mirror of
https://github.com/bitwarden/server.git
synced 2025-04-06 05:28:15 -05:00

* Families for enterprise/split up organization sponsorship service (#1829) * Split OrganizationSponsorshipService into commands * Use tokenable for token validation * Use interfaces to set up for DI * Use commands over services * Move service tests to command tests * Value types can't be null * Run dotnet format * Update src/Core/OrganizationFeatures/OrganizationSponsorships/FamiliesForEnterprise/CancelSponsorshipCommand.cs Co-authored-by: Justin Baur <admin@justinbaur.com> * Fix controller tests Co-authored-by: Justin Baur <admin@justinbaur.com> * Families for enterprise/split up organization sponsorship service (#1875) * Split OrganizationSponsorshipService into commands * Use tokenable for token validation * Use interfaces to set up for DI * Use commands over services * Move service tests to command tests * Value types can't be null * Run dotnet format * Update src/Core/OrganizationFeatures/OrganizationSponsorships/FamiliesForEnterprise/CancelSponsorshipCommand.cs Co-authored-by: Justin Baur <admin@justinbaur.com> * Fix controller tests * Split create and send sponsorships * Split up create sponsorship * Add self hosted commands to dependency injection * Add field to store cloud billing sync key on self host instances * Fix typo * Fix data protector purpose of sponsorship offers * Split cloud and selfhosted sponsorship offer tokenable * Generate offer from self hosted with all necessary auth data * Add Required properties to constructor * Split up cancel sponsorship command * Split revoke sponsorship command between cloud and self hosted * Fix/f4e multiple sponsorships (#1838) * Use sponosorship from validate to redeem * Update tests * Format * Remove sponsorship service * Run dotnet format * Fix self hosted only controller attribute * Clean up file structure and fixes * Remove unneeded tokenables * Remove obsolete commands * Do not require file/class prefix if unnecessary * Update Organizaiton sprocs * Remove unnecessary models * Fix tests * Generalize LicenseService path calculation Use async file read and deserialization * Use interfaces for testability * Remove unused usings * Correct test direction * Test license reading * remove unused usings * Format Co-authored-by: Justin Baur <admin@justinbaur.com> * Improve DataProtectorTokenFactory test coverage (#1884) * Add encstring to server * Test factory Co-authored-by: Carlos Muentes <cmuentes@bitwarden.com> * Format * Remove SymmetricKeyProtectedString Not needed * Set ForcInvalid Co-authored-by: Carlos Muentes <cmuentes@bitwarden.com> * Feature/self f4e/api keys (#1896) * Add in ApiKey * Work on API Key table * Work on apikey table * Fix response model * Work on information for UI * Work on last sync date * Work on sync status * Work on auth * Work on tokenable * Work on merge * Add custom requirement * Add policy * Run formatting * Work on EF Migrations * Work on OrganizationConnection * Work on database * Work on additional database table * Run formatting * Small fixes * More cleanup * Cleanup * Add RevisionDate * Add GO * Finish Sql project * Add newlines * Fix stored proc file * Fix sqlproj * Add newlines * Fix table * Add navigation property * Delete Connections when organization is deleted * Add connection validation * Start adding ID column * Work on ID column * Work on SQL migration * Work on migrations * Run formatting * Fix test build * Fix sprocs * Work on migrations * Fix Create table * Fix sproc * Add prints to migration * Add default value * Update EF migrations * Formatting * Add to integration tests * Minor fixes * Formatting * Cleanup * Address PR feedback * Address more PR feedback * Fix formatting * Fix formatting * Fix * Address PR feedback * Remove accidential change * Fix SQL build * Run formatting * Address PR feedback * Add sync data to OrganizationUserOrgDetails * Add comments * Remove OrganizationConnectionService interface * Remove unused using * Address PR feedback * Formatting * Minor fix * Feature/self f4e/update db (#1930) * Fix migration * Fix TimesRenewed * Add comments * Make two properties non-nullable * Remove need for SponsoredOrg on SH (#1934) * Remove need for SponsoredOrg on SH * Add Family prefix * Add check for enterprise org on BillingSync key (#1936) * [PS-10] Feature/sponsorships removed at end of term (#1938) * Rename commands to min unique names * Inject revoke command based on self hosting * WIP: Remove/Revoke marks to delete * Complete WIP * Improve remove/revoke tests * PR review * Fail validation if sponsorship has failed to sync for 6 months * Feature/do not accept old self host sponsorships (#1939) * Do not accept >6mo old self-hosted sponsorships * Give disabled grace period of 3 months * Fix issues of Sql.proj differing from migration outcome (#1942) * Fix issues of Sql.proj differing from migration outcome * Yoink int tests * Add missing assert helpers * Feature/org sponsorship sync (#1922) * Self-hosted side sync first pass TODO: * flush out org sponsorship model * implement cloud side * process cloud-side response and update self-hosted records * sync scaffolding second pass * remove list of Org User ids from sync and begin work on SelfHostedRevokeSponsorship * allow authenticated http calls from server to return a result * update models * add logic for sync and change offer email template * add billing sync key and hide CreateSponsorship without user * fix tests * add job scheduling * add authorize attributes to endpoints * separate models into data/model and request/response * batch sync more, add EnableCloudCommunication for testing * send emails in bulk * make userId and sponsorshipType non nullable * batch more on self hosted side of sync * remove TODOs and formatting * changed logic of cloud sync * let BaseIdentityClientService handle all logging * call sync from scheduled job on self host * create bulk db operations for OrganizationSponsorships * remove SponsoredOrgId from sync, return default from server http call * validate BillingSyncKey during sync revert changes to CreateSponsorshipCommand * revert changes to ICreateSponsorshipCommand * add some tests * add DeleteExpiredSponsorshipsJob * add cloud sync test * remove extra method * formatting * prevent new sponsorships from disabled orgs * update packages * - pulled out send sponsorship command dependency from sync on cloud - don't throw error when sponsorships are empty - formatting * formatting models * more formatting * remove licensingService dependency from selfhosted sync * use installation urls and formatting * create constructor for RequestModel and formatting * add date parameter to OrganizationSponsorship_DeleteExpired * add new migration * formatting * rename OrganizationCreateSponsorshipRequestModel to OrganizationSponsorshipCreateRequestModel * prevent whole sync from failing if one sponsorship type is unsupported * deserialize config and billingsynckey from org connection * alter log message when sync disabled * Add grace period to disabled orgs * return early on self hosted if there are no sponsorships in database * rename BillingSyncConfig * send sponsorship offers from controller * allow config to be a null object * better exception handling in sync scheduler * add ef migrations * formatting * fix tests * fix validate test Co-authored-by: Matt Gibson <mgibson@bitwarden.com> * Fix OrganizationApiKey issues (#1941) Co-authored-by: Justin Baur <admin@justinbaur.com> * Feature/org sponsorship self hosted tests (#1947) * Self-hosted side sync first pass TODO: * flush out org sponsorship model * implement cloud side * process cloud-side response and update self-hosted records * sync scaffolding second pass * remove list of Org User ids from sync and begin work on SelfHostedRevokeSponsorship * allow authenticated http calls from server to return a result * update models * add logic for sync and change offer email template * add billing sync key and hide CreateSponsorship without user * fix tests * add job scheduling * add authorize attributes to endpoints * separate models into data/model and request/response * batch sync more, add EnableCloudCommunication for testing * send emails in bulk * make userId and sponsorshipType non nullable * batch more on self hosted side of sync * remove TODOs and formatting * changed logic of cloud sync * let BaseIdentityClientService handle all logging * call sync from scheduled job on self host * create bulk db operations for OrganizationSponsorships * remove SponsoredOrgId from sync, return default from server http call * validate BillingSyncKey during sync revert changes to CreateSponsorshipCommand * revert changes to ICreateSponsorshipCommand * add some tests * add DeleteExpiredSponsorshipsJob * add cloud sync test * remove extra method * formatting * prevent new sponsorships from disabled orgs * update packages * - pulled out send sponsorship command dependency from sync on cloud - don't throw error when sponsorships are empty - formatting * formatting models * more formatting * remove licensingService dependency from selfhosted sync * use installation urls and formatting * create constructor for RequestModel and formatting * add date parameter to OrganizationSponsorship_DeleteExpired * add new migration * formatting * rename OrganizationCreateSponsorshipRequestModel to OrganizationSponsorshipCreateRequestModel * prevent whole sync from failing if one sponsorship type is unsupported * deserialize config and billingsynckey from org connection * add mockHttp nuget package and use httpclientfactory * fix current tests * WIP of creating tests * WIP of new self hosted tests * WIP self hosted tests * finish self hosted tests * formatting * format of interface * remove extra config file * added newlines Co-authored-by: Matt Gibson <mgibson@bitwarden.com> * Fix Organization_DeleteById (#1950) * Fix Organization_Delete * Fix L * [PS-4] block enterprise user from sponsoring itself (#1943) * [PS-248] Feature/add connections enabled endpoint (#1953) * Move Organization models to sub namespaces * Add Organization Connection api endpoints * Get all connections rather than just enabled ones * Add missing services to DI * pluralize private api endpoints * Add type protection to org connection request/response * Fix route * Use nullable Id to signify no connection * Test Get Connections enabled * Fix data discoverer * Also drop this sproc for rerunning * Id is the OUTPUT of create sprocs * Fix connection config parsing * Linter fixes * update sqlproj file name * Use param xdocs on methods * Simplify controller path attribute * Use JsonDocument to avoid escaped json in our response/request strings * Fix JsonDoc tests * Linter fixes * Fix ApiKey Command and add tests (#1949) * Fix ApiKey command * Formatting * Fix test failures introduced in #1943 (#1957) * Remove "Did you know?" copy from emails. (#1962) * Remove "Did you know" * Remove jsonIf helper * Feature/fix send single sponsorship offer email (#1956) * Fix sponsorship offer email * Do not sanitize org name * PR feedback * Feature/f4e sync event [PS-75] (#1963) * Create sponsorship sync event type * Add InstallationId to Event model * Add combinatorics-based test case generators * Log sponsorships sync event on sync * Linter and test fixes * Fix failing test * Migrate sprocs and view * Remove unused `using`s * [PS-190] Add manual sync trigger in self hosted (#1955) * WIP add button to admin project for billing sync * add connection table to view page * minor fixes for self hosted side of sync * fixes number of bugs for cloud side of sync * deserialize before returning for some reason * add json attributes to return models * list of sponsorships parameter is immutable, add secondary list * change sproc name * add error handling * Fix tests * modify call to connection * Update src/Admin/Controllers/OrganizationsController.cs Co-authored-by: Matt Gibson <mgibson@bitwarden.com> * undo change to sproc name * simplify logic * Update src/Core/OrganizationFeatures/OrganizationSponsorships/FamiliesForEnterprise/Cloud/CloudSyncSponsorshipsCommand.cs Co-authored-by: Matt Gibson <mgibson@bitwarden.com> * register services despite if self hosted or cloud * remove json properties * revert merge conflict Co-authored-by: Matt Gibson <mgibson@bitwarden.com> * Update OrganizationSponsorship valid until when updating org expirati… (#1966) * Update OrganizationSponsorship valid until when updating org expiration date * Linter fixes * [PS-7] change revert email copy and add ValidUntil to sponsorship (#1965) * change revert email copy and add ValidUntil to sponsorship * add 15 days if no ValidUntil * Chore/merge/self hosted families for enterprise (#1972) * Log swallowed HttpRequestExceptions (#1866) Co-authored-by: Hinton <oscar@oscarhinton.com> * Allow for utilization of readonly db connection (#1937) * Bump the pin of the download-artifacts action to bypass the broken GitHub api (#1952) * Bumped version to 1.48.0 (#1958) Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com> * [EC-160] Give Provider Users access to all org ciphers and collections (#1959) * Bumped version to 1.48.1 (#1961) Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com> * Avoid sending "user need confirmation" emails when there are no org admins (#1960) * Remove noncompliant users for new policies (#1951) * [PS-284] Allow installation clients to not need a user. (#1968) * Allow installation clients to not need a user. * Run formatting Co-authored-by: Andrei <30410186+Manolachi@users.noreply.github.com> Co-authored-by: Hinton <oscar@oscarhinton.com> Co-authored-by: sneakernuts <671942+sneakernuts@users.noreply.github.com> Co-authored-by: Joseph Flinn <58369717+joseph-flinn@users.noreply.github.com> Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com> Co-authored-by: Thomas Rittson <31796059+eliykat@users.noreply.github.com> Co-authored-by: Justin Baur <136baur@gmail.com> * Fix/license file not found (#1974) * Handle null license * Throw hint message if license is not found by the admin project. * Use CloudOrganizationId from Connection config * Change test to support change * Fix test Co-authored-by: Matt Gibson <mgibson@bitwarden.com> * Feature/f4e selfhosted rename migration to .sql (#1971) * rename migration to .sql * format * Add unit tests to self host F4E (#1975) * Work on tests * Added more tests * Run linting * Address PR feedback * Fix AssertRecent * Linting * Fixed empty tests * Fix/misc self hosted f4e (#1973) * Allow setting of ApiUri * Return updates sponsorshipsData objects * Bind arguments by name * Greedy load sponsorships to email. When upsert was called, it creates Ids on _all_ records, which meant that