mirror of
https://github.com/juspay/hyperswitch.git
synced 2025-10-29 00:49:42 +08:00
225 lines
6.6 KiB
Rust
225 lines
6.6 KiB
Rust
#![forbid(unsafe_code)]
|
|
#![recursion_limit = "256"]
|
|
|
|
pub mod cache;
|
|
#[cfg(feature = "stripe")]
|
|
pub mod compatibility;
|
|
pub mod configs;
|
|
pub mod connection;
|
|
pub mod connector;
|
|
pub(crate) mod consts;
|
|
pub mod core;
|
|
pub mod cors;
|
|
pub mod db;
|
|
pub mod env;
|
|
pub(crate) mod macros;
|
|
pub mod routes;
|
|
pub mod scheduler;
|
|
|
|
pub mod middleware;
|
|
#[cfg(feature = "openapi")]
|
|
pub mod openapi;
|
|
pub mod services;
|
|
pub mod types;
|
|
pub mod utils;
|
|
|
|
use actix_web::{
|
|
body::MessageBody,
|
|
dev::{Server, ServerHandle, ServiceFactory, ServiceRequest},
|
|
middleware::ErrorHandlers,
|
|
};
|
|
use http::StatusCode;
|
|
use routes::AppState;
|
|
use tokio::sync::{mpsc, oneshot};
|
|
|
|
pub use self::env::logger;
|
|
use crate::{
|
|
configs::settings,
|
|
core::errors::{self, ApplicationResult},
|
|
};
|
|
|
|
#[cfg(feature = "mimalloc")]
|
|
#[global_allocator]
|
|
static ALLOC: mimalloc::MiMalloc = mimalloc::MiMalloc;
|
|
|
|
/// Header Constants
|
|
pub mod headers {
|
|
pub const ACCEPT: &str = "Accept";
|
|
pub const API_KEY: &str = "API-KEY";
|
|
pub const APIKEY: &str = "apikey";
|
|
pub const X_CC_API_KEY: &str = "X-CC-Api-Key";
|
|
pub const AUTHORIZATION: &str = "Authorization";
|
|
pub const CONTENT_TYPE: &str = "Content-Type";
|
|
pub const DATE: &str = "Date";
|
|
pub const NONCE: &str = "nonce";
|
|
pub const TIMESTAMP: &str = "Timestamp";
|
|
pub const TOKEN: &str = "token";
|
|
pub const X_API_KEY: &str = "X-API-KEY";
|
|
pub const X_API_VERSION: &str = "X-ApiVersion";
|
|
pub const X_MERCHANT_ID: &str = "X-Merchant-Id";
|
|
pub const X_LOGIN: &str = "X-Login";
|
|
pub const X_TRANS_KEY: &str = "X-Trans-Key";
|
|
pub const X_VERSION: &str = "X-Version";
|
|
pub const X_CC_VERSION: &str = "X-CC-Version";
|
|
pub const X_ACCEPT_VERSION: &str = "X-Accept-Version";
|
|
pub const X_DATE: &str = "X-Date";
|
|
}
|
|
|
|
pub mod pii {
|
|
//! Personal Identifiable Information protection.
|
|
|
|
pub(crate) use common_utils::pii::Email;
|
|
#[doc(inline)]
|
|
pub use masking::*;
|
|
}
|
|
|
|
pub fn mk_app(
|
|
state: AppState,
|
|
request_body_limit: usize,
|
|
) -> actix_web::App<
|
|
impl ServiceFactory<
|
|
ServiceRequest,
|
|
Config = (),
|
|
Response = actix_web::dev::ServiceResponse<impl MessageBody>,
|
|
Error = actix_web::Error,
|
|
InitError = (),
|
|
>,
|
|
> {
|
|
let mut server_app = get_application_builder(request_body_limit);
|
|
|
|
#[cfg(feature = "openapi")]
|
|
{
|
|
use utoipa::OpenApi;
|
|
server_app = server_app.service(
|
|
utoipa_swagger_ui::SwaggerUi::new("/docs/{_:.*}")
|
|
.url("/docs/openapi.json", openapi::ApiDoc::openapi()),
|
|
);
|
|
}
|
|
|
|
#[cfg(feature = "dummy_connector")]
|
|
{
|
|
use routes::DummyConnector;
|
|
server_app = server_app.service(DummyConnector::server(state.clone()));
|
|
}
|
|
|
|
#[cfg(any(feature = "olap", feature = "oltp"))]
|
|
{
|
|
server_app = server_app
|
|
.service(routes::Payments::server(state.clone()))
|
|
.service(routes::Customers::server(state.clone()))
|
|
.service(routes::Configs::server(state.clone()))
|
|
.service(routes::Refunds::server(state.clone()))
|
|
.service(routes::Payouts::server(state.clone()))
|
|
.service(routes::MerchantConnectorAccount::server(state.clone()))
|
|
