2020-05-12 17:40:10 +00:00
|
|
|
import stripe
|
|
|
|
import json
|
2020-05-14 17:41:12 +00:00
|
|
|
import time
|
2020-05-12 17:40:10 +00:00
|
|
|
import decimal
|
2020-05-22 20:20:26 +00:00
|
|
|
import re
|
2020-07-18 15:16:17 +00:00
|
|
|
import sys
|
2020-05-12 17:40:10 +00:00
|
|
|
|
2020-05-22 20:20:26 +00:00
|
|
|
from time import sleep
|
2020-05-12 17:40:10 +00:00
|
|
|
from flask import Blueprint
|
2020-05-22 20:20:26 +00:00
|
|
|
from flask import make_response
|
2020-05-12 17:40:10 +00:00
|
|
|
from flask import request
|
|
|
|
from flask import current_app
|
|
|
|
from flask import session
|
|
|
|
from flask import redirect
|
|
|
|
from flask import url_for
|
|
|
|
from flask import jsonify
|
|
|
|
from flask import flash
|
|
|
|
from flask import render_template
|
|
|
|
from werkzeug.exceptions import abort
|
|
|
|
|
|
|
|
from capsulflask.auth import account_required
|
|
|
|
|
2021-01-04 19:32:52 +00:00
|
|
|
from capsulflask.db import get_model
|
|
|
|
from capsulflask.shared import my_exec_info_message
|
2020-05-12 17:40:10 +00:00
|
|
|
|
2020-05-14 23:03:00 +00:00
|
|
|
bp = Blueprint("payment", __name__, url_prefix="/payment")
|
2020-05-12 17:40:10 +00:00
|
|
|
|
2020-05-14 23:03:00 +00:00
|
|
|
def validate_dollars():
|
2020-05-12 18:04:35 +00:00
|
|
|
errors = list()
|
2020-05-14 23:03:00 +00:00
|
|
|
dollars = None
|
|
|
|
if "dollars" not in request.form:
|
|
|
|
errors.append("dollars is required")
|
|
|
|
else:
|
2020-05-12 18:04:35 +00:00
|
|
|
dollars = None
|
|
|
|
try:
|
|
|
|
dollars = decimal.Decimal(request.form["dollars"])
|
|
|
|
except:
|
|
|
|
errors.append("dollars must be a number")
|
|
|
|
|
2020-05-14 23:03:00 +00:00
|
|
|
# TODO re enable this
|
|
|
|
# if dollars and dollars < decimal.Decimal(1):
|
|
|
|
# errors.append("dollars must be >= 1")
|
|
|
|
|
|
|
|
return [errors, dollars]
|
|
|
|
|
|
|
|
@bp.route("/btcpay", methods=("GET", "POST"))
|
|
|
|
@account_required
|
|
|
|
def btcpay_payment():
|
|
|
|
errors = list()
|
|
|
|
invoice_id = None
|
|
|
|
|
|
|
|
if request.method == "POST":
|
|
|
|
result = validate_dollars()
|
|
|
|
errors = result[0]
|
|
|
|
dollars = result[1]
|
|
|
|
|
|
|
|
if len(errors) == 0:
|
|
|
|
invoice = current_app.config['BTCPAY_CLIENT'].create_invoice(dict(
|
|
|
|
price=float(dollars),
|
|
|
|
currency="USD",
|
|
|
|
itemDesc="Capsul Cloud Compute",
|
|
|
|
transactionSpeed="high",
|
2020-05-15 23:18:19 +00:00
|
|
|
redirectURL=f"{current_app.config['BASE_URL']}/console/account-balance",
|
2020-05-15 04:40:27 +00:00
|
|
|
notificationURL=f"{current_app.config['BASE_URL']}/payment/btcpay/webhook"
|
2020-05-14 23:03:00 +00:00
|
|
|
))
|