the lazy-evaluation from this call always returned an empty list. * add scope for sync command DI in job. simplify error logic * update the sync job to get CloudOrgId from the BillingSyncKey Co-authored-by: Jacob Fink <jfink@bitwarden.com> * Chore/merge/self hosted families for enterprise (#1987) * Log swallowed HttpRequestExceptions (#1866) Co-authored-by: Hinton <oscar@oscarhinton.com> * Allow for utilization of readonly db connection (#1937) * Bump the pin of the download-artifacts action to bypass the broken GitHub api (#1952) * Bumped version to 1.48.0 (#1958) Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com> * [EC-160] Give Provider Users access to all org ciphers and collections (#1959) * Bumped version to 1.48.1 (#1961) Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com> * Avoid sending "user need confirmation" emails when there are no org admins (#1960) * Remove noncompliant users for new policies (#1951) * [PS-284] Allow installation clients to not need a user. (#1968) * Allow installation clients to not need a user. * Run formatting * Use accept flow for sponsorship offers (#1964) * PS-82 check send 2FA email for new devices on TwoFactorController send-email-login (#1977) * [Bug] Skip WebAuthn 2fa event logs during login flow (#1978) * [Bug] Supress WebAuthn 2fa event logs during login process * Formatting * Simplified method call with new paramter input * Update RealIps Description (#1980) Describe the syntax of the real_ips configuration key with an example, to prevent type errors in the `setup` container when parsing `config.yml` * add proper URI validation to duo host (#1984) * captcha scores (#1967) * captcha scores * some api fixes * check bot on captcha attribute * Update src/Core/Services/Implementations/HCaptchaValidationService.cs Co-authored-by: e271828- <e271828-@users.noreply.github.com> Co-authored-by: Chad Scharf <3904944+cscharf@users.noreply.github.com> Co-authored-by: e271828- <e271828-@users.noreply.github.com> * ensure no path specific in duo host (#1985) Co-authored-by: Andrei <30410186+Manolachi@users.noreply.github.com> Co-authored-by: Hinton <oscar@oscarhinton.com> Co-authored-by: sneakernuts <671942+sneakernuts@users.noreply.github.com> Co-authored-by: Joseph Flinn <58369717+joseph-flinn@users.noreply.github.com> Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com> Co-authored-by: Thomas Rittson <31796059+eliykat@users.noreply.github.com> Co-authored-by: Justin Baur <136baur@gmail.com> Co-authored-by: Federico Maccaroni <fedemkr@gmail.com> Co-authored-by: Vincent Salucci <26154748+vincentsalucci@users.noreply.github.com> Co-authored-by: Jordan Cooks <notnamed@users.noreply.github.com> Co-authored-by: Kyle Spearrin <kspearrin@users.noreply.github.com> Co-authored-by: Chad Scharf <3904944+cscharf@users.noreply.github.com> Co-authored-by: e271828- <e271828-@users.noreply.github.com> * Address feedback (#1990) Co-authored-by: Justin Baur <admin@justinbaur.com> Co-authored-by: Carlos Muentes <cmuentes@bitwarden.com> Co-authored-by: Jake Fink <jfink@bitwarden.com> Co-authored-by: Justin Baur <136baur@gmail.com> Co-authored-by: Andrei <30410186+Manolachi@users.noreply.github.com> Co-authored-by: Hinton <oscar@oscarhinton.com> Co-authored-by: sneakernuts <671942+sneakernuts@users.noreply.github.com> Co-authored-by: Joseph Flinn <58369717+joseph-flinn@users.noreply.github.com> Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com> Co-authored-by: Thomas Rittson <31796059+eliykat@users.noreply.github.com> Co-authored-by: Federico Maccaroni <fedemkr@gmail.com> Co-authored-by: Vincent Salucci <26154748+vincentsalucci@users.noreply.github.com> Co-authored-by: Jordan Cooks <notnamed@users.noreply.github.com> Co-authored-by: Kyle Spearrin <kspearrin@users.noreply.github.com> Co-authored-by: Chad Scharf <3904944+cscharf@users.noreply.github.com> Co-authored-by: e271828- <e271828-@users.noreply.github.com>
809 lines
34 KiB
C#
809 lines
34 KiB
C#
using System;
|
|
using System.Collections.Generic;
|
|
using System.Data.SqlClient;
|
|
using System.IO;
|
|
using System.Linq;
|
|
using System.Threading.Tasks;
|
|
using Bit.Core.Entities;
|
|
using Bit.Core.Enums;
|
|
using Bit.Core.Models.Business;
|
|
using Bit.Core.OrganizationFeatures.OrganizationSponsorships.FamiliesForEnterprise.Interfaces;
|
|
using Bit.Core.Repositories;
|
|
using Bit.Core.Services;
|
|
using Bit.Core.Settings;
|
|
using Bit.Core.Utilities;
|
|
using Microsoft.AspNetCore.Hosting;
|
|
using Microsoft.AspNetCore.Mvc;
|
|
using Microsoft.Extensions.Hosting;
|
|
using Microsoft.Extensions.Logging;
|
|
using Microsoft.Extensions.Options;
|
|
using Stripe;
|
|
using TaxRate = Bit.Core.Entities.TaxRate;
|
|
|
|
namespace Bit.Billing.Controllers
|
|
{
|
|
[Route("stripe")]
|
|
public class StripeController : Controller
|
|
{
|
|
private const decimal PremiumPlanAppleIapPrice = 14.99M;
|
|
private const string PremiumPlanId = "premium-annually";
|
|
|
|
private readonly BillingSettings _billingSettings;
|
|
private readonly IWebHostEnvironment _hostingEnvironment;
|
|
private readonly IOrganizationService _organizationService;
|
|
private readonly IValidateSponsorshipCommand _validateSponsorshipCommand;
|
|
private readonly IOrganizationSponsorshipRenewCommand _organizationSponsorshipRenewCommand;
|
|
private readonly IOrganizationRepository _organizationRepository;
|
|
private readonly ITransactionRepository _transactionRepository;
|
|
private readonly IUserService _userService;
|
|
private readonly IAppleIapService _appleIapService;
|
|
private readonly IMailService _mailService;
|
|
private readonly ILogger<StripeController> _logger;
|
|
private readonly Braintree.BraintreeGateway _btGateway;
|
|
private readonly IReferenceEventService _referenceEventService;
|
|
private readonly ITaxRateRepository _taxRateRepository;
|
|
private readonly IUserRepository _userRepository;
|
|
|
|
public StripeController(
|
|
GlobalSettings globalSettings,
|
|
IOptions<BillingSettings> billingSettings,
|
|
IWebHostEnvironment hostingEnvironment,
|
|
IOrganizationService organizationService,
|
|
IValidateSponsorshipCommand validateSponsorshipCommand,
|
|
IOrganizationSponsorshipRenewCommand organizationSponsorshipRenewCommand,
|
|
IOrganizationRepository organizationRepository,
|
|
ITransactionRepository transactionRepository,
|
|
IUserService userService,
|
|
IAppleIapService appleIapService,
|
|
IMailService mailService,
|
|
IReferenceEventService referenceEventService,
|
|
ILogger<StripeController> logger,
|
|
ITaxRateRepository taxRateRepository,
|
|
IUserRepository userRepository)
|
|
{
|
|
_billingSettings = billingSettings?.Value;
|
|
_hostingEnvironment = hostingEnvironment;
|
|
_organizationService = organizationService;
|
|
_validateSponsorshipCommand = validateSponsorshipCommand;
|
|
_organizationSponsorshipRenewCommand = organizationSponsorshipRenewCommand;
|
|
_organizationRepository = organizationRepository;
|
|
_transactionRepository = transactionRepository;
|
|
_userService = userService;
|
|
_appleIapService = appleIapService;
|
|
_mailService = mailService;
|
|
_referenceEventService = referenceEventService;
|
|
_taxRateRepository = taxRateRepository;
|
|
_userRepository = userRepository;
|
|
_logger = logger;
|
|
_btGateway = new Braintree.BraintreeGateway
|
|
{
|
|
Environment = globalSettings.Braintree.Production ?