.service(routes::Mandates::server(state.clone()));
|
|
}
|
|
|
|
#[cfg(feature = "oltp")]
|
|
{
|
|
server_app = server_app
|
|
.service(routes::PaymentMethods::server(state.clone()))
|
|
.service(routes::EphemeralKey::server(state.clone()))
|
|
.service(routes::Webhooks::server(state.clone()));
|
|
}
|
|
|
|
#[cfg(feature = "olap")]
|
|
{
|
|
server_app = server_app
|
|
.service(routes::MerchantAccount::server(state.clone()))
|
|
.service(routes::ApiKeys::server(state.clone()))
|
|
.service(routes::Files::server(state.clone()))
|
|
.service(routes::Disputes::server(state.clone()));
|
|
}
|
|
|
|
#[cfg(feature = "stripe")]
|
|
{
|
|
server_app = server_app.service(routes::StripeApis::server(state.clone()));
|
|
}
|
|
server_app = server_app.service(routes::Cards::server(state.clone()));
|
|
server_app = server_app.service(routes::Health::server(state));
|
|
server_app
|
|
}
|
|
|
|
/// Starts the server
|
|
///
|
|
/// # Panics
|
|
///
|
|
/// Unwrap used because without the value we can't start the server
|
|
#[allow(clippy::expect_used, clippy::unwrap_used)]
|
|
pub async fn start_server(conf: settings::Settings) -> ApplicationResult<Server> {
|
|
logger::debug!(startup_config=?conf);
|
|
let server = conf.server.clone();
|
|
let (tx, rx) = oneshot::channel();
|
|
let state = routes::AppState::new(conf, tx).await;
|
|
let request_body_limit = server.request_body_limit;
|
|
let server = actix_web::HttpServer::new(move || mk_app(state.clone(), request_body_limit))
|
|
.bind((server.host.as_str(), server.port))?
|
|
.workers(server.workers)
|
|
.shutdown_timeout(server.shutdown_timeout)
|
|
.run();
|
|
tokio::spawn(receiver_for_error(rx, server.handle()));
|
|
Ok(server)
|
|
}
|
|
|
|
pub async fn receiver_for_error(rx: oneshot::Receiver<()>, mut server: impl Stop) {
|
|
match rx.await {
|
|
Ok(_) => {
|
|
logger::error!("The redis server failed ");
|
|
server.stop_server().await;
|
|
}
|
|
Err(err) => {
|
|
logger::error!("Channel receiver error{err}");
|
|
}
|
|
}
|
|
}
|
|
|
|
#[async_trait::async_trait]
|
|
pub trait Stop {
|
|
async fn stop_server(&mut self);
|
|
}
|
|
|
|
#[async_trait::async_trait]
|
|
impl Stop for ServerHandle {
|
|
async fn stop_server(&mut self) {
|
|
let _ = self.stop(true).await;
|
|
}
|
|
}
|
|
#[async_trait::async_trait]
|
|
impl Stop for mpsc::Sender<()> {
|
|
async fn stop_server(&mut self) {
|
|
let _ = self.send(()).await.map_err(|err| logger::error!("{err}"));
|
|
}
|
|
}
|
|
|
|
pub fn get_application_builder(
|
|
request_body_limit: usize,
|
|
) -> actix_web::App<
|
|
impl ServiceFactory<
|
|
ServiceRequest,
|
|
Config = (),
|
|
Response = actix_web::dev::ServiceResponse<impl MessageBody>,
|
|
Error = actix_web::Error,
|
|
InitError = (),
|
|
>,
|
|
> {
|
|
let json_cfg = actix_web::web::JsonConfig::default()
|
|
.limit(request_body_limit)
|
|
.content_type_required(true)
|
|
.error_handler(utils::error_parser::custom_json_error_handler);
|
|
|
|
actix_web::App::new()
|
|
.app_data(json_cfg)
|
|
.wrap(ErrorHandlers::new().handler(
|
|
StatusCode::NOT_FOUND,
|
|
errors::error_handlers::custom_error_handlers,
|
|
))
|
|
.wrap(ErrorHandlers::new().handler(
|
|
StatusCode::METHOD_NOT_ALLOWED,
|
|
errors::error_handlers::custom_error_handlers,
|
|
))
|
|
.wrap(middleware::default_response_headers())
|
|
.wrap(cors::cors())
|
|
.wrap(middleware::RequestId)
|
|
.wrap(router_env::tracing_actix_web::TracingLogger::default())
|
|
}
|