format!( "{user_entity_type} is trying to create of scope {requestor_entity_from_role_scope} and of type {role_entity_type}", )); } let role_name = RoleName::new(req.role_name.clone())?; let permission_groups = utils::user_role::parent_group_info_request_to_permission_groups(&req.parent_groups)?; utils::user_role::validate_role_groups(&permission_groups)?; utils::user_role::validate_role_name( &state, &role_name, &user_from_token.merchant_id, &user_from_token.org_id, user_from_token .tenant_id .as_ref() .unwrap_or(&state.tenant.tenant_id), &user_from_token.profile_id, &role_entity_type, ) .await?; let (org_id, merchant_id, profile_id) = match role_entity_type { EntityType::Organization | EntityType::Tenant => (user_from_token.org_id, None, None), EntityType::Merchant => ( user_from_token.org_id, Some(user_from_token.merchant_id), None, ), EntityType::Profile => ( user_from_token.org_id, Some(user_from_token.merchant_id), Some(user_from_token.profile_id), ), }; let role = state .global_store .insert_role(RoleNew { role_id: generate_id_with_default_len("role"), role_name: role_name.get_role_name(), merchant_id, org_id, groups: permission_groups, scope: req.role_scope, entity_type: role_entity_type, created_by: user_from_token.user_id.clone(), last_modified_by: user_from_token.user_id, created_at: now, last_modified_at: now, profile_id, tenant_id: user_from_token.tenant_id.unwrap_or(state.tenant.tenant_id), }) .await .to_duplicate_response(UserErrors::RoleNameAlreadyExists)?; let parent_group_details = utils::user_role::permission_groups_to_parent_group_info(&role.groups, role.entity_type); let parent_group_descriptions: Vec<role_api::ParentGroupDescription> = parent_group_details .into_iter() .filter_map(|group_details| { let description = utils::user_role::resources_to_description( group_details.resources, role.entity_type, )?; Some(role_api::ParentGroupDescription { name: group_details.name, description, scopes: group_details.scopes, }) }) .collect(); Ok(ApplicationResponse::Json( role_api::RoleInfoResponseWithParentsGroup { role_id: role.role_id, role_name: role.role_name, role_scope: role.scope, entity_type: role.entity_type, parent_groups: parent_group_descriptions, }, )) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 68, "total_crates": null }
fn_clm_router_update_role_-889932564324717968
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/user_role/role pub async fn update_role( state: SessionState, user_from_token: UserFromToken, req: role_api::UpdateRoleRequest, role_id: &str, ) -> UserResponse<role_api::RoleInfoWithGroupsResponse> { let role_name = req.role_name.map(RoleName::new).transpose()?; let role_info = roles::RoleInfo::from_role_id_in_lineage( &state, role_id, &user_from_token.merchant_id, &user_from_token.org_id, &user_from_token.profile_id, user_from_token .tenant_id .as_ref() .unwrap_or(&state.tenant.tenant_id), ) .await .to_not_found_response(UserErrors::InvalidRoleOperation)?; let user_role_info = user_from_token.get_role_info_from_db(&state).await?; let requested_entity_from_role_scope = EntityType::from(role_info.get_scope()); let requested_role_entity_type = role_info.get_entity_type(); let max_from_scope_and_entity = cmp::max(requested_entity_from_role_scope, requested_role_entity_type); if user_role_info.get_entity_type() < max_from_scope_and_entity { return Err(report!(UserErrors::InvalidRoleOperation)).attach_printable(format!( "{} is trying to update of scope {} and of type {}", user_role_info.get_entity_type(), requested_entity_from_role_scope, requested_role_entity_type )); } if let Some(ref role_name) = role_name { utils::user_role::validate_role_name( &state, role_name, &user_from_token.merchant_id, &user_from_token.org_id, user_from_token .tenant_id .as_ref() .unwrap_or(&state.tenant.tenant_id), &user_from_token.profile_id, &role_info.get_entity_type(), ) .await?; } if let Some(ref groups) = req.groups { utils::user_role::validate_role_groups(groups)?; } let updated_role = state .global_store .update_role_by_role_id( role_id, RoleUpdate::UpdateDetails { groups: req.groups, role_name: role_name.map(RoleName::get_role_name), last_modified_at: common_utils::date_time::now(), last_modified_by: user_from_token.user_id, }, ) .await .to_duplicate_response(UserErrors::RoleNameAlreadyExists)?; blacklist::insert_role_in_blacklist(&state, role_id).await?; Ok(ApplicationResponse::Json( role_api::RoleInfoWithGroupsResponse { groups: updated_role.groups, role_id: updated_role.role_id, role_name: updated_role.role_name, role_scope: updated_role.scope, entity_type: updated_role.entity_type, }, )) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 61, "total_crates": null }
fn_clm_router_validate_customer_list_limit_8208218191983513840
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/utils/customer_validation pub fn validate_customer_list_limit( limit: Option<u16>, ) -> CustomResult<u16, errors::ApiErrorResponse> { match limit { Some(l) if (CUSTOMER_LIST_LOWER_LIMIT..=CUSTOMER_LIST_UPPER_LIMIT).contains(&l) => Ok(l), Some(_) => Err(errors::ApiErrorResponse::InvalidRequestData { message: format!( "limit should be between {} and {}", CUSTOMER_LIST_LOWER_LIMIT, CUSTOMER_LIST_UPPER_LIMIT ), } .into()), None => Ok(CUSTOMER_LIST_DEFAULT_LIMIT), } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 17, "total_crates": null }
fn_clm_router_validate_adyen_charge_refund_8447460536264413991
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/utils/refunds_validator pub fn validate_adyen_charge_refund( adyen_split_payment_response: &common_types::domain::AdyenSplitData, adyen_split_refund_request: &common_types::domain::AdyenSplitData, ) -> RouterResult<()> { if adyen_split_refund_request.store != adyen_split_payment_response.store { return Err(report!(errors::ApiErrorResponse::InvalidDataValue { field_name: "split_payments.adyen_split_payment.store", })); }; for refund_split_item in adyen_split_refund_request.split_items.iter() { let refund_split_reference = refund_split_item.reference.clone(); let matching_payment_split_item = adyen_split_payment_response .split_items .iter() .find(|payment_split_item| refund_split_reference == payment_split_item.reference); if let Some(payment_split_item) = matching_payment_split_item { if let Some((refund_amount, payment_amount)) = refund_split_item.amount.zip(payment_split_item.amount) { if refund_amount > payment_amount { return Err(report!(errors::ApiErrorResponse::InvalidRequestData { message: format!( "Invalid refund amount for split item, reference: {refund_split_reference}", ), })); } } if let Some((refund_account, payment_account)) = refund_split_item .account .as_ref() .zip(payment_split_item.account.as_ref()) { if !refund_account.eq(payment_account) { return Err(report!(errors::ApiErrorResponse::InvalidRequestData { message: format!( "Invalid refund account for split item, reference: {refund_split_reference}", ), })); } } if refund_split_item.split_type != payment_split_item.split_type { return Err(report!(errors::ApiErrorResponse::InvalidRequestData { message: format!( "Invalid refund split_type for split item, reference: {refund_split_reference}", ), })); } } else { return Err(report!(errors::ApiErrorResponse::InvalidRequestData { message: format!( "No matching payment split item found for reference: {refund_split_reference}", ), })); } } Ok(()) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 31, "total_crates": null }
fn_clm_router_validate_stripe_charge_refund_8447460536264413991