2020-05-17 02:28:28 +00:00
|
|
|
|
|
|
|
current_app.logger.info(f"created btcpay invoice: {invoice}")
|
|
|
|
|
2020-05-14 23:03:00 +00:00
|
|
|
# print(invoice)
|
|
|
|
invoice_id = invoice["id"]
|
|
|
|
|
2020-05-16 04:19:01 +00:00
|
|
|
current_app.logger.info(f"created btcpay invoice_id={invoice_id} ( {session['account']}, ${dollars} )")
|
2020-05-14 23:03:00 +00:00
|
|
|
|
|
|
|
get_model().create_payment_session("btcpay", invoice_id, session["account"], dollars)
|
|
|
|
|
|
|
|
return redirect(invoice["url"])
|
|
|
|
|
|
|
|
for error in errors:
|
|
|
|
flash(error)
|
|
|
|
|
|
|
|
return render_template("btcpay.html", invoice_id=invoice_id)
|
|
|
|
|
|
|
|
|
2020-05-17 03:04:51 +00:00
|
|
|
def poll_btcpay_session(invoice_id):
|
2020-07-18 15:16:17 +00:00
|
|
|
|
|
|
|
invoice = None
|
|
|
|
try:
|
|
|
|
invoice = current_app.config['BTCPAY_CLIENT'].get_invoice(invoice_id)
|
|
|
|
except:
|
|
|
|
current_app.logger.error(f"""
|
|
|
|
error was thrown when contacting btcpay server:
|
|
|
|
{my_exec_info_message(sys.exc_info())}"""
|
|
|
|
)
|
|
|
|
return [503, "error was thrown when contacting btcpay server"]
|
|
|
|
|
2020-05-15 04:40:27 +00:00
|
|
|
|
|
|
|
if invoice['currency'] != "USD":
|
2020-05-17 03:04:51 +00:00
|
|
|
return [400, "invalid currency"]
|
2020-05-15 04:40:27 +00:00
|
|
|
|
|
|
|
dollars = invoice['price']
|
|
|
|
|
2020-07-18 15:16:17 +00:00
|
|
|
current_app.logger.info(f"poll_btcpay_session invoice_id={invoice_id}, status={invoice['status']} dollars={dollars}")
|
2020-05-17 02:24:40 +00:00
|
|
|
|
2020-05-15 23:18:19 +00:00
|
|
|
if invoice['status'] == "paid" or invoice['status'] == "confirmed" or invoice['status'] == "complete":
|
2020-05-15 04:40:27 +00:00
|
|
|
success_account = get_model().consume_payment_session("btcpay", invoice_id, dollars)
|
|
|
|
|
|
|
|
if success_account:
|
2020-05-16 04:19:01 +00:00
|
|
|
current_app.logger.info(f"{success_account} paid ${dollars} successfully (btcpay_invoice_id={invoice_id})")
|
2020-05-15 04:40:27 +00:00
|
|
|
|
2020-05-15 23:18:19 +00:00
|
|
|
if invoice['status'] == "complete":
|
2020-05-15 04:40:27 +00:00
|
|
|
get_model().btcpay_invoice_resolved(invoice_id, True)
|
|
|
|
elif invoice['status'] == "expired" or invoice['status'] == "invalid":
|
|
|
|
get_model().btcpay_invoice_resolved(invoice_id, False)
|
2020-07-18 15:16:17 +00:00
|
|
|
get_model().delete_payment_session("btcpay", invoice_id)
|
2020-05-15 23:18:19 +00:00
|
|
|
|
2020-05-17 03:04:51 +00:00
|
|
|
return [200, "ok"]
|
|
|
|
|
|
|
|
@bp.route("/btcpay/webhook", methods=("POST",))
|
|
|
|
def btcpay_webhook():
|
|
|
|
|
|
|
|
current_app.logger.info(f"got btcpay webhook")