|
|
Braintree.Environment.PRODUCTION : Braintree.Environment.SANDBOX,
|
|
MerchantId = globalSettings.Braintree.MerchantId,
|
|
PublicKey = globalSettings.Braintree.PublicKey,
|
|
PrivateKey = globalSettings.Braintree.PrivateKey
|
|
};
|
|
}
|
|
|
|
[HttpPost("webhook")]
|
|
public async Task<IActionResult> PostWebhook([FromQuery] string key)
|
|
{
|
|
if (!CoreHelpers.FixedTimeEquals(key, _billingSettings.StripeWebhookKey))
|
|
{
|
|
return new BadRequestResult();
|
|
}
|
|
|
|
Stripe.Event parsedEvent;
|
|
using (var sr = new StreamReader(HttpContext.Request.Body))
|
|
{
|
|
var json = await sr.ReadToEndAsync();
|
|
parsedEvent = EventUtility.ConstructEvent(json, Request.Headers["Stripe-Signature"],
|
|
_billingSettings.StripeWebhookSecret);
|
|
}
|
|
|
|
if (string.IsNullOrWhiteSpace(parsedEvent?.Id))
|
|
{
|
|
_logger.LogWarning("No event id.");
|
|
return new BadRequestResult();
|
|
}
|
|
|
|
if (_hostingEnvironment.IsProduction() && !parsedEvent.Livemode)
|
|
{
|
|
_logger.LogWarning("Getting test events in production.");
|
|
return new BadRequestResult();
|
|
}
|
|
|
|
var subDeleted = parsedEvent.Type.Equals("customer.subscription.deleted");
|
|
var subUpdated = parsedEvent.Type.Equals("customer.subscription.updated");
|
|
|
|
if (subDeleted || subUpdated)
|
|
{
|
|
var subscription = await GetSubscriptionAsync(parsedEvent, true);
|
|
var ids = GetIdsFromMetaData(subscription.Metadata);
|
|
|
|
var subCanceled = subDeleted && subscription.Status == "canceled";
|
|
var subUnpaid = subUpdated && subscription.Status == "unpaid";
|
|
var subIncompleteExpired = subUpdated && subscription.Status == "incomplete_expired";
|
|
|
|
if (subCanceled || subUnpaid || subIncompleteExpired)
|
|
{
|
|
// org
|
|
if (ids.Item1.HasValue)
|
|
{
|
|
await _organizationService.DisableAsync(ids.Item1.Value, subscription.CurrentPeriodEnd);
|
|
}
|
|
// user
|
|
else if (ids.Item2.HasValue)
|
|
{
|
|
await _userService.DisablePremiumAsync(ids.Item2.Value, subscription.CurrentPeriodEnd);
|
|
}
|
|
}
|
|
|
|
if (subUpdated)
|
|
{
|
|
// org
|
|
if (ids.Item1.HasValue)
|
|
{
|
|
await _organizationService.UpdateExpirationDateAsync(ids.Item1.Value,
|
|
subscription.CurrentPeriodEnd);
|
|
if (IsSponsoredSubscription(subscription))
|
|
{
|
|
await _organizationSponsorshipRenewCommand.UpdateExpirationDateAsync(ids.Item1.Value, subscription.CurrentPeriodEnd);
|
|
}
|
|
}
|
|
// user
|
|
else if (ids.Item2.HasValue)
|
|
{
|
|
await _userService.UpdatePremiumExpirationAsync(ids.Item2.Value,
|
|
subscription.CurrentPeriodEnd);
|
|
}
|
|
}
|
|
}
|
|
else if (parsedEvent.Type.Equals("invoice.upcoming"))
|
|
{
|
|
var invoice = await GetInvoiceAsync(parsedEvent);
|
|
var subscriptionService = new SubscriptionService();
|
|
var subscription = await subscriptionService.GetAsync(invoice.SubscriptionId);
|
|
if (subscription == null)
|
|
{
|
|
throw new Exception("Invoice subscription is null. " + invoice.Id);
|
|
}
|
|
|
|
subscription = await VerifyCorrectTaxRateForCharge(invoice, subscription);
|
|
|
|
string email = null;
|
|
var ids = GetIdsFromMetaData(subscription.Metadata);
|
|
// org
|
|
if (ids.Item1.HasValue)
|
|
{
|
|
// sponsored org
|
|
if (IsSponsoredSubscription(subscription))
|
|
{
|
|
await _validateSponsorshipCommand.ValidateSponsorshipAsync(ids.Item1.Value);
|
|
}
|
|
|
|
var org = await _organizationRepository.GetByIdAsync(ids.Item1.Value);
|
|
if (org != null && OrgPlanForInvoiceNotifications(org))
|
|
{
|
|
email = org.BillingEmail;
|
|
}
|
|
}
|
|
// user
|
|
else if (ids.Item2.HasValue)
|
|
{
|
|
var user = await _userService.GetUserByIdAsync(ids.Item2.Value);
|
|
if (user.Premium)
|
|
{
|
|
email = user.Email;
|
|
}
|
|
}
|
|
|
|
if (!string.IsNullOrWhiteSpace(email) && invoice.NextPaymentAttempt.HasValue)
|
|
{
|
|
var items = invoice.Lines.Select(i => i.Description).ToList();
|
|
await _mailService.SendInvoiceUpcomingAsync(email, invoice.AmountDue / 100M,
|
|
invoice.NextPaymentAttempt.Value, items, true);
|
|
}
|
|
}
|
|
else if (parsedEvent.Type.Equals("charge.succeeded"))
