795 lines
30 KiB
Python
795 lines
30 KiB
Python
# stripe_routes.py – Stripe billing, webhook handling, license persistence.
|
||
#
|
||
# IMPORTANT (learned the hard way, 2026-03-27):
|
||
# - Do NOT call .get() on raw StripeObjects; they are not plain dicts.
|
||
# - Do NOT use .to_dict_recursive(); it does not exist in all stripe-python versions.
|
||
# - After Webhook.construct_event(), always work with json.loads(body) instead.
|
||
# - For Subscription.retrieve() / Customer.retrieve(), convert via _stripe_to_dict(obj).
|
||
# - json.loads(str(obj)) breaks when StripeObject contains Decimal values (monetary amounts).
|
||
# Always use _stripe_to_dict() instead. Never json.loads(str(...)) on StripeObjects.
|
||
# - This router is mounted with prefix="/stripe" in main.py.
|
||
# Route decorators here must NOT repeat the prefix (use "/webhook", not "/stripe/webhook").
|
||
# - When changing Stripe env vars on Hetzner, rebuild the container:
|
||
# docker compose up -d --build --force-recreate aza-api (restart alone is not enough)
|
||
|
||
from __future__ import annotations
|
||
|
||
import json
|
||
import os
|
||
import secrets
|
||
import smtplib
|
||
import sqlite3
|
||
import string
|
||
import time
|
||
from dataclasses import dataclass
|
||
from decimal import Decimal
|
||
from email.mime.multipart import MIMEMultipart
|
||
from email.mime.text import MIMEText
|
||
from pathlib import Path
|
||
from typing import Any, Dict, Optional
|
||
|
||
import stripe
|
||
from fastapi import APIRouter, Header, HTTPException, Request
|
||
from fastapi.responses import JSONResponse
|
||
|
||
|
||
STRIPE_SECRET_KEY = os.environ.get("STRIPE_SECRET_KEY", "").strip()
|
||
STRIPE_WEBHOOK_SECRET = os.environ.get("STRIPE_WEBHOOK_SECRET", "").strip()
|
||
STRIPE_SUCCESS_URL = os.environ.get("STRIPE_SUCCESS_URL", "").strip()
|
||
STRIPE_CANCEL_URL = os.environ.get("STRIPE_CANCEL_URL", "").strip()
|
||
STRIPE_PORTAL_RETURN_URL = os.environ.get("STRIPE_PORTAL_RETURN_URL", "").strip()
|
||
|
||
_BASE_DIR = Path(__file__).resolve().parent
|
||
DB_PATH = Path(os.environ.get("STRIPE_DB_PATH", str(_BASE_DIR / "data" / "stripe_webhook.sqlite")))
|
||
EVENTS_LOG = Path(os.environ.get("STRIPE_EVENTS_LOG", str(_BASE_DIR / "data" / "stripe_events.log.jsonl")))
|
||
|
||
router = APIRouter(tags=["stripe"])
|
||
|
||
|
||
def _decimal_default(o: Any) -> Any:
|
||
"""json.dumps default handler: Decimal → int/float, StripeObject → dict."""
|
||
if isinstance(o, Decimal):
|
||
return int(o) if o == int(o) else float(o)
|
||
if hasattr(o, "to_dict"):
|
||
return o.to_dict()
|
||
if hasattr(o, "keys"):
|
||
return dict(o)
|
||
return str(o)
|
||
|
||
|
||
def _stripe_to_dict(obj: Any) -> dict:
|
||
"""Convert a StripeObject to a plain JSON-safe dict.
|
||
Handles Decimal values that break json.loads(str(obj))."""