|
|
|
|
|
|
|
|
# IMPORTANT! there is no signature or credential for the data sent into this webhook :facepalm:
|
|
|
|
# its just a notification, thats all.
|
|
|
|
request_data = json.loads(request.data)
|
|
|
|
invoice_id = request_data['id']
|
|
|
|
|
2020-07-18 15:16:17 +00:00
|
|
|
# so you better make sure to get the invoice directly from the horses mouth!
|
2020-05-17 03:04:51 +00:00
|
|
|
result = poll_btcpay_session(invoice_id)
|
|
|
|
|
|
|
|
abort(result[0], result[1])
|
2020-05-15 04:40:27 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
2020-05-14 23:03:00 +00:00
|
|
|
@bp.route("/stripe", methods=("GET", "POST"))
|
|
|
|
@account_required
|
|
|
|
def stripe_payment():
|
|
|
|
|
|
|
|
stripe_checkout_session_id=None
|
|
|
|
errors = list()
|
|
|
|
|
|
|
|
if request.method == "POST":
|
|
|
|
result = validate_dollars()
|
|
|
|
errors = result[0]
|
|
|
|
dollars = result[1]
|
2020-05-12 17:40:10 +00:00
|
|
|
|
|
|
|
if len(errors) == 0:
|
|
|
|
|
2020-05-16 04:19:01 +00:00
|
|
|
current_app.logger.info(f"creating stripe checkout session for {session['account']}, ${dollars}")
|
2020-05-12 17:40:10 +00:00
|
|
|
|
|
|
|
checkout_session = stripe.checkout.Session.create(
|
2020-05-14 23:03:00 +00:00
|
|
|
success_url=current_app.config['BASE_URL'] + "/payment/stripe/success?session_id={CHECKOUT_SESSION_ID}",
|
|
|
|
cancel_url=current_app.config['BASE_URL'] + "/payment/stripe",
|
2020-05-12 17:40:10 +00:00
|
|
|
payment_method_types=["card"],
|
2020-05-15 23:18:19 +00:00
|
|
|
#customer_email=session["account"],
|
2020-05-12 17:40:10 +00:00
|
|
|
line_items=[
|
|
|
|
{
|
|
|
|
"name": "Capsul Cloud Compute",
|
|
|
|
"images": [current_app.config['BASE_URL']+"/static/capsul-product-image.png"],
|
|
|
|
"quantity": 1,
|
|
|
|
"currency": "usd",
|
2020-05-12 18:04:35 +00:00
|
|
|
"amount": int(dollars*100)
|
2020-05-12 17:40:10 +00:00
|
|
|
}
|
|
|
|
]
|
|
|
|
)
|
|
|
|
stripe_checkout_session_id = checkout_session['id']
|
|
|
|
|
2020-05-16 04:19:01 +00:00
|
|
|
current_app.logger.info(f"stripe_checkout_session_id={stripe_checkout_session_id} ( {session['account']}, ${dollars} )")
|
2020-05-12 17:40:10 +00:00
|
|
|
|
2020-05-14 23:03:00 +00:00
|
|
|
get_model().create_payment_session("stripe", stripe_checkout_session_id, session["account"], dollars)