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/utils/refunds_validator pub fn validate_stripe_charge_refund( charge_type_option: Option<api_enums::PaymentChargeType>, split_refund_request: &Option<common_types::refunds::SplitRefund>, ) -> RouterResult<types::ChargeRefundsOptions> { let charge_type = charge_type_option.ok_or_else(|| { report!(errors::ApiErrorResponse::InternalServerError) .attach_printable("Missing `charge_type` in PaymentAttempt.") })?; let refund_request = match split_refund_request { Some(common_types::refunds::SplitRefund::StripeSplitRefund(stripe_split_refund)) => { stripe_split_refund } _ => Err(errors::ApiErrorResponse::MissingRequiredField { field_name: "stripe_split_refund", })?, }; let options = match charge_type { api_enums::PaymentChargeType::Stripe(api_enums::StripeChargeType::Direct) => { types::ChargeRefundsOptions::Direct(types::DirectChargeRefund { revert_platform_fee: refund_request .revert_platform_fee .get_required_value("revert_platform_fee")?, }) } api_enums::PaymentChargeType::Stripe(api_enums::StripeChargeType::Destination) => { types::ChargeRefundsOptions::Destination(types::DestinationChargeRefund { revert_platform_fee: refund_request .revert_platform_fee .get_required_value("revert_platform_fee")?, revert_transfer: refund_request .revert_transfer .get_required_value("revert_transfer")?, }) } }; Ok(options) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 27, "total_crates": null }
fn_clm_router_validate_refund_amount_8447460536264413991
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/utils/refunds_validator pub fn validate_refund_amount( amount_captured: i64, all_refunds: &[diesel_refund::Refund], refund_amount: i64, ) -> CustomResult<(), RefundValidationError> { let total_refunded_amount: i64 = all_refunds .iter() .filter_map(|refund| { if refund.refund_status != enums::RefundStatus::Failure && refund.refund_status != enums::RefundStatus::TransactionFailure { Some(refund.refund_amount.get_amount_as_i64()) } else { None } }) .sum(); utils::when( refund_amount > (amount_captured - total_refunded_amount), || { Err(report!( RefundValidationError::RefundAmountExceedsPaymentAmount )) }, ) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 26, "total_crates": null }
fn_clm_router_validate_for_valid_refunds_8447460536264413991
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/utils/refunds_validator pub fn validate_for_valid_refunds( payment_attempt: &hyperswitch_domain_models::payments::payment_attempt::PaymentAttempt, connector: api_models::enums::Connector, ) -> RouterResult<()> { let payment_method_type = payment_attempt.payment_method_type; match payment_method_type { diesel_models::enums::PaymentMethod::PayLater | diesel_models::enums::PaymentMethod::Wallet => { let payment_method_subtype = payment_attempt.payment_method_subtype; utils::when( matches!( (connector, payment_method_subtype), ( api_models::enums::Connector::Braintree, diesel_models::enums::PaymentMethodType::Paypal, ) ), || { Err(errors::ApiErrorResponse::RefundNotPossible { connector: connector.to_string(), } .into()) }, ) } _ => Ok(()), } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 25, "total_crates": null }
fn_clm_router_validate_xendit_charge_refund_8447460536264413991
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/utils/refunds_validator pub fn validate_xendit_charge_refund( xendit_split_payment_response: &common_types::payments::XenditChargeResponseData, xendit_split_refund_request: &common_types::domain::XenditSplitSubMerchantData, ) -> RouterResult<Option<String>> { match xendit_split_payment_response { common_types::payments::XenditChargeResponseData::MultipleSplits( payment_sub_merchant_data, ) => { if payment_sub_merchant_data.for_user_id != Some(xendit_split_refund_request.for_user_id.clone()) { return Err(errors::ApiErrorResponse::InvalidDataValue { field_name: "xendit_split_refund.for_user_id does not match xendit_split_payment.for_user_id", }.into()); } Ok(Some(xendit_split_refund_request.for_user_id.clone())) } common_types::payments::XenditChargeResponseData::SingleSplit( payment_sub_merchant_data, ) => { if payment_sub_merchant_data.for_user_id != xendit_split_refund_request.for_user_id { return Err(errors::ApiErrorResponse::InvalidDataValue { field_name: "xendit_split_refund.for_user_id does not match xendit_split_payment.for_user_id", }.into()); } Ok(Some(xendit_split_refund_request.for_user_id.clone())) } } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 23, "total_crates": null }
fn_clm_router_update_user_theme_978809469104859181
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/user/theme pub async fn update_user_theme( state: SessionState, theme_id: String, user_from_token: UserFromToken, request: theme_api::UpdateThemeRequest, ) -> UserResponse<theme_api::GetThemeResponse> { let db_theme = state .store .find_theme_by_theme_id(theme_id.clone()) .await .to_not_found_response(UserErrors::ThemeNotFound)?; let user_role_info = user_from_token .get_role_info_from_db(&state) .await .attach_printable("Invalid role_id in JWT")?; let user_entity_type = user_role_info.get_entity_type(); theme_utils::can_user_access_theme(&user_from_token, &user_entity_type, &db_theme).await?; let db_theme = match request.email_config { Some(email_config) => { let theme_update = ThemeUpdate::EmailConfig { email_config }; state .store .update_theme_by_theme_id(theme_id.clone(), theme_update) .await .change_context(UserErrors::InternalServerError)? } None => db_theme, }; if let Some(theme_data) = request.theme_data { theme_utils::upload_file_to_theme_bucket( &state, &theme_utils::get_theme_file_key(&db_theme.theme_id), theme_data .encode_to_vec() .change_context(UserErrors::InternalServerError) .attach_printable("Failed to parse ThemeData")?, ) .await?; } let file = theme_utils::retrieve_file_from_theme_bucket( &state, &theme_utils::get_theme_file_key(&db_theme.theme_id), ) .await?; let parsed_data = file .to_bytes() .parse_struct("ThemeData") .change_context(UserErrors::InternalServerError)?; Ok(ApplicationResponse::Json(theme_api::GetThemeResponse { email_config: db_theme.email_config(), theme_id: db_theme.theme_id, entity_type: db_theme.entity_type, tenant_id: db_theme.tenant_id, org_id: db_theme.org_id, merchant_id: db_theme.merchant_id, profile_id: db_theme.profile_id, theme_name: db_theme.theme_name, theme_data: parsed_data, })) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 57, "total_crates": null }
fn_clm_router_create_theme_978809469104859181
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/user/theme pub async fn create_theme( state: SessionState, request: theme_api::CreateThemeRequest, ) -> UserResponse<theme_api::GetThemeResponse> { theme_utils::validate_lineage(&state, &request.lineage).await?; let email_config = if cfg!(feature = "email") { request.email_config.ok_or(UserErrors::MissingEmailConfig)? } else { request .email_config .unwrap_or(state.conf.theme.email_config.clone()) }; let new_theme = ThemeNew::new( Uuid::new_v4().to_string(), request.theme_name, request.lineage, email_config, ); let db_theme = state .store .insert_theme(new_theme) .await .to_duplicate_response(UserErrors::ThemeAlreadyExists)?; theme_utils::upload_file_to_theme_bucket( &state, &theme_utils::get_theme_file_key(&db_theme.theme_id), request .theme_data .encode_to_vec() .change_context(UserErrors::InternalServerError)?, ) .await?; let file = theme_utils::retrieve_file_from_theme_bucket( &state, &theme_utils::get_theme_file_key(&db_theme.theme_id), ) .await?; let parsed_data = file .to_bytes() .parse_struct("ThemeData") .change_context(UserErrors::InternalServerError)?; Ok(ApplicationResponse::Json(theme_api::GetThemeResponse { email_config: db_theme.email_config(), theme_id: db_theme.theme_id, entity_type: db_theme.entity_type, tenant_id: db_theme.tenant_id, org_id: db_theme.org_id, merchant_id: db_theme.merchant_id, profile_id: db_theme.profile_id, theme_name: db_theme.theme_name, theme_data: parsed_data, })) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 53, "total_crates": null }
fn_clm_router_create_user_theme_978809469104859181