|
||
raw = dict(obj) if hasattr(obj, "keys") else obj
|
||
return json.loads(json.dumps(raw, default=_decimal_default))
|
||
|
||
|
||
def _require_env() -> None:
|
||
missing = []
|
||
if not STRIPE_SECRET_KEY:
|
||
missing.append("STRIPE_SECRET_KEY")
|
||
if not STRIPE_WEBHOOK_SECRET:
|
||
missing.append("STRIPE_WEBHOOK_SECRET")
|
||
if not STRIPE_SUCCESS_URL:
|
||
missing.append("STRIPE_SUCCESS_URL")
|
||
if not STRIPE_CANCEL_URL:
|
||
missing.append("STRIPE_CANCEL_URL")
|
||
if missing:
|
||
raise HTTPException(status_code=500, detail=f"Stripe misconfigured. Missing env: {', '.join(missing)}")
|
||
|
||
|
||
def _init_stripe() -> None:
|
||
stripe.api_key = STRIPE_SECRET_KEY
|
||
|
||
|
||
def _ensure_storage() -> None:
|
||
DB_PATH.parent.mkdir(parents=True, exist_ok=True)
|
||
EVENTS_LOG.parent.mkdir(parents=True, exist_ok=True)
|
||
with sqlite3.connect(DB_PATH) as con:
|
||
con.execute(
|
||
"""
|
||
CREATE TABLE IF NOT EXISTS processed_events (
|
||
event_id TEXT PRIMARY KEY,
|
||
created_at INTEGER NOT NULL
|
||
)
|
||
"""
|
||
)
|
||
con.execute(
|
||
"""
|
||
CREATE TABLE IF NOT EXISTS licenses (
|
||
subscription_id TEXT PRIMARY KEY,
|
||
customer_id TEXT,
|
||
status TEXT,
|
||
lookup_key TEXT,
|
||
allowed_users INTEGER,
|
||
devices_per_user INTEGER,
|
||
customer_email TEXT,
|
||
client_reference_id TEXT,
|
||
current_period_end INTEGER,
|
||
updated_at INTEGER NOT NULL
|
||
)
|
||
"""
|
||
)
|
||
cols = [row[1] for row in con.execute("PRAGMA table_info(licenses)").fetchall()]
|
||
if "current_period_end" not in cols:
|
||
con.execute("ALTER TABLE licenses ADD COLUMN current_period_end INTEGER")
|
||
if "license_key" not in cols:
|
||
con.execute("ALTER TABLE licenses ADD COLUMN license_key TEXT")
|
||
con.commit()
|
||
|
||
|
||
_last_mail_error: str = ""
|
||
|
||
_MAIL_SUBJECT = "Ihr AZA Lizenzschluessel"
|
||
|
||
|
||
def _mail_body_text(license_key: str) -> str:
|
||
return (
|
||
f"Guten Tag,\n\n"
|
||
f"vielen Dank fuer Ihren Kauf von AZA Medical AI Assistant.\n\n"
|
||
f"Ihr persoenlicher Lizenzschluessel:\n\n"
|
||
f" {license_key}\n\n"
|
||
f"So aktivieren Sie AZA:\n"
|
||
f"1. Starten Sie die AZA Desktop-App.\n"
|
||
f"2. Klicken Sie auf das Schluessel-Symbol (Aktivierung).\n"
|
||
f"3. Geben Sie den obigen Schluessel ein und klicken Sie auf \"Aktivieren\".\n\n"
|
||
f"Bewahren Sie diese E-Mail sicher auf.\n\n"
|
||
f"Bei Fragen: support@aza-medwork.ch\n\n"
|
||
f"Freundliche Gruesse\n"
|
||
f"Ihr AZA-Team"
|
||
)
|
||
|
||
|
||
def _mail_body_html(license_key: str) -> str:
|
||
return (
|
||
f'<div style="font-family:Segoe UI,system-ui,sans-serif;max-width:560px;margin:0 auto;">'
|
||
f'<h2 style="color:#0078D7;">Ihr AZA Lizenzschluessel</h2>'
|
||
f'<p>Guten Tag,</p>'
|
||
f'<p>vielen Dank für Ihren Kauf von <strong>AZA Medical AI Assistant</strong>.</p>'
|
||
f'<p>Ihr persönlicher Lizenzschlüssel:</p>'