|
2020-05-12 17:40:10 +00:00
|
|
|
|
2020-05-15 23:18:19 +00:00
|
|
|
# We can't do this because stripe requires a bunch of server-authenticated data to be sent in the hash
|
|
|
|
# of the URL. I briefly looked into reverse-engineering their proprietary javascript in order to try to figure out
|
|
|
|
# how it works and gave up after I discovered that it would require multiple complex interactions with stripe's
|
|
|
|
# servers, and it looked like they were trying to make what I was trying to do impossible.
|
|
|
|
|
|
|
|
# I never tried running the stripe proprietary javascript in a headless brower and passing the hash from the
|
|
|
|
# headless browser to the client, but I suspect it might not work anyway because they probably have thier tracking
|
|
|
|
# cookie info in there somewhere, and if the cookie doesn't match they may refuse to display the page.
|
|
|
|
|
|
|
|
#return redirect(f"https://checkout.stripe.com/pay/{stripe_checkout_session_id}")
|
|
|
|
|
2020-05-22 20:20:26 +00:00
|
|
|
return redirect(f"/payment/stripe/{stripe_checkout_session_id}")
|
|
|
|
|
2020-05-12 17:40:10 +00:00
|
|
|
for error in errors:
|
|
|
|
flash(error)
|
|
|
|
|
2020-05-22 20:20:26 +00:00
|
|
|
return render_template("stripe.html")
|
|
|
|
|
|
|
|
@bp.route("/stripe/<string:stripe_checkout_session_id>")
|
|
|
|
@account_required
|
|
|
|
def redirect_to_stripe(stripe_checkout_session_id):
|
|
|
|
|
|
|
|
if stripe_checkout_session_id and not re.match(r"^[a-zA-Z0-9_=-]+$", stripe_checkout_session_id):
|
|
|
|
stripe_checkout_session_id = '___________'
|
|
|
|
|
|
|
|
response = make_response(render_template(
|
|
|
|
"stripe.html",
|
2020-05-12 17:40:10 +00:00
|
|
|
stripe_checkout_session_id=stripe_checkout_session_id,
|
|
|
|
stripe_public_key=current_app.config["STRIPE_PUBLISHABLE_KEY"]
|
2020-05-22 20:20:26 +00:00
|
|
|
))
|
|
|
|
|
2020-05-22 20:31:53 +00:00
|
|
|
response.headers['Content-Security-Policy'] = "default-src 'self' https://js.stripe.com"
|
2020-05-22 20:20:26 +00:00
|
|
|
|
|
|
|
return response
|
|
|
|
|
|
|
|
@bp.route("/stripe/<string:stripe_checkout_session_id>/json")
|
|
|
|
@account_required
|
|
|
|
def stripe_checkout_session_json(stripe_checkout_session_id):
|
|
|
|
|
|
|
|
if stripe_checkout_session_id and not re.match(r"^[a-zA-Z0-9_=-]+$", stripe_checkout_session_id):
|
|
|
|
stripe_checkout_session_id = '___________'
|
|
|
|
|
|
|
|
has_redirected_already = get_model().payment_session_redirect(session['account'], stripe_checkout_session_id)
|
|
|
|
|
|
|
|
if has_redirected_already is None:
|
|
|
|
abort(404, "Not Found")
|
|
|
|
|
|
|
|
return jsonify(dict(hasRedirectedAlready=has_redirected_already))
|
|
|
|
|
|
|
|
|
2020-05-12 17:40:10 +00:00
|
|
|
|
2020-05-15 23:18:19 +00:00
|
|
|
def validate_stripe_checkout_session(stripe_checkout_session_id):
|
|
|
|
checkout_session_completed_events = stripe.Event.list(
|
|
|
|
type='checkout.session.completed',
|
|
|
|
created={
|
|
|
|
# Check for events created in the last half hour
|
|
|
|
'gte': int(time.time() - (30 * 60)),
|
|
|
|
},
|
|
|
|
)
|
|
|
|
|
|
|
|
for event in checkout_session_completed_events.auto_paging_iter():
|
|
|
|
checkout_session = event['data']['object']
|
|
|
|
|
|
|
|
if checkout_session and 'id' in checkout_session and checkout_session['id'] == stripe_checkout_session_id:
|
2020-11-02 20:36:01 +00:00
|
|
|
cents = checkout_session['amount_total']