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/user/theme pub async fn create_user_theme( state: SessionState, user_from_token: UserFromToken, request: theme_api::CreateUserThemeRequest, ) -> UserResponse<theme_api::GetThemeResponse> { let email_config = if cfg!(feature = "email") { request.email_config.ok_or(UserErrors::MissingEmailConfig)? } else { request .email_config .unwrap_or(state.conf.theme.email_config.clone()) }; let lineage = theme_utils::get_theme_lineage_from_user_token( &user_from_token, &state, &request.entity_type, ) .await?; let new_theme = ThemeNew::new( Uuid::new_v4().to_string(), request.theme_name, lineage, email_config, ); let db_theme = state .store .insert_theme(new_theme) .await .to_duplicate_response(UserErrors::ThemeAlreadyExists)?; theme_utils::upload_file_to_theme_bucket( &state, &theme_utils::get_theme_file_key(&db_theme.theme_id), request .theme_data .encode_to_vec() .change_context(UserErrors::InternalServerError)?, ) .await?; let file = theme_utils::retrieve_file_from_theme_bucket( &state, &theme_utils::get_theme_file_key(&db_theme.theme_id), ) .await?; let parsed_data = file .to_bytes() .parse_struct("ThemeData") .change_context(UserErrors::InternalServerError)?; Ok(ApplicationResponse::Json(theme_api::GetThemeResponse { email_config: db_theme.email_config(), theme_id: db_theme.theme_id, entity_type: db_theme.entity_type, tenant_id: db_theme.tenant_id, org_id: db_theme.org_id, merchant_id: db_theme.merchant_id, profile_id: db_theme.profile_id, theme_name: db_theme.theme_name, theme_data: parsed_data, })) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 53, "total_crates": null }
fn_clm_router_update_theme_978809469104859181
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/user/theme pub async fn update_theme( state: SessionState, theme_id: String, request: theme_api::UpdateThemeRequest, ) -> UserResponse<theme_api::GetThemeResponse> { let db_theme = match request.email_config { Some(email_config) => { let theme_update = ThemeUpdate::EmailConfig { email_config }; state .store .update_theme_by_theme_id(theme_id.clone(), theme_update) .await .to_not_found_response(UserErrors::ThemeNotFound)? } None => state .store .find_theme_by_theme_id(theme_id) .await .to_not_found_response(UserErrors::ThemeNotFound)?, }; if let Some(theme_data) = request.theme_data { theme_utils::upload_file_to_theme_bucket( &state, &theme_utils::get_theme_file_key(&db_theme.theme_id), theme_data .encode_to_vec() .change_context(UserErrors::InternalServerError) .attach_printable("Failed to parse ThemeData")?, ) .await?; } let file = theme_utils::retrieve_file_from_theme_bucket( &state, &theme_utils::get_theme_file_key(&db_theme.theme_id), ) .await?; let parsed_data = file .to_bytes() .parse_struct("ThemeData") .change_context(UserErrors::InternalServerError)?; Ok(ApplicationResponse::Json(theme_api::GetThemeResponse { email_config: db_theme.email_config(), theme_id: db_theme.theme_id, entity_type: db_theme.entity_type, tenant_id: db_theme.tenant_id, org_id: db_theme.org_id, merchant_id: db_theme.merchant_id, profile_id: db_theme.profile_id, theme_name: db_theme.theme_name, theme_data: parsed_data, })) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 47, "total_crates": null }
fn_clm_router_list_all_themes_in_lineage_978809469104859181
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/user/theme pub async fn list_all_themes_in_lineage( state: SessionState, user: UserFromToken, entity_type: EntityType, ) -> UserResponse<Vec<theme_api::GetThemeResponse>> { let lineage = theme_utils::get_theme_lineage_from_user_token(&user, &state, &entity_type).await?; let db_themes = state .store .list_themes_at_and_under_lineage(lineage) .await .change_context(UserErrors::InternalServerError)?; let mut themes = Vec::new(); for theme in db_themes { match theme_utils::retrieve_file_from_theme_bucket( &state, &theme_utils::get_theme_file_key(&theme.theme_id), ) .await { Ok(file) => { match file .to_bytes() .parse_struct("ThemeData") .change_context(UserErrors::InternalServerError) { Ok(parsed_data) => { themes.push(theme_api::GetThemeResponse { email_config: theme.email_config(), theme_id: theme.theme_id, theme_name: theme.theme_name, entity_type: theme.entity_type, tenant_id: theme.tenant_id, org_id: theme.org_id, merchant_id: theme.merchant_id, profile_id: theme.profile_id, theme_data: parsed_data, }); } Err(_) => { return Err(UserErrors::ErrorRetrievingFile.into()); } } } Err(_) => { return Err(UserErrors::ErrorRetrievingFile.into()); } } } Ok(ApplicationResponse::Json(themes)) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 41, "total_crates": null }
fn_clm_router_insert_metadata_-996217109108232690
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/user/dashboard_metadata async fn insert_metadata( state: &SessionState, user: UserFromToken, metadata_key: DBEnum, metadata_value: types::MetaData, ) -> UserResult<DashboardMetadata> { match metadata_value { types::MetaData::ProductionAgreement(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::SetupProcessor(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::ConfigureEndpoint(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::SetupComplete(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::FirstProcessorConnected(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::SecondProcessorConnected(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::ConfiguredRouting(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::TestPayment(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::IntegrationMethod(data) => { let mut metadata = utils::insert_merchant_scoped_metadata_to_db( state, user.user_id.clone(), user.merchant_id.clone(), user.org_id.clone(), metadata_key, data.clone(), ) .await; if utils::is_update_required(&metadata) { metadata = utils::update_merchant_scoped_metadata( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await .change_context(UserErrors::InternalServerError); } metadata } types::MetaData::ConfigurationType(data) => { let mut metadata = utils::insert_merchant_scoped_metadata_to_db( state, user.user_id.clone(), user.merchant_id.clone(), user.org_id.clone(), metadata_key, data.clone(), ) .await; if utils::is_update_required(&metadata) { metadata = utils::update_merchant_scoped_metadata( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await .change_context(UserErrors::InternalServerError); } metadata } types::MetaData::IntegrationCompleted(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::StripeConnected(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::PaypalConnected(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::SPRoutingConfigured(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::Feedback(data) => { let mut metadata = utils::insert_user_scoped_metadata_to_db( state, user.user_id.clone(), user.merchant_id.clone(), user.org_id.clone(), metadata_key, data.clone(), ) .await; if utils::is_update_required(&metadata) { metadata = utils::update_user_scoped_metadata( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await .change_context(UserErrors::InternalServerError); } metadata } types::MetaData::ProdIntent(data) => { let mut metadata = utils::insert_merchant_scoped_metadata_to_db( state, user.user_id.clone(), user.merchant_id.clone(), user.org_id.clone(), metadata_key, data.clone(), ) .await; if utils::is_update_required(&metadata) { metadata = utils::update_merchant_scoped_metadata( state, user.user_id.clone(), user.merchant_id.clone(), user.org_id.clone(), metadata_key, data.clone(), ) .await .change_context(UserErrors::InternalServerError); } #[cfg(feature = "email")] { let user_data = user.get_user_from_db(state).await?; let user_email = domain::UserEmail::from_pii_email(user_data.get_email()) .change_context(UserErrors::InternalServerError)? .get_secret() .expose(); if utils::is_prod_email_required(&data, user_email) { let theme = theme_utils::get_most_specific_theme_using_token_and_min_entity( state, &user, EntityType::Merchant, ) .await?; let email_contents = email_types::BizEmailProd::new( state, data.clone(), theme.as_ref().map(|theme| theme.theme_id.clone()), theme .map(|theme| theme.email_config()) .unwrap_or(state.conf.theme.email_config.clone()), )?; let send_email_result = state .email_client .compose_and_send_email( user_utils::get_base_url(state), Box::new(email_contents), state.conf.proxy.https_url.as_ref(), ) .await; logger::info!