|
|
{
|
|
var charge = await GetChargeAsync(parsedEvent);
|
|
var chargeTransaction = await _transactionRepository.GetByGatewayIdAsync(
|
|
GatewayType.Stripe, charge.Id);
|
|
if (chargeTransaction != null)
|
|
{
|
|
_logger.LogWarning("Charge success already processed. " + charge.Id);
|
|
return new OkResult();
|
|
}
|
|
|
|
Tuple<Guid?, Guid?> ids = null;
|
|
Subscription subscription = null;
|
|
var subscriptionService = new SubscriptionService();
|
|
|
|
if (charge.InvoiceId != null)
|
|
{
|
|
var invoiceService = new InvoiceService();
|
|
var invoice = await invoiceService.GetAsync(charge.InvoiceId);
|
|
if (invoice?.SubscriptionId != null)
|
|
{
|
|
subscription = await subscriptionService.GetAsync(invoice.SubscriptionId);
|
|
ids = GetIdsFromMetaData(subscription?.Metadata);
|
|
}
|
|
}
|
|
|
|
if (subscription == null || ids == null || (ids.Item1.HasValue && ids.Item2.HasValue))
|
|
{
|
|
var subscriptions = await subscriptionService.ListAsync(new SubscriptionListOptions
|
|
{
|
|
Customer = charge.CustomerId
|
|
});
|
|
foreach (var sub in subscriptions)
|
|
{
|
|
if (sub.Status != "canceled" && sub.Status != "incomplete_expired")
|
|
{
|
|
ids = GetIdsFromMetaData(sub.Metadata);
|
|
if (ids.Item1.HasValue || ids.Item2.HasValue)
|
|
{
|
|
subscription = sub;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if (!ids.Item1.HasValue && !ids.Item2.HasValue)
|
|
{
|
|
_logger.LogWarning("Charge success has no subscriber ids. " + charge.Id);
|
|
return new BadRequestResult();
|
|
}
|
|
|
|
var tx = new Transaction
|
|
{
|
|
Amount = charge.Amount / 100M,
|
|
CreationDate = charge.Created,
|
|
OrganizationId = ids.Item1,
|
|
UserId = ids.Item2,
|
|
Type = TransactionType.Charge,
|
|
Gateway = GatewayType.Stripe,
|
|
GatewayId = charge.Id
|
|
};
|
|
|
|
if (charge.Source != null && charge.Source is Card card)
|
|
{
|
|
tx.PaymentMethodType = PaymentMethodType.Card;
|
|
tx.Details = $"{card.Brand}, *{card.Last4}";
|
|
}
|
|
else if (charge.Source != null && charge.Source is BankAccount bankAccount)
|
|
{
|
|
tx.PaymentMethodType = PaymentMethodType.BankAccount;
|
|
tx.Details = $"{bankAccount.BankName}, *{bankAccount.Last4}";
|
|
}
|
|
else if (charge.Source != null && charge.Source is Source source)
|
|
{
|
|
if (source.Card != null)
|
|
{
|
|
tx.PaymentMethodType = PaymentMethodType.Card;
|
|
tx.Details = $"{source.Card.Brand}, *{source.Card.Last4}";
|
|
}
|
|
else if (source.AchDebit != null)
|
|
{
|
|
tx.PaymentMethodType = PaymentMethodType.BankAccount;
|
|
tx.Details = $"{source.AchDebit.BankName}, *{source.AchDebit.Last4}";
|
|
}
|
|
else if (source.AchCreditTransfer != null)
|
|
{
|
|
tx.PaymentMethodType = PaymentMethodType.BankAccount;
|
|
tx.Details = $"ACH => {source.AchCreditTransfer.BankName}, " +
|
|
$"{source.AchCreditTransfer.AccountNumber}";
|
|
}
|
|
}
|
|
else if (charge.PaymentMethodDetails != null)
|
|
{
|
|
if (charge.PaymentMethodDetails.Card != null)
|
|
{
|
|
tx.PaymentMethodType = PaymentMethodType.Card;
|
|
tx.Details = $"{charge.PaymentMethodDetails.Card.Brand?.ToUpperInvariant()}, " +
|
|
$"*{charge.PaymentMethodDetails.Card.Last4}";
|
|
}
|
|
else if (charge.PaymentMethodDetails.AchDebit != null)
|
|
{
|
|
tx.PaymentMethodType = PaymentMethodType.BankAccount;
|
|
tx.Details = $"{charge.PaymentMethodDetails.AchDebit.BankName}, " +
|
|
$"*{charge.PaymentMethodDetails.AchDebit.Last4}";
|
|
}
|
|
else if (charge.PaymentMethodDetails.AchCreditTransfer != null)
|
|
{
|
|
tx.PaymentMethodType = PaymentMethodType.BankAccount;
|
|
tx.Details = $"ACH => {charge.PaymentMethodDetails.AchCreditTransfer.BankName}, " +
|
|
$"{charge.PaymentMethodDetails.AchCreditTransfer.AccountNumber}";
|
|
}
|
|
}
|
|
|
|
if (!tx.PaymentMethodType.HasValue)
|
|
{
|
|
_logger.LogWarning("Charge success from unsupported source/method. " + charge.Id);
|
|
return new OkResult();
|
|
}
|
|
|
|
try
|
|
{
|
|
await _transactionRepository.CreateAsync(tx);
|
|
}
|
|
// Catch foreign key violations because user/org could have been deleted.