|
2020-05-15 23:18:19 +00:00
|
|
|
dollars = decimal.Decimal(cents)/100
|
|
|
|
|
|
|
|
#consume_payment_session deletes the checkout session row and inserts a payment row
|
|
|
|
# its ok to call consume_payment_session more than once because it only takes an action if the session exists
|
|
|
|
success_email = get_model().consume_payment_session("stripe", stripe_checkout_session_id, dollars)
|
|
|
|
|
|
|
|
if success_email:
|
|
|
|
return dict(email=success_email, dollars=dollars)
|
|
|
|
|
|
|
|
return None
|
|
|
|
|
2020-05-14 23:03:00 +00:00
|
|
|
@bp.route("/stripe/success", methods=("GET",))
|
2020-05-12 17:40:10 +00:00
|
|
|
def success():
|
|
|
|
stripe_checkout_session_id = request.args.get('session_id')
|
|
|
|
if not stripe_checkout_session_id:
|
2020-05-16 04:19:01 +00:00
|
|
|
current_app.logger.info("/payment/stripe/success returned 400: missing required URL parameter session_id")
|
2020-05-12 17:40:10 +00:00
|
|
|
abort(400, "missing required URL parameter session_id")
|
|
|
|
else:
|
2020-05-15 23:18:19 +00:00
|
|
|
for _ in range(0, 5):
|
|
|
|
paid = validate_stripe_checkout_session(stripe_checkout_session_id)
|
|
|
|
if paid:
|
2020-05-16 04:19:01 +00:00
|
|
|
current_app.logger.info(f"{paid['email']} paid ${paid['dollars']} successfully (stripe_checkout_session_id={stripe_checkout_session_id})")
|
2020-05-14 17:41:12 +00:00
|
|
|
return redirect(url_for("console.account_balance"))
|
2020-05-15 23:18:19 +00:00
|
|
|
else:
|
|
|
|
sleep(1)
|
|
|
|
|
2020-05-14 17:41:12 +00:00
|
|
|
|
|
|
|
abort(400, "this checkout session is not paid yet")
|
|
|
|
|
|
|
|
# webhook is not needed
|
2020-05-12 17:40:10 +00:00
|
|
|
# @bp.route("/webhook", methods=("POST",))
|
|
|
|
# def webhook():
|
|
|
|
# request_data = json.loads(request.data)
|
|
|
|
# signature = request.headers.get('stripe-signature')
|
|
|
|
# try:
|
|
|
|
# event = stripe.Webhook.construct_event(
|
|
|
|
# payload=request_data,
|
|
|
|
# sig_header=signature,
|
|
|
|
# secret=current_app.config['STRIPE_WEBHOOK_SECRET']
|
|
|
|
# )
|
|
|
|
# if event['type'] == 'checkout.session.completed':
|
2020-11-02 20:36:01 +00:00
|
|
|
# dollars = event['data']['object']['amount_total']
|
2020-05-12 17:40:10 +00:00
|
|
|
# stripe_checkout_session_id = event['data']['object']['id']
|
|
|
|
|
2020-05-14 23:03:00 +00:00
|
|
|
# #consume_payment_session deletes the checkout session row and inserts a payment row
|
|
|
|
# # its ok to call consume_payment_session more than once because it only takes an action if the session exists
|
2020-05-15 04:40:27 +00:00
|
|
|
# success_account = get_model().consume_payment_session("stripe", stripe_checkout_session_id, dollars)
|
2020-05-14 17:41:12 +00:00
|
|
|
# if success_account:
|
|
|
|
# print(f"{success_account} paid ${dollars} successfully (stripe_checkout_session_id={stripe_checkout_session_id})")
|
|
|
|
|
2020-05-12 17:40:10 +00:00
|
|
|
# return jsonify({'status': 'success'})
|
|
|
|
# except ValueError as e:
|
2020-05-14 23:03:00 +00:00
|
|
|
# print("/payment/stripe/webhook returned 400: bad request", e)
|
2020-05-12 17:40:10 +00:00
|
|
|
# abort(400, "bad request")
|
|
|
|
# except stripe.error.SignatureVerificationError:
|
2020-05-14 23:03:00 +00:00
|
|
|
# print("/payment/stripe/webhook returned 400: invalid signature")
|
2020-05-12 17:40:10 +00:00
|
|
|
# abort(400, "invalid signature")
|
|
|
|
|