(prod_intent_email=?send_email_result); } } // Hubspot integration let hubspot_body = state .crm_client .make_body(CrmPayload { legal_business_name: data.legal_business_name.map(|s| s.into_inner()), business_label: data.business_label.map(|s| s.into_inner()), business_location: data.business_location, display_name: data.display_name.map(|s| s.into_inner()), poc_email: data.poc_email.map(|s| Secret::new(s.peek().clone())), business_type: data.business_type.map(|s| s.into_inner()), business_identifier: data.business_identifier.map(|s| s.into_inner()), business_website: data.business_website.map(|s| s.into_inner()), poc_name: data .poc_name .map(|s| Secret::new(s.peek().clone().into_inner())), poc_contact: data .poc_contact .map(|s| Secret::new(s.peek().clone().into_inner())), comments: data.comments.map(|s| s.into_inner()), is_completed: data.is_completed, business_country_name: data.business_country_name.map(|s| s.into_inner()), }) .await; let base_url = user_utils::get_base_url(state); let hubspot_request = state .crm_client .make_request(hubspot_body, base_url.to_string()) .await; let _ = state .crm_client .send_request(&state.conf.proxy, hubspot_request) .await .inspect_err(|err| { logger::error!( "An error occurred while sending data to hubspot for user_id {}: {:?}", user.user_id, err ); }); metadata } types::MetaData::SPTestPayment(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::DownloadWoocom(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::ConfigureWoocom(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::SetupWoocomWebhook(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::IsMultipleConfiguration(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::IsChangePasswordRequired(data) => { utils::insert_user_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::OnboardingSurvey(data) => { utils::insert_merchant_scoped_metadata_to_db( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await } types::MetaData::ReconStatus(data) => { let mut metadata = utils::insert_merchant_scoped_metadata_to_db( state, user.user_id.clone(), user.merchant_id.clone(), user.org_id.clone(), metadata_key, data.clone(), ) .await; if utils::is_update_required(&metadata) { metadata = utils::update_merchant_scoped_metadata( state, user.user_id, user.merchant_id, user.org_id, metadata_key, data, ) .await; } metadata } } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 256, "total_crates": null }
fn_clm_router_into_response_-996217109108232690
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/user/dashboard_metadata fn into_response( data: Option<&DashboardMetadata>, data_type: DBEnum, ) -> UserResult<api::GetMetaDataResponse> { match data_type { DBEnum::ProductionAgreement => Ok(api::GetMetaDataResponse::ProductionAgreement( data.is_some(), )), DBEnum::SetupProcessor => { let resp = utils::deserialize_to_response(data)?; Ok(api::GetMetaDataResponse::SetupProcessor(resp)) } DBEnum::ConfigureEndpoint => { Ok(api::GetMetaDataResponse::ConfigureEndpoint(data.is_some())) } DBEnum::SetupComplete => Ok(api::GetMetaDataResponse::SetupComplete(data.is_some())), DBEnum::FirstProcessorConnected => { let resp = utils::deserialize_to_response(data)?; Ok(api::GetMetaDataResponse::FirstProcessorConnected(resp)) } DBEnum::SecondProcessorConnected => { let resp = utils::deserialize_to_response(data)?; Ok(api::GetMetaDataResponse::SecondProcessorConnected(resp)) } DBEnum::ConfiguredRouting => { let resp = utils::deserialize_to_response(data)?; Ok(api::GetMetaDataResponse::ConfiguredRouting(resp)) } DBEnum::TestPayment => { let resp = utils::deserialize_to_response(data)?; Ok(api::GetMetaDataResponse::TestPayment(resp)) } DBEnum::IntegrationMethod => { let resp = utils::deserialize_to_response(data)?; Ok(api::GetMetaDataResponse::IntegrationMethod(resp)) } DBEnum::ConfigurationType => { let resp = utils::deserialize_to_response(data)?; Ok(api::GetMetaDataResponse::ConfigurationType(resp)) } DBEnum::IntegrationCompleted => Ok(api::GetMetaDataResponse::IntegrationCompleted( data.is_some(), )), DBEnum::StripeConnected => { let resp = utils::deserialize_to_response(data)?; Ok(api::GetMetaDataResponse::StripeConnected(resp)) } DBEnum::PaypalConnected => { let resp = utils::deserialize_to_response(data)?; Ok(api::GetMetaDataResponse::PaypalConnected(resp)) } DBEnum::SpRoutingConfigured => { let resp = utils::deserialize_to_response(data)?; Ok(api::GetMetaDataResponse::SPRoutingConfigured(resp)) } DBEnum::Feedback => { let resp = utils::deserialize_to_response(data)?; Ok(api::GetMetaDataResponse::Feedback(resp)) } DBEnum::ProdIntent => { let resp = utils::deserialize_to_response(data)?; Ok(api::GetMetaDataResponse::ProdIntent(resp)) } DBEnum::SpTestPayment => Ok(api::GetMetaDataResponse::SPTestPayment(data.is_some())), DBEnum::DownloadWoocom => Ok(api::GetMetaDataResponse::DownloadWoocom(data.is_some())), DBEnum::ConfigureWoocom => Ok(api::GetMetaDataResponse::ConfigureWoocom(data.is_some())), DBEnum::SetupWoocomWebhook => { Ok(api::GetMetaDataResponse::SetupWoocomWebhook(data.is_some())) } DBEnum::IsMultipleConfiguration => Ok(api::GetMetaDataResponse::IsMultipleConfiguration( data.is_some(), )), DBEnum::IsChangePasswordRequired => Ok(api::GetMetaDataResponse::IsChangePasswordRequired( data.is_some(), )), DBEnum::OnboardingSurvey => { let resp = utils::deserialize_to_response(data)?; Ok(api::GetMetaDataResponse::OnboardingSurvey(resp)) } DBEnum::ReconStatus => { let resp = utils::deserialize_to_response(data)?; Ok(api::GetMetaDataResponse::ReconStatus(resp)) } } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 102, "total_crates": null }
fn_clm_router_backfill_metadata_-996217109108232690
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/user/dashboard_metadata pub async fn backfill_metadata( state: &SessionState, user: &UserFromToken, key: &DBEnum, ) -> UserResult<Option<DashboardMetadata>> { let key_store = state .store .get_merchant_key_store_by_merchant_id( &state.into(), &user.merchant_id, &state.store.get_master_key().to_vec().into(), ) .await .change_context(UserErrors::InternalServerError)?; match key { DBEnum::StripeConnected => { let mca = if let Some(stripe_connected) = get_merchant_connector_account_by_name( state, &user.merchant_id, api_models::enums::RoutableConnectors::Stripe .to_string() .as_str(), &key_store, ) .await? { stripe_connected } else if let Some(stripe_test_connected) = get_merchant_connector_account_by_name( state, &user.merchant_id, //TODO: Use Enum with proper feature flag "stripe_test", &key_store, ) .await? { stripe_test_connected } else { return Ok(None); }; #[cfg(feature = "v1")] let processor_name = mca.connector_name.clone(); #[cfg(feature = "v2")] let processor_name = mca.connector_name.to_string().clone(); Some( insert_metadata( state, user.to_owned(), DBEnum::StripeConnected, types::MetaData::StripeConnected(api::ProcessorConnected { processor_id: mca.get_id(), processor_name, }), ) .await, ) .transpose() } DBEnum::PaypalConnected => { let mca = if let Some(paypal_connected) = get_merchant_connector_account_by_name( state, &user.merchant_id, api_models::enums::RoutableConnectors::Paypal .to_string() .as_str(), &key_store, ) .await? { paypal_connected } else if let Some(paypal_test_connected) = get_merchant_connector_account_by_name( state, &user.merchant_id, //TODO: Use Enum with proper feature flag "paypal_test", &key_store, ) .await? { paypal_test_connected } else { return Ok(None); }; #[cfg(feature = "v1")] let processor_name = mca.connector_name.clone(); #[cfg(feature = "v2")] let processor_name = mca.connector_name.to_string().clone(); Some( insert_metadata( state, user.to_owned(), DBEnum::PaypalConnected, types::MetaData::PaypalConnected(api::ProcessorConnected { processor_id: mca.get_id(), processor_name, }), ) .await, ) .transpose() } _ => Ok(None), } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 73, "total_crates": null }