|
||
f'<div style="margin:20px 0;padding:16px 24px;background:#E8F4FD;border-radius:8px;'
|
||
f'border:1px solid #B3D8F0;text-align:center;">'
|
||
f'<span style="font-size:22px;font-weight:700;letter-spacing:2px;color:#0078D7;'
|
||
f'font-family:Consolas,monospace;">{license_key}</span></div>'
|
||
f'<p><strong>So aktivieren Sie AZA:</strong></p>'
|
||
f'<ol style="line-height:1.8;">'
|
||
f'<li>Starten Sie die AZA Desktop-App.</li>'
|
||
f'<li>Klicken Sie auf das Schlüssel-Symbol (Aktivierung).</li>'
|
||
f'<li>Geben Sie den obigen Schlüssel ein und klicken Sie auf «Aktivieren».</li>'
|
||
f'</ol>'
|
||
f'<p style="color:#888;font-size:13px;">Bewahren Sie diese E-Mail sicher auf.</p>'
|
||
f'<hr style="border:none;border-top:1px solid #E2E8F0;margin:24px 0;">'
|
||
f'<p style="font-size:12px;color:#999;">Bei Fragen: '
|
||
f'<a href="mailto:support@aza-medwork.ch">support@aza-medwork.ch</a></p>'
|
||
f'<p style="font-size:12px;color:#999;">© AZA Medical AI Assistant – aza-medwork.ch</p>'
|
||
f'</div>'
|
||
)
|
||
|
||
|
||
def _send_via_resend(to_email: str, license_key: str) -> bool:
|
||
"""Versand ueber Resend HTTP API (api.resend.com)."""
|
||
global _last_mail_error
|
||
import urllib.request
|
||
import urllib.error
|
||
|
||
api_key = os.environ.get("RESEND_API_KEY", "").strip()
|
||
sender = os.environ.get("MAIL_FROM", "AZA MedWork <noreply@aza-medwork.ch>").strip()
|
||
|
||
if not api_key:
|
||
_last_mail_error = "RESEND_API_KEY nicht gesetzt"
|
||
return False
|
||
|
||
payload = json.dumps({
|
||
"from": sender,
|
||
"to": [to_email],
|
||
"subject": _MAIL_SUBJECT,
|
||
"html": _mail_body_html(license_key),
|
||
"text": _mail_body_text(license_key),
|
||
}).encode("utf-8")
|
||
|
||
req = urllib.request.Request(
|
||
"https://api.resend.com/emails",
|
||
data=payload,
|
||
headers={
|
||
"Authorization": f"Bearer {api_key}",
|
||
"Content-Type": "application/json",
|
||
"User-Agent": "AZA-MedWork/1.0",
|
||
},
|
||
method="POST",
|
||
)
|
||
try:
|
||
with urllib.request.urlopen(req, timeout=15) as resp:
|
||
resp_body = resp.read().decode()
|
||
if resp.status in (200, 201):
|
||
print(f"[MAIL] Resend OK -> {to_email}")
|
||
return True
|
||
_last_mail_error = f"Resend HTTP {resp.status}: {resp_body[:200]}"
|
||
print(f"[MAIL] {_last_mail_error}")
|
||
return False
|
||
except urllib.error.HTTPError as exc:
|
||
body = exc.read().decode("utf-8", errors="replace")[:300] if exc.fp else ""
|
||
_last_mail_error = f"Resend HTTP {exc.code}: {body}"
|
||
print(f"[MAIL] FEHLER Resend: {_last_mail_error}")
|
||
return False
|
||
except Exception as exc:
|
||
_last_mail_error = f"Resend {type(exc).__name__}: {exc}"
|
||
print(f"[MAIL] FEHLER Resend: {_last_mail_error}")
|
||
return False
|
||
|
||
|
||
def _send_via_smtp(to_email: str, license_key: str) -> bool:
|
||
"""Fallback-Versand ueber SMTP."""
