diff options
Diffstat (limited to 'addons/payment_authorize/models/payment.py')
| -rw-r--r-- | addons/payment_authorize/models/payment.py | 335 |
1 files changed, 335 insertions, 0 deletions
diff --git a/addons/payment_authorize/models/payment.py b/addons/payment_authorize/models/payment.py new file mode 100644 index 00000000..c4146253 --- /dev/null +++ b/addons/payment_authorize/models/payment.py @@ -0,0 +1,335 @@ +# coding: utf-8 +from werkzeug import urls + +from .authorize_request import AuthorizeAPI +import hashlib +import hmac +import logging +import time + +from odoo import _, api, fields, models +from odoo.addons.payment.models.payment_acquirer import ValidationError +from odoo.addons.payment_authorize.controllers.main import AuthorizeController +from odoo.tools.float_utils import float_compare, float_repr +from odoo.exceptions import UserError + +_logger = logging.getLogger(__name__) + + +class PaymentAcquirerAuthorize(models.Model): + _inherit = 'payment.acquirer' + + provider = fields.Selection(selection_add=[ + ('authorize', 'Authorize.Net') + ], ondelete={'authorize': 'set default'}) + authorize_login = fields.Char(string='API Login Id', required_if_provider='authorize', groups='base.group_user') + authorize_transaction_key = fields.Char(string='API Transaction Key', required_if_provider='authorize', groups='base.group_user') + authorize_signature_key = fields.Char(string='API Signature Key', required_if_provider='authorize', groups='base.group_user') + authorize_client_key = fields.Char(string='API Client Key', groups='base.group_user') + + @api.onchange('provider', 'check_validity') + def onchange_check_validity(self): + if self.provider == 'authorize' and self.check_validity: + self.check_validity = False + return {'warning': { + 'title': _("Warning"), + 'message': ('This option is not supported for Authorize.net')}} + + def action_client_secret(self): + api = AuthorizeAPI(self) + if not api.test_authenticate(): + raise UserError(_('Unable to fetch Client Key, make sure the API Login and Transaction Key are correct.')) + self.authorize_client_key = api.get_client_secret() + return True + + def _get_feature_support(self): + """Get advanced feature support by provider. + + Each provider should add its technical in the corresponding + key for the following features: + * fees: support payment fees computations + * authorize: support authorizing payment (separates + authorization and capture) + * tokenize: support saving payment data in a payment.tokenize + object + """ + res = super(PaymentAcquirerAuthorize, self)._get_feature_support() + res['authorize'].append('authorize') + res['tokenize'].append('authorize') + return res + + def _get_authorize_urls(self, environment): + """ Authorize URLs """ + if environment == 'prod': + return {'authorize_form_url': 'https://secure2.authorize.net/gateway/transact.dll'} + else: + return {'authorize_form_url': 'https://test.authorize.net/gateway/transact.dll'} + + def _authorize_generate_hashing(self, values): + data = '^'.join([ + values['x_login'], + values['x_fp_sequence'], + values['x_fp_timestamp'], + values['x_amount'], + values['x_currency_code']]).encode('utf-8') + + return hmac.new(bytes.fromhex(self.authorize_signature_key), data, hashlib.sha512).hexdigest().upper() + + def authorize_form_generate_values(self, values): + self.ensure_one() + # State code is only supported in US, use state name by default + # See https://developer.authorize.net/api/reference/ + state = values['partner_state'].name if values.get('partner_state') else '' + if values.get('partner_country') and values.get('partner_country') == self.env.ref('base.us', False): + state = values['partner_state'].code if values.get('partner_state') else '' + billing_state = values['billing_partner_state'].name if values.get('billing_partner_state') else '' + if values.get('billing_partner_country') and values.get('billing_partner_country') == self.env.ref('base.us', False): + billing_state = values['billing_partner_state'].code if values.get('billing_partner_state') else '' + + base_url = self.get_base_url() + authorize_tx_values = dict(values) + temp_authorize_tx_values = { + 'x_login': self.authorize_login, + 'x_amount': float_repr(values['amount'], values['currency'].decimal_places if values['currency'] else 2), + 'x_show_form': 'PAYMENT_FORM', + 'x_type': 'AUTH_CAPTURE' if not self.capture_manually else 'AUTH_ONLY', + 'x_method': 'CC', + 'x_fp_sequence': '%s%s' % (self.id, int(time.time())), + 'x_version': '3.1', + 'x_relay_response': 'TRUE', + 'x_fp_timestamp': str(int(time.time())), + 'x_relay_url': urls.url_join(base_url, AuthorizeController._return_url), + 'x_cancel_url': urls.url_join(base_url, AuthorizeController._cancel_url), + 