fn_clm_router_parse_set_request_-996217109108232690
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/user/dashboard_metadata fn parse_set_request(data_enum: api::SetMetaDataRequest) -> UserResult<types::MetaData> { match data_enum { api::SetMetaDataRequest::ProductionAgreement(req) => { let ip_address = req .ip_address .ok_or(report!(UserErrors::InternalServerError)) .attach_printable("Error Getting Ip Address")?; Ok(types::MetaData::ProductionAgreement( types::ProductionAgreementValue { version: req.version, ip_address, timestamp: common_utils::date_time::now(), }, )) } api::SetMetaDataRequest::SetupProcessor(req) => Ok(types::MetaData::SetupProcessor(req)), api::SetMetaDataRequest::ConfigureEndpoint => Ok(types::MetaData::ConfigureEndpoint(true)), api::SetMetaDataRequest::SetupComplete => Ok(types::MetaData::SetupComplete(true)), api::SetMetaDataRequest::FirstProcessorConnected(req) => { Ok(types::MetaData::FirstProcessorConnected(req)) } api::SetMetaDataRequest::SecondProcessorConnected(req) => { Ok(types::MetaData::SecondProcessorConnected(req)) } api::SetMetaDataRequest::ConfiguredRouting(req) => { Ok(types::MetaData::ConfiguredRouting(req)) } api::SetMetaDataRequest::TestPayment(req) => Ok(types::MetaData::TestPayment(req)), api::SetMetaDataRequest::IntegrationMethod(req) => { Ok(types::MetaData::IntegrationMethod(req)) } api::SetMetaDataRequest::ConfigurationType(req) => { Ok(types::MetaData::ConfigurationType(req)) } api::SetMetaDataRequest::IntegrationCompleted => { Ok(types::MetaData::IntegrationCompleted(true)) } api::SetMetaDataRequest::SPRoutingConfigured(req) => { Ok(types::MetaData::SPRoutingConfigured(req)) } api::SetMetaDataRequest::Feedback(req) => Ok(types::MetaData::Feedback(req)), api::SetMetaDataRequest::ProdIntent(req) => Ok(types::MetaData::ProdIntent(req)), api::SetMetaDataRequest::SPTestPayment => Ok(types::MetaData::SPTestPayment(true)), api::SetMetaDataRequest::DownloadWoocom => Ok(types::MetaData::DownloadWoocom(true)), api::SetMetaDataRequest::ConfigureWoocom => Ok(types::MetaData::ConfigureWoocom(true)), api::SetMetaDataRequest::SetupWoocomWebhook => { Ok(types::MetaData::SetupWoocomWebhook(true)) } api::SetMetaDataRequest::IsMultipleConfiguration => { Ok(types::MetaData::IsMultipleConfiguration(true)) } api::SetMetaDataRequest::IsChangePasswordRequired => { Ok(types::MetaData::IsChangePasswordRequired(true)) } api::SetMetaDataRequest::OnboardingSurvey(req) => { Ok(types::MetaData::OnboardingSurvey(req)) } api::SetMetaDataRequest::ReconStatus(req) => Ok(types::MetaData::ReconStatus(req)), } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 53, "total_crates": null }
fn_clm_router_get_multiple_metadata_-996217109108232690
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/user/dashboard_metadata pub async fn get_multiple_metadata( state: SessionState, user: UserFromToken, request: GetMultipleMetaDataPayload, _req_state: ReqState, ) -> UserResponse<Vec<api::GetMetaDataResponse>> { let metadata_keys: Vec<DBEnum> = request.results.into_iter().map(parse_get_request).collect(); let metadata = fetch_metadata(&state, &user, metadata_keys.clone()).await?; let mut response = Vec::with_capacity(metadata_keys.len()); for key in metadata_keys { let data = metadata.iter().find(|ele| ele.data_key == key); let resp; if data.is_none() && utils::is_backfill_required(key) { let backfill_data = backfill_metadata(&state, &user, &key).await?; resp = into_response(backfill_data.as_ref(), key)?; } else { resp = into_response(data, key)?; } response.push(resp); } Ok(ApplicationResponse::Json(response)) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 44, "total_crates": null }
fn_clm_router_generate_sample_data_for_user_8563541842738157021
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/user/sample_data pub async fn generate_sample_data_for_user( state: SessionState, user_from_token: UserFromToken, req: SampleDataRequest, _req_state: ReqState, ) -> SampleDataApiResponse<()> { let sample_data = utils::user::sample_data::generate_sample_data( &state, req, &user_from_token.merchant_id, &user_from_token.org_id, ) .await?; let key_store = state .store .get_merchant_key_store_by_merchant_id( &(&state).into(), &user_from_token.merchant_id, &state.store.get_master_key().to_vec().into(), ) .await .change_context(SampleDataError::InternalServerError) .attach_printable("Not able to fetch merchant key store")?; // If not able to fetch merchant key store for any reason, this should be an internal server error let (payment_intents, payment_attempts, refunds, disputes): ( Vec<PaymentIntent>, Vec<diesel_models::user::sample_data::PaymentAttemptBatchNew>, Vec<RefundNew>, Vec<DisputeNew>, ) = sample_data.into_iter().fold( (Vec::new(), Vec::new(), Vec::new(), Vec::new()), |(mut pi, mut pa, mut rf, mut dp), (payment_intent, payment_attempt, refund, dispute)| { pi.push(payment_intent); pa.push(payment_attempt); if let Some(refund) = refund { rf.push(refund); } if let Some(dispute) = dispute { dp.push(dispute); } (pi, pa, rf, dp) }, ); state .store .insert_payment_intents_batch_for_sample_data(&(&state).into(), payment_intents, &key_store) .await .switch()?; state .store .insert_payment_attempts_batch_for_sample_data(payment_attempts) .await .switch()?; state .store .insert_refunds_batch_for_sample_data(refunds) .await .switch()?; state .store .insert_disputes_batch_for_sample_data(disputes) .await .switch()?; Ok(ApplicationResponse::StatusOk) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 64, "total_crates": null }
fn_clm_router_delete_sample_data_for_user_8563541842738157021
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/user/sample_data pub async fn delete_sample_data_for_user( state: SessionState, user_from_token: UserFromToken, _req: SampleDataRequest, _req_state: ReqState, ) -> SampleDataApiResponse<()> { let merchant_id_del = user_from_token.merchant_id; let key_manager_state = &(&state).into(); let key_store = state .store .get_merchant_key_store_by_merchant_id( key_manager_state, &merchant_id_del, &state.store.get_master_key().to_vec().into(), ) .await .change_context(SampleDataError::InternalServerError) .attach_printable("Not able to fetch merchant key store")?; // If not able to fetch merchant key store for any reason, this should be an internal server error state .store .delete_payment_intents_for_sample_data(key_manager_state, &merchant_id_del, &key_store) .await .switch()?; state .store .delete_payment_attempts_for_sample_data(&merchant_id_del) .await .switch()?; state .store .delete_refunds_for_sample_data(&merchant_id_del) .await .switch()?; state .store .delete_disputes_for_sample_data(&merchant_id_del) .await .switch()?; Ok(ApplicationResponse::StatusOk) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 40, "total_crates": null }
fn_clm_router_foreign_from_8135312189588599897
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/blocklist/transformers // Implementation of blocklist::AddToBlocklistResponse for ForeignFrom<storage::Blocklist> fn foreign_from(from: storage::Blocklist) -> Self { Self { fingerprint_id: from.fingerprint_id, data_kind: from.data_kind, created_at: from.created_at, } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 212, "total_crates": null }