|
||
global _last_mail_error
|
||
|
||
host = os.environ.get("SMTP_HOST", "").strip()
|
||
port_str = os.environ.get("SMTP_PORT", "587").strip()
|
||
user = os.environ.get("SMTP_USER", "").strip()
|
||
password = os.environ.get("SMTP_PASS", "").strip()
|
||
sender = os.environ.get("SMTP_FROM", "").strip() or user
|
||
|
||
if not all([host, user, password]):
|
||
_last_mail_error = "SMTP nicht konfiguriert"
|
||
return False
|
||
|
||
try:
|
||
msg = MIMEMultipart("alternative")
|
||
msg["From"] = sender
|
||
msg["To"] = to_email
|
||
msg["Subject"] = _MAIL_SUBJECT
|
||
msg.attach(MIMEText(_mail_body_text(license_key), "plain", "utf-8"))
|
||
msg.attach(MIMEText(_mail_body_html(license_key), "html", "utf-8"))
|
||
|
||
port = int(port_str)
|
||
if port == 465:
|
||
with smtplib.SMTP_SSL(host, port, timeout=15) as srv:
|
||
srv.login(user, password)
|
||
srv.sendmail(sender, [to_email], msg.as_string())
|
||
else:
|
||
with smtplib.SMTP(host, port, timeout=15) as srv:
|
||
srv.ehlo()
|
||
srv.starttls()
|
||
srv.ehlo()
|
||
srv.login(user, password)
|
||
srv.sendmail(sender, [to_email], msg.as_string())
|
||
|
||
print(f"[MAIL] SMTP OK -> {to_email}")
|
||
return True
|
||
except Exception as exc:
|
||
_last_mail_error = f"SMTP {type(exc).__name__}: {exc}"
|
||
print(f"[MAIL] FEHLER SMTP: {_last_mail_error}")
|
||
return False
|
||
|
||
|
||
def send_license_email(to_email: str, license_key: str) -> bool:
|
||
"""Sendet den Lizenzschluessel per E-Mail. Resend API bevorzugt, SMTP als Fallback."""
|
||
global _last_mail_error
|
||
_last_mail_error = ""
|
||
|
||
if not to_email or not license_key:
|
||
print(f"[MAIL] skip – to_email oder license_key fehlt")
|
||
return False
|
||
|
||
if os.environ.get("RESEND_API_KEY", "").strip():
|
||
return _send_via_resend(to_email, license_key)
|
||
|
||
return _send_via_smtp(to_email, license_key)
|
||
|
||
|
||
def _generate_license_key() -> str:
|
||
"""Erzeugt einen kryptographisch sicheren Lizenzschluessel: AZA-XXXX-XXXX-XXXX-XXXX."""
|
||
alphabet = string.ascii_uppercase + string.digits
|
||
groups = ["".join(secrets.choice(alphabet) for _ in range(4)) for _ in range(4)]
|
||
return "AZA-" + "-".join(groups)
|
||
|
||
|
||
@dataclass(frozen=True)
|
||
class PlanPolicy:
|
||
lookup_key: str
|
||
allowed_users: int
|
||
devices_per_user: int
|
||
|
||
|
||
def _policy_for_lookup_key(lookup_key: str) -> PlanPolicy:
|
||
if lookup_key.startswith("aza_basic_"):
|
||
return PlanPolicy(lookup_key=lookup_key, allowed_users=1, devices_per_user=2)
|
||
if lookup_key.startswith("aza_team_"):
|
||
return PlanPolicy(lookup_key=lookup_key, allowed_users=3, devices_per_user=2)
|
||
return PlanPolicy(lookup_key=lookup_key, allowed_users=1, devices_per_user=1)
|
||
|
||
|
||
_PRICE_TO_LOOKUP: Dict[tuple, str] = {
|
||
("month", 5900): "aza_basic_monthly",
|
||
("year", 59000): "aza_basic_yearly",
|
||
("month", 8900): "aza_team_monthly",
|
||
("year", 89000): "aza_team_yearly",
|
||
}
|
||
|
||
|
||
def _lookup_key_from_price(price: Dict[str, Any]) -> str:
|
||
"""Derive lookup_key from price object. Falls back to interval+amount mapping
|
||
when Stripe sandbox omits lookup_key."""