'x_currency_code': values['currency'] and values['currency'].name or '', + 'address': values.get('partner_address'), + 'city': values.get('partner_city'), + 'country': values.get('partner_country') and values.get('partner_country').name or '', + 'email': values.get('partner_email'), + 'zip_code': values.get('partner_zip'), + 'first_name': values.get('partner_first_name'), + 'last_name': values.get('partner_last_name'), + 'phone': values.get('partner_phone'), + 'state': state, + 'billing_address': values.get('billing_partner_address'), + 'billing_city': values.get('billing_partner_city'), + 'billing_country': values.get('billing_partner_country') and values.get('billing_partner_country').name or '', + 'billing_email': values.get('billing_partner_email'), + 'billing_zip_code': values.get('billing_partner_zip'), + 'billing_first_name': values.get('billing_partner_first_name'), + 'billing_last_name': values.get('billing_partner_last_name'), + 'billing_phone': values.get('billing_partner_phone'), + 'billing_state': billing_state, + } + temp_authorize_tx_values['returndata'] = authorize_tx_values.pop('return_url', '') + temp_authorize_tx_values['x_fp_hash'] = self._authorize_generate_hashing(temp_authorize_tx_values) + authorize_tx_values.update(temp_authorize_tx_values) + return authorize_tx_values + + def authorize_get_form_action_url(self): + self.ensure_one() + environment = 'prod' if self.state == 'enabled' else 'test' + return self._get_authorize_urls(environment)['authorize_form_url'] + + @api.model + def authorize_s2s_form_process(self, data): + values = { + 'opaqueData': data.get('opaqueData'), + 'encryptedCardData': data.get('encryptedCardData'), + 'acquirer_id': int(data.get('acquirer_id')), + 'partner_id': int(data.get('partner_id')) + } + PaymentMethod = self.env['payment.token'].sudo().create(values) + return PaymentMethod + + def authorize_s2s_form_validate(self, data): + error = dict() + mandatory_fields = ["opaqueData", "encryptedCardData"] + # Validation + for field_name in mandatory_fields: + if not data.get(field_name): + error[field_name] = 'missing' + return False if error else True + + def authorize_test_credentials(self): + self.ensure_one() + transaction = AuthorizeAPI(self.acquirer_id) + return transaction.test_authenticate() + +class TxAuthorize(models.Model): + _inherit = 'payment.transaction' + + _authorize_valid_tx_status = 1 + _authorize_pending_tx_status = 4 + _authorize_cancel_tx_status = 2 + _authorize_error_tx_status = 3 + + # -------------------------------------------------- + # FORM RELATED METHODS + # -------------------------------------------------- + + @api.model + def _authorize_form_get_tx_from_data(self, data): + """ Given a data dict coming from authorize, verify it and find the related + transaction record. """ + reference, description, trans_id, fingerprint = data.get('x_invoice_num'), data.get('x_description'), data.get('x_trans_id'), data.get('x_SHA2_Hash') or data.get('x_MD5_Hash') + if not reference or not trans_id or not fingerprint: + error_msg = _('Authorize: received data with missing reference (%s) or trans_id (%s) or fingerprint (%s)') % (reference, trans_id, fingerprint) + _logger.info(error_msg) + raise ValidationError(error_msg) + tx = self.search(['|', ('reference', '=', reference), ('reference', '=', description)]) + if not tx or len(tx) > 1: + error_msg = 'Authorize: received data for x_invoice_num %s and x_description %s' % (reference, description) + if not tx: + error_msg += '; no order found' + else: + error_msg += '; multiple order found' + _logger.info(error_msg) + raise ValidationError(error_msg) + return tx[0] + + def _authorize_form_get_invalid_parameters(self, data): + invalid_parameters = [] + + if self.acquirer_reference and data.get('x_trans_id') != self.acquirer_reference: + invalid_parameters.append(('Transaction Id', data.get('x_trans_id'), self.acquirer_reference)) + # check what is buyed + if float_compare(float(data.get('x_amount', '0.0')), self.amount, 2) != 0: + invalid_parameters.append(('Amount', data.get('x_amount'), '%.2f' % self.amount)) + return invalid_parameters + + def _authorize_form_validate(self, data): + if self.state == 'done': + _logger.warning('Authorize: trying to validate an already validated tx (ref %s)' % self.reference) + return True + status_code = int(data.get('x_response_code', '0')) + if status_code == self._authorize_valid_tx_status: + if data.get('x_type').lower() in ['auth_capture', 'prior_auth_capture']: + self.write({ + 'acquirer_reference': data.get('x_trans_id'), + 'date': fields.Datetime.now(), + }) + self._set_transaction_done() + elif data.get('x_type').lower() in ['auth_only']: + self.write({'acquirer_reference': data.get('x_trans_id')}) + self._set_transaction_authorized() + if self.partner_id and not self.payment_token_id and \ + (self.type == 'form_save' or self.acquirer_id.save_token == 'always'): + transaction = AuthorizeAPI(self.acquirer_id) + res = transaction.create_customer_profile_from_tx(self.partner_id, self.acquirer_reference) + if res: + token_id = self.env['payment.token'].create({ + 'authorize_profile': res.get('profile_id'), + 'name': res.get('name'), + 'acquirer_ref': res.get('payment_profile_id'), + 'acquirer_id': self.acquirer_id.id, + 'partner_id': self.partner_id.id, + }) + self.payment_token_id = token_id + return True + elif status_code == self._authorize_pending_tx_status: + self.write({'acquirer_reference': data.get('x_trans_id')}) + self._set_transaction_pending() + return True + else: + error = data.get('x_response_reason_text') + _logger.info(error) + self.write({ + 'state_message': error, + 'acquirer_reference': data.get('x_trans_id'), + }) + self._set_transaction_cancel() + return False + + def authorize_s2s_do_transaction(self, **data): + self.ensure_one() + transaction = AuthorizeAPI(self.acquirer_id) + + if not self.payment_token_id.authorize_profile: + raise UserError(_('Invalid token found: the Authorize profile is missing.' + 'Please make sure the token has a valid acquirer reference.')) + + if not self.acquirer_id.capture_manually: + res = transaction.auth_and_capture(self.payment_token_id, round(self.amount, self.currency_id.decimal_places), self.reference) + else: + res = transaction.authorize(self.payment_token_id, round(self.amount, self.currency_id.decimal_places), self.reference) + return self._authorize_s2s_validate_tree(res) + + def authorize_s2s_capture_transaction(self): + self.ensure_one() + transaction = AuthorizeAPI(self.acquirer_id) + tree = transaction.capture(self.acquirer_reference or '', round(self.amount, self.currency_id.decimal_places)) + return self._authorize_s2s_validate_tree(tree) + + def authorize_s2s_void_transaction(self): + self.ensure_one() + transaction = AuthorizeAPI(self.acquirer_id) + tree = transaction.void(self.acquirer_reference or '') + return self._authorize_s2s_validate_tree(tree) + + def _authorize_s2s_validate_tree(self, tree): + return self._authorize_s2s_validate(tree) + + def _authorize_s2s_validate(self, tree): + if self.state == 'done': + _logger.warning('Authorize: trying to validate an already validated tx (ref %s)' % self.reference) + return True + status_code = int(tree.get('x_response_code', '0')) + if status_code == self._authorize_valid_tx_status: + if tree.get('x_type').lower() in ['auth_capture', 'prior_auth_capture']: + init_state = self.state + self.write({ + 'acquirer_reference': tree.get('x_trans_id'), + 'date': fields.Datetime.now(), + }) + + self._set_transaction_done() + + if init_state != 'authorized': + self.execute_callback() + if tree.get('x_type').lower() == 'auth_only': + self.write({'acquirer_reference': tree.get('x_trans_id')}) + self._set_transaction_authorized() + self.execute_callback() + if tree.get('x_type').lower() == 'void': + self._set_transaction_cancel() + return True + elif status_code == self._authorize_pending_tx_status: + self.write({'acquirer_reference': tree.get('x_trans_id')}) + self._set_transaction_pending() + return True + else: + error = tree.get('x_response_reason_text') + _logger.info(error) + self.write({ + 'acquirer_reference': tree.get('x_trans_id'), + }) + self._set_transaction_error(msg=error) + return False + + +class PaymentToken(models.Model): + _inherit = 'payment.token' + + authorize_profile = fields.Char(string='Authorize.net Profile ID', help='This contains the unique reference ' + 'for this partner/payment token combination in the Authorize.net backend') + provider = fields.Selection(string='Provider', related='acquirer_id.provider', readonly=False) + save_token = fields.Selection(string='Save Cards', related='acquirer_id.save_token', readonly=False) + + @api.model + def authorize_create(self, values): + if values.get('opaqueData') and values.get('encryptedCardData'): + acquirer = self.env['payment.acquirer'].browse(values['acquirer_id']) + partner = self.env['res.partner'].browse(values['partner_id']) + transaction = AuthorizeAPI(acquirer) + res = transaction.create_customer_profile(partner, values['opaqueData']) + if res.get('profile_id') and res.get('payment_profile_id'): + return { + 'authorize_profile': res.get('profile_id'), + 'name': values['encryptedCardData'].get('cardNumber'), + 'acquirer_ref': res.get('payment_profile_id'), + 'verified': True + } + else: + raise ValidationError(_('The Customer Profile creation in Authorize.NET failed.')) + else: + return values |