fn_clm_router_generate_jwe_payload_for_request_8135312189588599897
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/blocklist/transformers async fn generate_jwe_payload_for_request( jwekey: &settings::Jwekey, jws: &str, locker_choice: api_enums::LockerChoice, ) -> CustomResult<encryption::JweBody, errors::VaultError> { let jws_payload: Vec<&str> = jws.split('.').collect(); let generate_jws_body = |payload: Vec<&str>| -> Option<encryption::JwsBody> { Some(encryption::JwsBody { header: payload.first()?.to_string(), payload: payload.get(1)?.to_string(), signature: payload.get(2)?.to_string(), }) }; let jws_body = generate_jws_body(jws_payload).ok_or(errors::VaultError::GenerateFingerprintFailed)?; let payload = jws_body .encode_to_vec() .change_context(errors::VaultError::GenerateFingerprintFailed)?; let public_key = match locker_choice { api_enums::LockerChoice::HyperswitchCardVault => { jwekey.vault_encryption_key.peek().as_bytes() } }; let jwe_encrypted = encryption::encrypt_jwe(&payload, public_key, EncryptionAlgorithm::A256GCM, None) .await .change_context(errors::VaultError::SaveCardFailed) .attach_printable("Error on jwe encrypt")?; let jwe_payload: Vec<&str> = jwe_encrypted.split('.').collect(); let generate_jwe_body = |payload: Vec<&str>| -> Option<encryption::JweBody> { Some(encryption::JweBody { header: payload.first()?.to_string(), iv: payload.get(2)?.to_string(), encrypted_payload: payload.get(3)?.to_string(), tag: payload.get(4)?.to_string(), encrypted_key: payload.get(1)?.to_string(), }) }; let jwe_body = generate_jwe_body(jwe_payload).ok_or(errors::VaultError::GenerateFingerprintFailed)?; Ok(jwe_body) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 65, "total_crates": null }
fn_clm_router_generate_fingerprint_request_8135312189588599897
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/blocklist/transformers async fn generate_fingerprint_request( jwekey: &settings::Jwekey, locker: &settings::Locker, payload: &blocklist::GenerateFingerprintRequest, locker_choice: api_enums::LockerChoice, ) -> CustomResult<services::Request, errors::VaultError> { let payload = payload .encode_to_vec() .change_context(errors::VaultError::RequestEncodingFailed)?; let private_key = jwekey.vault_private_key.peek().as_bytes(); let jws = encryption::jws_sign_payload(&payload, &locker.locker_signing_key_id, private_key) .await .change_context(errors::VaultError::RequestEncodingFailed)?; let jwe_payload = generate_jwe_payload_for_request(jwekey, &jws, locker_choice).await?; let mut url = match locker_choice { api_enums::LockerChoice::HyperswitchCardVault => locker.host.to_owned(), }; url.push_str(LOCKER_FINGERPRINT_PATH); let mut request = services::Request::new(services::Method::Post, &url); request.add_header(headers::CONTENT_TYPE, "application/json".into()); request.set_body(RequestContent::Json(Box::new(jwe_payload))); Ok(request) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 33, "total_crates": null }
fn_clm_router_decrypt_generate_fingerprint_response_payload_8135312189588599897
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/blocklist/transformers async fn decrypt_generate_fingerprint_response_payload( jwekey: &settings::Jwekey, jwe_body: encryption::JweBody, locker_choice: Option<api_enums::LockerChoice>, decryption_scheme: settings::DecryptionScheme, ) -> CustomResult<String, errors::VaultError> { let target_locker = locker_choice.unwrap_or(api_enums::LockerChoice::HyperswitchCardVault); let public_key = match target_locker { api_enums::LockerChoice::HyperswitchCardVault => { jwekey.vault_encryption_key.peek().as_bytes() } }; let private_key = jwekey.vault_private_key.peek().as_bytes(); let jwt = payment_methods::get_dotted_jwe(jwe_body); let alg = match decryption_scheme { settings::DecryptionScheme::RsaOaep => jwe::RSA_OAEP, settings::DecryptionScheme::RsaOaep256 => jwe::RSA_OAEP_256, }; let jwe_decrypted = encryption::decrypt_jwe( &jwt, encryption::KeyIdCheck::SkipKeyIdCheck, private_key, alg, ) .await .change_context(errors::VaultError::SaveCardFailed) .attach_printable("Jwe Decryption failed for JweBody for vault")?; let jws = jwe_decrypted .parse_struct("JwsBody") .change_context(errors::VaultError::ResponseDeserializationFailed)?; let jws_body = payment_methods::get_dotted_jws(jws); encryption::verify_sign(jws_body, public_key) .change_context(errors::VaultError::SaveCardFailed) .attach_printable("Jws Decryption failed for JwsBody for vault") }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 33, "total_crates": null }
fn_clm_router_call_to_locker_for_fingerprint_8135312189588599897
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/blocklist/transformers async fn call_to_locker_for_fingerprint( state: &routes::SessionState, payload: &blocklist::GenerateFingerprintRequest, locker_choice: api_enums::LockerChoice, ) -> CustomResult<blocklist::GenerateFingerprintResponsePayload, errors::VaultError> { let locker = &state.conf.locker; let jwekey = state.conf.jwekey.get_inner(); let request = generate_fingerprint_request(jwekey, locker, payload, locker_choice).await?; let response = services::call_connector_api(state, request, "call_locker_to_get_fingerprint") .await .change_context(errors::VaultError::GenerateFingerprintFailed); let jwe_body: encryption::JweBody = response .get_response_inner("JweBody") .change_context(errors::VaultError::GenerateFingerprintFailed)?; let decrypted_payload = decrypt_generate_fingerprint_response_payload( jwekey, jwe_body, Some(locker_choice), locker.decryption_scheme.clone(), ) .await .change_context(errors::VaultError::GenerateFingerprintFailed) .attach_printable("Error getting decrypted fingerprint response payload")?; let generate_fingerprint_response: blocklist::GenerateFingerprintResponsePayload = decrypted_payload .parse_struct("GenerateFingerprintResponse") .change_context(errors::VaultError::ResponseDeserializationFailed)?; Ok(generate_fingerprint_response) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 27, "total_crates": null }
fn_clm_router_should_payment_be_blocked_-7424996430069982891
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/blocklist/utils pub async fn should_payment_be_blocked( state: &SessionState, merchant_context: &domain::MerchantContext, payment_method_data: &Option<domain::PaymentMethodData>, ) -> CustomResult<bool, errors::ApiErrorResponse> { let db = &state.store; let merchant_id = merchant_context.get_merchant_account().get_id(); let merchant_fingerprint_secret = get_merchant_fingerprint_secret(state, merchant_id).await?; // Hashed Fingerprint to check whether or not this payment should be blocked. let card_number_fingerprint = if let Some(domain::PaymentMethodData::Card(card)) = payment_method_data { generate_fingerprint( state, StrongSecret::new(card.card_number.get_card_no()), StrongSecret::new(merchant_fingerprint_secret.clone()), api_models::enums::LockerChoice::HyperswitchCardVault, ) .await .attach_printable("error in pm fingerprint creation") .map_or_else( |error| { logger::error!(?error); None }, Some, ) .map(|payload| payload.card_fingerprint) } else { None }; // Hashed Cardbin to check whether or not this payment should be blocked. let card_bin_fingerprint = payment_method_data .as_ref() .and_then(|pm_data| match pm_data { domain::PaymentMethodData::Card(card) => Some(card.card_number.get_card_isin()), _ => None, }); // Hashed Extended Cardbin to check whether or not this payment should be blocked. let extended_card_bin_fingerprint = payment_method_data .as_ref() .and_then(|pm_data| match pm_data { domain::PaymentMethodData::Card(card) => { Some(card.card_number.get_extended_card_bin()) } _ => None, }); //validating the payment method. let mut blocklist_futures = Vec::new(); if let Some(card_number_fingerprint) = card_number_fingerprint.as_ref() { blocklist_futures.push(db.find_blocklist_entry_by_merchant_id_fingerprint_id( merchant_id, card_number_fingerprint, )); } if let Some(card_bin_fingerprint) = card_bin_fingerprint.as_ref() { blocklist_futures.push( db.find_blocklist_entry_by_merchant_id_fingerprint_id( merchant_id, card_bin_fingerprint, ), ); } if let Some(extended_card_bin_fingerprint) = extended_card_bin_fingerprint.as_ref() { blocklist_futures.push(db.find_blocklist_entry_by_merchant_id_fingerprint_id( merchant_id, extended_card_bin_fingerprint, )); } let blocklist_lookups = futures::future::join_all(blocklist_futures).await; let mut should_payment_be_blocked = false; for lookup in blocklist_lookups { match lookup { Ok(_) => { should_payment_be_blocked = true; } Err(e) => { logger::error!(blocklist_db_error=?e, "failed db operations for blocklist"); } } } Ok(should_payment_be_blocked) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 69, "total_crates": null }