|
||
lk = (price.get("lookup_key") or "").strip()
|
||
if lk:
|
||
return lk
|
||
recurring = price.get("recurring") or {}
|
||
interval = (recurring.get("interval") or "").strip()
|
||
amount = price.get("unit_amount")
|
||
if interval and amount is not None:
|
||
try:
|
||
amount = int(amount)
|
||
except (TypeError, ValueError):
|
||
return ""
|
||
return _PRICE_TO_LOOKUP.get((interval, amount), "")
|
||
return ""
|
||
|
||
|
||
def _price_id_from_lookup_key(lookup_key: str) -> str:
|
||
_init_stripe()
|
||
prices = stripe.Price.list(lookup_keys=[lookup_key], active=True, limit=1)
|
||
if not prices.data:
|
||
raise HTTPException(status_code=400, detail=f"Unknown lookup_key: {lookup_key}")
|
||
return prices.data[0].id
|
||
|
||
|
||
@router.get("/health")
|
||
def stripe_health() -> Dict[str, Any]:
|
||
_require_env()
|
||
return {"ok": True}
|
||
|
||
|
||
@router.post("/create_checkout_session")
|
||
async def create_checkout_session(payload: Dict[str, Any]) -> Dict[str, Any]:
|
||
_require_env()
|
||
_ensure_storage()
|
||
_init_stripe()
|
||
|
||
lookup_key = (payload.get("lookup_key") or "").strip()
|
||
if not lookup_key:
|
||
raise HTTPException(status_code=400, detail="Missing lookup_key")
|
||
|
||
customer_email = (payload.get("customer_email") or "").strip() or None
|
||
client_reference_id = (payload.get("client_reference_id") or "").strip() or None
|
||
|
||
price_id = _price_id_from_lookup_key(lookup_key)
|
||
policy = _policy_for_lookup_key(lookup_key)
|
||
|
||
subscription_data = {
|
||
"metadata": {
|
||
"lookup_key": policy.lookup_key,
|
||
"allowed_users": str(policy.allowed_users),
|
||
"devices_per_user": str(policy.devices_per_user),
|
||
}
|
||
}
|
||
|
||
session = stripe.checkout.Session.create(
|
||
mode="subscription",
|
||
line_items=[{"price": price_id, "quantity": 1}],
|
||
success_url=STRIPE_SUCCESS_URL,
|
||
cancel_url=STRIPE_CANCEL_URL,
|
||
customer_email=customer_email,
|
||
client_reference_id=client_reference_id,
|
||
subscription_data=subscription_data,
|
||
allow_promotion_codes=True,
|
||
billing_address_collection="auto",
|
||
)
|
||
|
||
return {"id": session.id, "url": session.url}
|
||
|
||
|
||
@router.post("/create_billing_portal_session")
|
||
async def create_billing_portal_session(payload: Dict[str, Any]) -> Dict[str, Any]:
|
||
_require_env()
|
||
_init_stripe()
|
||
customer_id = (payload.get("customer_id") or "").strip()
|
||
if not customer_id:
|
||
raise HTTPException(status_code=400, detail="Missing customer_id")
|
||
if not STRIPE_PORTAL_RETURN_URL:
|
||
raise HTTPException(status_code=500, detail="Missing STRIPE_PORTAL_RETURN_URL")
|
||
|
||
portal = stripe.billing_portal.Session.create(customer=customer_id, return_url=STRIPE_PORTAL_RETURN_URL)
|
||
return {"url": portal.url}
|
||
|
||
|
||
def _already_processed(event_id: str) -> bool:
|
||
with sqlite3.connect(DB_PATH) as con:
|
||
row = con.execute("SELECT 1 FROM processed_events WHERE event_id=? LIMIT 1", (event_id,)).fetchone()
|
||
return row is not None
|
||
|
||
|
||
def _mark_processed(event_id: str) -> None:
|
||
now = int(time.time())
|
||
with sqlite3.connect(DB_PATH) as con:
|
||
con.execute("INSERT OR IGNORE INTO processed_events(event_id, created_at) VALUES(?, ?)", (event_id, now))
|
||
con.commit()
|
||
|
||
|
||
def _log_event(kind: str, payload: Dict[str, Any]) -> None:
|
||
rec = {"ts": int(time.time()), "kind": kind, "payload": payload}
|
||
with EVENTS_LOG.open("a", encoding="utf-8") as f:
|
||
f.write(json.dumps(rec, ensure_ascii=False, default=_decimal_default) + "\n")
|
||
|
||
|
||
def _upsert_license(
|
||
*,
|
||
subscription_id: str,
|
||
customer_id: str,
|
||
status: str,
|
||
lookup_key: str,
|
||
allowed_users: Optional[int],
|
||
devices_per_user: Optional[int],
|
||
customer_email: Optional[str],
|
||
client_reference_id: Optional[str],
|
||
current_period_end: Optional[int],
|
||
license_key: Optional[str] = None,
|
||
) -> str:
|
||
"""Upsert license row. Returns the license_key (generated if not yet set)."""