|
|
catch (SqlException e) when (e.Number == 547) { }
|
|
}
|
|
else if (parsedEvent.Type.Equals("charge.refunded"))
|
|
{
|
|
var charge = await GetChargeAsync(parsedEvent);
|
|
var chargeTransaction = await _transactionRepository.GetByGatewayIdAsync(
|
|
GatewayType.Stripe, charge.Id);
|
|
if (chargeTransaction == null)
|
|
{
|
|
throw new Exception("Cannot find refunded charge. " + charge.Id);
|
|
}
|
|
|
|
var amountRefunded = charge.AmountRefunded / 100M;
|
|
|
|
if (!chargeTransaction.Refunded.GetValueOrDefault() &&
|
|
chargeTransaction.RefundedAmount.GetValueOrDefault() < amountRefunded)
|
|
{
|
|
chargeTransaction.RefundedAmount = amountRefunded;
|
|
if (charge.Refunded)
|
|
{
|
|
chargeTransaction.Refunded = true;
|
|
}
|
|
await _transactionRepository.ReplaceAsync(chargeTransaction);
|
|
|
|
foreach (var refund in charge.Refunds)
|
|
{
|
|
var refundTransaction = await _transactionRepository.GetByGatewayIdAsync(
|
|
GatewayType.Stripe, refund.Id);
|
|
if (refundTransaction != null)
|
|
{
|
|
continue;
|
|
}
|
|
|
|
await _transactionRepository.CreateAsync(new Transaction
|
|
{
|
|
Amount = refund.Amount / 100M,
|
|
CreationDate = refund.Created,
|
|
OrganizationId = chargeTransaction.OrganizationId,
|
|
UserId = chargeTransaction.UserId,
|
|
Type = TransactionType.Refund,
|
|
Gateway = GatewayType.Stripe,
|
|
GatewayId = refund.Id,
|
|
PaymentMethodType = chargeTransaction.PaymentMethodType,
|
|
Details = chargeTransaction.Details
|
|
});
|
|
}
|
|
}
|
|
else
|
|
{
|
|
_logger.LogWarning("Charge refund amount doesn't seem correct. " + charge.Id);
|
|
}
|
|
}
|
|
else if (parsedEvent.Type.Equals("invoice.payment_succeeded"))
|
|
{
|
|
var invoice = await GetInvoiceAsync(parsedEvent, true);
|
|
if (invoice.Paid && invoice.BillingReason == "subscription_create")
|
|
{
|
|
var subscriptionService = new SubscriptionService();
|
|
var subscription = await subscriptionService.GetAsync(invoice.SubscriptionId);
|
|
if (subscription?.Status == "active")
|
|
{
|
|
if (DateTime.UtcNow - invoice.Created < TimeSpan.FromMinutes(1))
|
|
{
|
|
await Task.Delay(5000);
|
|
}
|
|
|
|
var ids = GetIdsFromMetaData(subscription.Metadata);
|
|
// org
|
|
if (ids.Item1.HasValue)
|
|
{
|
|
if (subscription.Items.Any(i => StaticStore.Plans.Any(p => p.StripePlanId == i.Plan.Id)))
|
|
{
|
|
await _organizationService.EnableAsync(ids.Item1.Value, subscription.CurrentPeriodEnd);
|
|
|
|
var organization = await _organizationRepository.GetByIdAsync(ids.Item1.Value);
|
|
await _referenceEventService.RaiseEventAsync(
|
|
new ReferenceEvent(ReferenceEventType.Rebilled, organization)
|
|
{
|
|
PlanName = organization?.Plan,
|
|
PlanType = organization?.PlanType,
|
|
Seats = organization?.Seats,
|
|
Storage = organization?.MaxStorageGb,
|
|
});
|
|
}
|
|
}
|
|
// user
|
|
else if (ids.Item2.HasValue)
|
|
{
|
|
if (subscription.Items.Any(i => i.Plan.Id == PremiumPlanId))
|
|
{
|
|
await _userService.EnablePremiumAsync(ids.Item2.Value, subscription.CurrentPeriodEnd);
|
|
|
|
var user = await _userRepository.GetByIdAsync(ids.Item2.Value);
|
|
await _referenceEventService.RaiseEventAsync(
|
|
new ReferenceEvent(ReferenceEventType.Rebilled, user)
|
|
{
|
|
PlanName = PremiumPlanId,
|
|
Storage = user?.MaxStorageGb,
|
|
});
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
else if (parsedEvent.Type.Equals("invoice.payment_failed"))
|
|
{
|
|
var invoice = await GetInvoiceAsync(parsedEvent, true);
|
|
if (!invoice.Paid && invoice.AttemptCount > 1 && UnpaidAutoChargeInvoiceForSubscriptionCycle(invoice))
|
|
{
|
|
await AttemptToPayInvoiceAsync(invoice);
|
|
}
|
|
}
|
|
else if (parsedEvent.Type.Equals("invoice.created"))
|
|
{
|
|
var invoice = await GetInvoiceAsync(parsedEvent, true);
|
|
if (!invoice.Paid && UnpaidAutoChargeInvoiceForSubscriptionCycle(invoice))
|
|
{
|
|
await AttemptToPayInvoiceAsync(invoice);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
_logger.LogWarning("Unsupported event received. " + parsedEvent.Type);
|
|
}
|
|
|
|
return new OkResult();
|
|
}
|
|
|
|
private Tuple<Guid?, Guid?> GetIdsFromMetaData(IDictionary<string, string> metaData)
|
|
{
|
|
if (metaData == null || !metaData.Any())
|
|
{
|
|
return new Tuple<Guid?, Guid?>(null, null);
|
|
}
|
|
|
|
Guid? orgId = null;
|
|
Guid? userId = null;
|
|
|
|
if (metaData.ContainsKey("organizationId"))
|
|
{
|
|
orgId = new Guid(metaData["organizationId"]);
|
|
}
|
|
else if (metaData.ContainsKey("userId"))
|
|
{
|
|
userId = new Guid(metaData["userId"]);
|
|
}
|
|
|
|
if (userId == null && orgId == null)
|
|
{
|
|
var orgIdKey = metaData.Keys.FirstOrDefault(k => k.ToLowerInvariant() == "organizationid");
|
|
if (!string.IsNullOrWhiteSpace(orgIdKey))
|
|
{
|
|
orgId = new Guid(metaData[orgIdKey]);
|
|
}
|
|
else
|
|
{
|
|
var userIdKey = metaData.Keys.FirstOrDefault(k => k.ToLowerInvariant() == "userid");
|
|
if (!string.IsNullOrWhiteSpace(userIdKey))
|
|
{
|
|
userId = new Guid(metaData[userIdKey]);
|
|
}
|
|
}
|
|
}
|
|
|
|
return new Tuple<Guid?, Guid?>(orgId, userId);
|
|
}