fn_clm_router_validate_data_for_blocklist_-7424996430069982891
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/blocklist/utils pub async fn validate_data_for_blocklist<F>( state: &SessionState, merchant_context: &domain::MerchantContext, payment_data: &mut PaymentData<F>, ) -> CustomResult<bool, errors::ApiErrorResponse> where F: Send + Clone, { let db = &state.store; let should_payment_be_blocked = should_payment_be_blocked(state, merchant_context, &payment_data.payment_method_data) .await?; if should_payment_be_blocked { // Update db for attempt and intent status. db.update_payment_intent( &state.into(), payment_data.payment_intent.clone(), storage::PaymentIntentUpdate::RejectUpdate { status: common_enums::IntentStatus::Failed, merchant_decision: Some(MerchantDecision::Rejected.to_string()), updated_by: merchant_context .get_merchant_account() .storage_scheme .to_string(), }, merchant_context.get_merchant_key_store(), merchant_context.get_merchant_account().storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::PaymentNotFound) .attach_printable( "Failed to update status in Payment Intent to failed due to it being blocklisted", )?; // If payment is blocked not showing connector details let attempt_update = storage::PaymentAttemptUpdate::BlocklistUpdate { status: common_enums::AttemptStatus::Failure, error_code: Some(Some("HE-03".to_string())), error_message: Some(Some("This payment method is blocked".to_string())), updated_by: merchant_context .get_merchant_account() .storage_scheme .to_string(), }; db.update_payment_attempt_with_attempt_id( payment_data.payment_attempt.clone(), attempt_update, merchant_context.get_merchant_account().storage_scheme, ) .await .to_not_found_response(errors::ApiErrorResponse::PaymentNotFound) .attach_printable( "Failed to update status in Payment Attempt to failed, due to it being blocklisted", )?; Err(errors::ApiErrorResponse::PaymentBlockedError { code: 200, message: "This payment method is blocked".to_string(), status: "Failed".to_string(), reason: "Blocked".to_string(), } .into()) } else { payment_data.payment_attempt.fingerprint_id = generate_payment_fingerprint( state, payment_data.payment_attempt.merchant_id.clone(), payment_data.payment_method_data.clone(), ) .await?; Ok(false) } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 67, "total_crates": null }
fn_clm_router_insert_entry_into_blocklist_-7424996430069982891
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/blocklist/utils pub async fn insert_entry_into_blocklist( state: &SessionState, merchant_id: &common_utils::id_type::MerchantId, to_block: api_blocklist::AddToBlocklistRequest, ) -> RouterResult<api_blocklist::AddToBlocklistResponse> { let blocklist_entry = match &to_block { api_blocklist::AddToBlocklistRequest::CardBin(bin) => { validate_card_bin(bin)?; duplicate_check_insert_bin( bin, state, merchant_id, common_enums::BlocklistDataKind::CardBin, ) .await? } api_blocklist::AddToBlocklistRequest::ExtendedCardBin(bin) => { validate_extended_card_bin(bin)?; duplicate_check_insert_bin( bin, state, merchant_id, common_enums::BlocklistDataKind::ExtendedCardBin, ) .await? } api_blocklist::AddToBlocklistRequest::Fingerprint(fingerprint_id) => { let blocklist_entry_result = state .store .find_blocklist_entry_by_merchant_id_fingerprint_id(merchant_id, fingerprint_id) .await; match blocklist_entry_result { Ok(_) => { return Err(errors::ApiErrorResponse::PreconditionFailed { message: "data associated with the given fingerprint is already blocked" .to_string(), } .into()); } // if it is a db not found error, we can proceed as normal Err(inner) if inner.current_context().is_db_not_found() => {} err @ Err(_) => { err.change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("error fetching blocklist entry from table")?; } } state .store .insert_blocklist_entry(storage::BlocklistNew { merchant_id: merchant_id.to_owned(), fingerprint_id: fingerprint_id.clone(), data_kind: api_models::enums::enums::BlocklistDataKind::PaymentMethod, metadata: None, created_at: common_utils::date_time::now(), }) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("failed to add fingerprint to blocklist")? } }; Ok(blocklist_entry.foreign_into()) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 49, "total_crates": null }
fn_clm_router_toggle_blocklist_guard_for_merchant_-7424996430069982891
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/blocklist/utils pub async fn toggle_blocklist_guard_for_merchant( state: &SessionState, merchant_id: &common_utils::id_type::MerchantId, query: api_blocklist::ToggleBlocklistQuery, ) -> CustomResult<api_blocklist::ToggleBlocklistResponse, errors::ApiErrorResponse> { let key = merchant_id.get_blocklist_guard_key(); let maybe_guard = state.store.find_config_by_key(&key).await; let new_config = configs::ConfigNew { key: key.clone(), config: query.status.to_string(), }; match maybe_guard { Ok(_config) => { let updated_config = configs::ConfigUpdate::Update { config: Some(query.status.to_string()), }; state .store .update_config_by_key(&key, updated_config) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error enabling the blocklist guard")?; } Err(e) if e.current_context().is_db_not_found() => { state .store .insert_config(new_config) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error enabling the blocklist guard")?; } Err(error) => { logger::error!(?error); Err(error) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("Error enabling the blocklist guard")?; } }; let guard_status = if query.status { "enabled" } else { "disabled" }; Ok(api_blocklist::ToggleBlocklistResponse { blocklist_guard_status: guard_status.to_string(), }) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 45, "total_crates": null }
fn_clm_router_get_merchant_fingerprint_secret_-7424996430069982891
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/blocklist/utils pub async fn get_merchant_fingerprint_secret( state: &SessionState, merchant_id: &common_utils::id_type::MerchantId, ) -> RouterResult<String> { let key = merchant_id.get_merchant_fingerprint_secret_key(); let config_fetch_result = state.store.find_config_by_key(&key).await; match config_fetch_result { Ok(config) => Ok(config.config), Err(e) if e.current_context().is_db_not_found() => { let new_fingerprint_secret = utils::generate_id(consts::FINGERPRINT_SECRET_LENGTH, "fs"); let new_config = storage::ConfigNew { key, config: new_fingerprint_secret.clone(), }; state .store .insert_config(new_config) .await .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("unable to create new fingerprint secret for merchant")?; Ok(new_fingerprint_secret) } Err(e) => Err(e) .change_context(errors::ApiErrorResponse::InternalServerError) .attach_printable("error fetching merchant fingerprint secret"), } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 38, "total_crates": null }
fn_clm_router_get_profile_id_for_mandate_-551948293113827536