|
|
|
|
private bool OrgPlanForInvoiceNotifications(Organization org)
|
|
{
|
|
switch (org.PlanType)
|
|
{
|
|
case PlanType.FamiliesAnnually:
|
|
case PlanType.TeamsAnnually:
|
|
case PlanType.EnterpriseAnnually:
|
|
return true;
|
|
default:
|
|
return false;
|
|
}
|
|
}
|
|
|
|
private async Task<bool> AttemptToPayInvoiceAsync(Invoice invoice)
|
|
{
|
|
var customerService = new CustomerService();
|
|
var customer = await customerService.GetAsync(invoice.CustomerId);
|
|
if (customer?.Metadata?.ContainsKey("appleReceipt") ?? false)
|
|
{
|
|
return await AttemptToPayInvoiceWithAppleReceiptAsync(invoice, customer);
|
|
}
|
|
else if (customer?.Metadata?.ContainsKey("btCustomerId") ?? false)
|
|
{
|
|
return await AttemptToPayInvoiceWithBraintreeAsync(invoice, customer);
|
|
}
|
|
return false;
|
|
}
|
|
|
|
private async Task<bool> AttemptToPayInvoiceWithAppleReceiptAsync(Invoice invoice, Customer customer)
|
|
{
|
|
if (!customer?.Metadata?.ContainsKey("appleReceipt") ?? true)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
var originalAppleReceiptTransactionId = customer.Metadata["appleReceipt"];
|
|
var appleReceiptRecord = await _appleIapService.GetReceiptAsync(originalAppleReceiptTransactionId);
|
|
if (string.IsNullOrWhiteSpace(appleReceiptRecord?.Item1) || !appleReceiptRecord.Item2.HasValue)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
var subscriptionService = new SubscriptionService();
|
|
var subscription = await subscriptionService.GetAsync(invoice.SubscriptionId);
|
|
var ids = GetIdsFromMetaData(subscription?.Metadata);
|
|
if (!ids.Item2.HasValue)
|
|
{
|
|
// Apple receipt is only for user subscriptions
|
|
return false;
|
|
}
|
|
|
|
if (appleReceiptRecord.Item2.Value != ids.Item2.Value)
|
|
{
|
|
_logger.LogError("User Ids for Apple Receipt and subscription do not match: {0} != {1}.",
|
|
appleReceiptRecord.Item2.Value, ids.Item2.Value);
|
|
return false;
|
|
}
|
|
|
|
var appleReceiptStatus = await _appleIapService.GetVerifiedReceiptStatusAsync(appleReceiptRecord.Item1);
|
|
if (appleReceiptStatus == null)
|
|
{
|
|
// TODO: cancel sub if receipt is cancelled?
|
|
return false;
|
|
}
|
|
|
|
var receiptExpiration = appleReceiptStatus.GetLastExpiresDate().GetValueOrDefault(DateTime.MinValue);
|
|
var invoiceDue = invoice.DueDate.GetValueOrDefault(DateTime.MinValue);
|
|
if (receiptExpiration <= invoiceDue)
|
|
{
|
|
_logger.LogWarning("Apple receipt expiration is before invoice due date. {0} <= {1}",
|
|
receiptExpiration, invoiceDue);
|
|
return false;
|
|
}
|
|
|
|
var receiptLastTransactionId = appleReceiptStatus.GetLastTransactionId();
|
|
var existingTransaction = await _transactionRepository.GetByGatewayIdAsync(
|
|
GatewayType.AppStore, receiptLastTransactionId);
|
|
if (existingTransaction != null)
|
|
{
|
|
_logger.LogWarning("There is already an existing transaction for this Apple receipt.",
|
|
receiptLastTransactionId);
|
|
return false;
|
|
}
|
|
|
|
var appleTransaction = appleReceiptStatus.BuildTransactionFromLastTransaction(
|
|
PremiumPlanAppleIapPrice, ids.Item2.Value);
|
|
appleTransaction.Type = TransactionType.Charge;
|
|
|
|
var invoiceService = new InvoiceService();
|
|
try
|
|
{
|
|
await invoiceService.UpdateAsync(invoice.Id, new InvoiceUpdateOptions
|
|
{
|
|
Metadata = new Dictionary<string, string>
|
|
{
|
|
["appleReceipt"] = appleReceiptStatus.GetOriginalTransactionId(),
|
|
["appleReceiptTransactionId"] = receiptLastTransactionId
|
|
}
|
|
});
|
|
|
|
await _transactionRepository.CreateAsync(appleTransaction);
|
|
await invoiceService.PayAsync(invoice.Id, new InvoicePayOptions { PaidOutOfBand = true });
|
|
}
|
|
catch (Exception e)
|
|
{
|
|
if (e.Message.Contains("Invoice is already paid"))
|
|
{
|
|
await invoiceService.UpdateAsync(invoice.Id, new InvoiceUpdateOptions
|
|
{
|
|
Metadata = invoice.Metadata
|
|
});
|
|
}
|
|
else
|
|
{
|
|
throw;
|
|
}
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
private async Task<bool> AttemptToPayInvoiceWithBraintreeAsync(Invoice invoice, Customer customer)
|
|
{
|
|
if (!customer?.Metadata?.ContainsKey("btCustomerId") ?? true)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
var subscriptionService = new SubscriptionService();
|
|
var subscription = await subscriptionService.GetAsync(invoice.SubscriptionId);
|
|
var ids = GetIdsFromMetaData(subscription?.Metadata);
|
|
if (!ids.Item1.HasValue && !ids.Item2.HasValue)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
var orgTransaction = ids.Item1.HasValue;
|
|
var btObjIdField = orgTransaction ? "organization_id" : "user_id";
|
|
var btObjId = ids.Item1 ?? ids.Item2.Value;
|
|
var btInvoiceAmount = (invoice.AmountDue / 100M);
|
|
|
|
var existingTransactions = orgTransaction ?
|
|
await _transactionRepository.GetManyByOrganizationIdAsync(ids.Item1.Value) :
|
|
await _transactionRepository.GetManyByUserIdAsync(ids.Item2.Value);
|
|
var duplicateTimeSpan = TimeSpan.FromHours(24);
|
|
var now = DateTime.UtcNow;
|
|
var duplicateTransaction = existingTransactions?
|
|
.FirstOrDefault(t => (now - t.CreationDate) < duplicateTimeSpan);
|
|
if (duplicateTransaction != null)
|
|
{
|
|
_logger.LogWarning("There is already a recent PayPal transaction ({0}). " +
|
|
"Do not charge again to prevent possible duplicate.", duplicateTransaction.GatewayId);
|
|
return false;
|
|
}
|
|
|
|
var transactionResult = await _btGateway.Transaction.SaleAsync(
|
|
new Braintree.TransactionRequest
|
|
{
|
|
Amount = btInvoiceAmount,
|
|
CustomerId = customer.Metadata["btCustomerId"],
|
|
Options = new Braintree.TransactionOptionsRequest
|
|
{
|
|
SubmitForSettlement = true,
|
|
PayPal = new Braintree.TransactionOptionsPayPalRequest
|
|
{
|
|
CustomField = $"{btObjIdField}:{btObjId}"
|
|
}
|
|
},
|
|
CustomFields = new Dictionary<string, string>
|
|
{
|
|
[btObjIdField] = btObjId.ToString()
|
|
}
|
|
});
|
|
|
|
if (!transactionResult.IsSuccess())
|
|
{
|
|
if (invoice.AttemptCount < 4)
|
|
{
|
|
await _mailService.SendPaymentFailedAsync(customer.Email, btInvoiceAmount, true);
|
|
}
|
|
return false;
|
|
}
|
|
|
|
var invoiceService = new InvoiceService();
|
|
try
|
|
{
|
|
await invoiceService.UpdateAsync(invoice.Id, new InvoiceUpdateOptions
|
|
{
|
|
Metadata = new Dictionary<string, string>
|
|
{
|
|
["btTransactionId"] = transactionResult.Target.Id,
|
|
["btPayPalTransactionId"] =
|
|
transactionResult.Target.PayPalDetails?.AuthorizationId
|
|
}
|
|
});
|
|
await invoiceService.PayAsync(invoice.Id, new InvoicePayOptions { PaidOutOfBand = true });
|
|
}
|
|
catch (Exception e)
|
|
{
|
|
await _btGateway.Transaction.RefundAsync(transactionResult.Target.Id);
|
|
if (e.Message.Contains("Invoice is already paid"))
|
|
{
|
|
await invoiceService.UpdateAsync(invoice.Id, new InvoiceUpdateOptions
|
|
{
|
|
Metadata = invoice.Metadata
|
|
});
|
|
}
|
|
else
|
|
{
|
|
throw;
|
|
}
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
private bool UnpaidAutoChargeInvoiceForSubscriptionCycle(Invoice invoice)
|
|
{
|
|
return invoice.AmountDue > 0 && !invoice.Paid && invoice.CollectionMethod == "charge_automatically" &&
|
|
invoice.BillingReason == "subscription_cycle" && invoice.SubscriptionId != null;
|
|
}
|
|
|
|
private async Task<Charge> GetChargeAsync(Stripe.Event parsedEvent, bool fresh = false)
|
|
{
|
|
if (!(parsedEvent.Data.Object is Charge eventCharge))
|
|
{
|
|
throw new Exception("Charge is null (from parsed event). " + parsedEvent.Id);
|
|
}
|
|
if (!fresh)
|
|
{
|
|
return eventCharge;
|
|
}
|
|
var chargeService = new ChargeService();
|
|
var charge = await chargeService.GetAsync(eventCharge.Id);
|
|
if (charge == null)
|
|
{
|
|
throw new Exception("Charge is null. " + eventCharge.Id);
|
|
}
|
|
return charge;
|
|
}
|
|
|
|
private async Task<Invoice> GetInvoiceAsync(Stripe.Event parsedEvent, bool fresh = false)
|
|
{
|
|
if (!(parsedEvent.Data.Object is Invoice eventInvoice))
|
|
{
|
|
throw new Exception("Invoice is null (from parsed event). " + parsedEvent.Id);
|
|
}
|
|
if (!fresh)
|
|
{
|
|
return eventInvoice;
|
|
}
|
|
var invoiceService = new InvoiceService();
|
|
var invoice = await invoiceService.GetAsync(eventInvoice.Id);
|
|
if (invoice == null)
|
|
{
|
|
throw new Exception("Invoice is null. " + eventInvoice.Id);
|
|
}
|
|
return invoice;
|
|
}
|
|
|
|
private async Task<Subscription> GetSubscriptionAsync(Stripe.Event parsedEvent, bool fresh = false)
|
|
{
|
|
if (!(parsedEvent.Data.Object is Subscription eventSubscription))
|
|
{
|
|
throw new Exception("Subscription is null (from parsed event). " + parsedEvent.Id);
|
|
}
|
|
if (!fresh)
|
|
{
|
|
return eventSubscription;
|
|
}
|
|
var subscriptionService = new SubscriptionService();
|
|
var subscription = await subscriptionService.GetAsync(eventSubscription.Id);
|
|
if (subscription == null)
|
|
{
|
|
throw new Exception("Subscription is null. " + eventSubscription.Id);
|
|
}
|
|
return subscription;
|
|
}
|
|
|
|
private async Task<Subscription> VerifyCorrectTaxRateForCharge(Invoice invoice, Subscription subscription)
|
|
{
|
|
if (!string.IsNullOrWhiteSpace(invoice?.CustomerAddress?.Country) && !string.IsNullOrWhiteSpace(invoice?.CustomerAddress?.PostalCode))
|
|
{
|
|
var localBitwardenTaxRates = await _taxRateRepository.GetByLocationAsync(
|
|
new TaxRate()
|
|
{
|
|
Country = invoice.CustomerAddress.Country,
|
|
PostalCode = invoice.CustomerAddress.PostalCode
|
|
}
|
|
);
|
|
|
|
if (localBitwardenTaxRates.Any())
|
|
{
|
|
var stripeTaxRate = await new TaxRateService().GetAsync(localBitwardenTaxRates.First().Id);
|
|
if (stripeTaxRate != null && !subscription.DefaultTaxRates.Any(x => x == stripeTaxRate))
|
|
{
|
|
subscription.DefaultTaxRates = new List<Stripe.TaxRate> { stripeTaxRate };
|
|
var subscriptionOptions = new SubscriptionUpdateOptions() { DefaultTaxRates = new List<string>() { stripeTaxRate.Id } };
|
|
subscription = await new SubscriptionService().UpdateAsync(subscription.Id, subscriptionOptions);
|
|
}
|
|
}
|
|
}
|
|
return subscription;
|
|
}
|
|
|
|
private static bool IsSponsoredSubscription(Subscription subscription) =>
|
|
StaticStore.SponsoredPlans.Any(p => p.StripePlanId == subscription.Id);
|
|
}
|
|
}
|