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/mandate/helpers pub async fn get_profile_id_for_mandate( state: &SessionState, merchant_context: &domain::MerchantContext, mandate: Mandate, ) -> CustomResult<common_utils::id_type::ProfileId, errors::ApiErrorResponse> { let profile_id = if let Some(ref payment_id) = mandate.original_payment_id { let pi = state .store .find_payment_intent_by_payment_id_merchant_id( &state.into(), payment_id, merchant_context.get_merchant_account().get_id(), merchant_context.get_merchant_key_store(), merchant_context.get_merchant_account().storage_scheme, ) .await .change_context(errors::ApiErrorResponse::PaymentNotFound)?; let profile_id = pi.profile_id .clone() .ok_or(errors::ApiErrorResponse::ProfileNotFound { id: pi .profile_id .map(|profile_id| profile_id.get_string_repr().to_owned()) .unwrap_or_else(|| "Profile id is Null".to_string()), })?; Ok(profile_id) } else { Err(errors::ApiErrorResponse::PaymentNotFound) }?; Ok(profile_id) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 41, "total_crates": null }
fn_clm_router_get_mandate_type_-551948293113827536
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/mandate/helpers pub fn get_mandate_type( mandate_data: Option<api_payments::MandateData>, off_session: Option<bool>, setup_future_usage: Option<enums::FutureUsage>, customer_acceptance: Option<common_payments_types::CustomerAcceptance>, token: Option<String>, payment_method: Option<enums::PaymentMethod>, ) -> CustomResult<Option<api::MandateTransactionType>, errors::ValidationError> { match ( mandate_data.clone(), off_session, setup_future_usage, customer_acceptance.or(mandate_data.and_then(|m_data| m_data.customer_acceptance)), token, payment_method, ) { (Some(_), Some(_), Some(enums::FutureUsage::OffSession), Some(_), Some(_), _) => { Err(errors::ValidationError::InvalidValue { message: "Expected one out of recurring_details and mandate_data but got both" .to_string(), } .into()) } (_, _, Some(enums::FutureUsage::OffSession), Some(_), Some(_), _) | (_, _, Some(enums::FutureUsage::OffSession), Some(_), _, _) | (Some(_), _, Some(enums::FutureUsage::OffSession), _, _, _) => { Ok(Some(api::MandateTransactionType::NewMandateTransaction)) } (_, _, Some(enums::FutureUsage::OffSession), _, Some(_), _) | (_, Some(_), _, _, _, _) | (_, _, Some(enums::FutureUsage::OffSession), _, _, Some(enums::PaymentMethod::Wallet)) => { Ok(Some( api::MandateTransactionType::RecurringMandateTransaction, )) } _ => Ok(None), } }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 32, "total_crates": null }
fn_clm_router_construct_mandate_revoke_router_data_2862946388357202578
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/mandate/utils pub async fn construct_mandate_revoke_router_data( state: &SessionState, merchant_connector_account: helpers::MerchantConnectorAccountType, merchant_context: &domain::MerchantContext, mandate: Mandate, ) -> CustomResult<types::MandateRevokeRouterData, errors::ApiErrorResponse> { let auth_type: types::ConnectorAuthType = merchant_connector_account .get_connector_account_details() .parse_value("ConnectorAuthType") .change_context(errors::ApiErrorResponse::InternalServerError)?; let router_data = types::RouterData { flow: PhantomData, merchant_id: merchant_context.get_merchant_account().get_id().clone(), customer_id: Some(mandate.customer_id), tenant_id: state.tenant.tenant_id.clone(), connector_customer: None, connector: mandate.connector, payment_id: mandate .original_payment_id .unwrap_or_else(|| { common_utils::id_type::PaymentId::get_irrelevant_id("mandate_revoke") }) .get_string_repr() .to_owned(), attempt_id: IRRELEVANT_ATTEMPT_ID_IN_MANDATE_REVOKE_FLOW.to_string(), status: diesel_models::enums::AttemptStatus::default(), payment_method: diesel_models::enums::PaymentMethod::default(), payment_method_type: None, connector_auth_type: auth_type, description: None, address: PaymentAddress::default(), auth_type: diesel_models::enums::AuthenticationType::default(), connector_meta_data: None, connector_wallets_details: None, amount_captured: None, minor_amount_captured: None, access_token: None, session_token: None, reference_id: None, payment_method_token: None, recurring_mandate_payment_data: None, preprocessing_id: None, payment_method_balance: None, connector_api_version: None, payment_method_status: None, request: types::MandateRevokeRequestData { mandate_id: mandate.mandate_id, connector_mandate_id: mandate.connector_mandate_id, }, response: Err(types::ErrorResponse::get_not_implemented()), connector_request_reference_id: IRRELEVANT_CONNECTOR_REQUEST_REFERENCE_ID_IN_MANDATE_REVOKE_FLOW.to_string(), test_mode: None, connector_http_status_code: None, external_latency: None, apple_pay_flow: None, frm_metadata: None, #[cfg(feature = "payouts")] payout_method_data: None, #[cfg(feature = "payouts")] quote_id: None, refund_id: None, dispute_id: None, connector_response: None, integrity_check: Ok(()), additional_merchant_data: None, header_payload: None, connector_mandate_request_reference_id: None, authentication_id: None, psd2_sca_exemption_type: None, raw_connector_response: None, is_payment_id_from_merchant: None, l2_l3_data: None, minor_amount_capturable: None, authorized_amount: None, }; Ok(router_data) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": true, "num_enums": null, "num_structs": null, "num_tables": null, "score": 49, "total_crates": null }
fn_clm_router_post_authentication_-8397267065422295570
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/unified_authentication_service/types async fn post_authentication( _state: &SessionState, _business_profile: &domain::Profile, _payment_id: Option<&common_utils::id_type::PaymentId>, _merchant_connector_account: &MerchantConnectorAccountType, _connector_name: &str, _authentication_id: &common_utils::id_type::AuthenticationId, _payment_method: common_enums::PaymentMethod, _merchant_id: &common_utils::id_type::MerchantId, _authentication: Option<&diesel_models::authentication::Authentication>, ) -> RouterResult<hyperswitch_domain_models::types::UasPostAuthenticationRouterData> { Err(errors::ApiErrorResponse::NotImplemented { message: NotImplementedMessage::Reason("post_authentication".to_string()), } .into()) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 18, "total_crates": null }
fn_clm_router_pre_authentication_-8397267065422295570
clm
function
// Repository: hyperswitch // Crate: router // Purpose: Main application server handling HTTP requests, authentication, and business logic orchestration // Module: crates/router/src/core/unified_authentication_service/types async fn pre_authentication( _state: &SessionState, _merchant_id: &common_utils::id_type::MerchantId, _payment_id: Option<&common_utils::id_type::PaymentId>, _payment_method_data: Option<&domain::PaymentMethodData>, _payment_method_type: Option<common_enums::PaymentMethodType>, _merchant_connector_account: &MerchantConnectorAccountType, _connector_name: &str, _authentication_id: &common_utils::id_type::AuthenticationId, _payment_method: common_enums::PaymentMethod, _amount: common_utils::types::MinorUnit, _currency: Option<common_enums::Currency>, _service_details: Option<payments::CtpServiceDetails>, _merchant_details: Option<&hyperswitch_domain_models::router_request_types::unified_authentication_service::MerchantDetails>, _billing_address: Option<&hyperswitch_domain_models::address::Address>, _acquirer_bin: Option<String>, _acquirer_merchant_id: Option<String>, ) -> RouterResult<hyperswitch_domain_models::types::UasPreAuthenticationRouterData> { Err(errors::ApiErrorResponse::NotImplemented { message: NotImplementedMessage::Reason("pre_authentication".to_string()), } .into()) }
{ "crate": "router", "file": null, "file_size": null, "is_async": false, "is_pub": false, "num_enums": null, "num_structs": null, "num_tables": null, "score": 15, "total_crates": null }