|
||
now = int(time.time())
|
||
with sqlite3.connect(DB_PATH) as con:
|
||
existing_key = None
|
||
row = con.execute(
|
||
"SELECT license_key FROM licenses WHERE subscription_id = ?",
|
||
(subscription_id,),
|
||
).fetchone()
|
||
if row and row[0]:
|
||
existing_key = row[0]
|
||
|
||
final_key = existing_key or license_key or _generate_license_key()
|
||
|
||
con.execute(
|
||
"""
|
||
INSERT INTO licenses(
|
||
subscription_id, customer_id, status, lookup_key,
|
||
allowed_users, devices_per_user, customer_email, client_reference_id,
|
||
current_period_end, updated_at, license_key
|
||
)
|
||
VALUES(?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?)
|
||
ON CONFLICT(subscription_id) DO UPDATE SET
|
||
customer_id=excluded.customer_id,
|
||
status=excluded.status,
|
||
lookup_key=COALESCE(NULLIF(excluded.lookup_key, ''), lookup_key),
|
||
allowed_users=COALESCE(excluded.allowed_users, allowed_users),
|
||
devices_per_user=COALESCE(excluded.devices_per_user, devices_per_user),
|
||
customer_email=COALESCE(excluded.customer_email, customer_email),
|
||
client_reference_id=COALESCE(excluded.client_reference_id, client_reference_id),
|
||
current_period_end=COALESCE(excluded.current_period_end, current_period_end),
|
||
updated_at=excluded.updated_at,
|
||
license_key=COALESCE(license_key, excluded.license_key)
|
||
""",
|
||
(
|
||
subscription_id,
|
||
customer_id,
|
||
status,
|
||
lookup_key,
|
||
allowed_users,
|
||
devices_per_user,
|
||
customer_email,
|
||
client_reference_id,
|
||
current_period_end,
|
||
now,
|
||
final_key,
|
||
),
|
||
)
|
||
con.commit()
|
||
return final_key
|
||
|
||
|
||
def get_license_key_for_email(email: str) -> Optional[str]:
|
||
"""Returns the license_key for a customer email, or None."""
|
||
_ensure_storage()
|
||
if not email:
|
||
return None
|
||
with sqlite3.connect(DB_PATH) as con:
|
||
row = con.execute(
|
||
"SELECT license_key FROM licenses WHERE lower(customer_email)=? ORDER BY updated_at DESC LIMIT 1",
|
||
(email.strip().lower(),),
|
||
).fetchone()
|
||
return row[0] if row and row[0] else None
|
||
|
||
|
||
@router.get("/license_debug")
|
||
def license_debug(email: str) -> Dict[str, Any]:
|
||
"""
|
||
Debug helper (local only): returns latest license row for a given email.
|
||
"""
|
||
_ensure_storage()
|
||
email = (email or "").strip().lower()
|
||
if not email:
|
||
raise HTTPException(status_code=400, detail="Missing email")
|
||
with sqlite3.connect(DB_PATH) as con:
|
||
con.row_factory = sqlite3.Row
|
||
row = con.execute(
|
||
"""
|
||
SELECT * FROM licenses
|
||
WHERE lower(customer_email)=?
|
||
ORDER BY updated_at DESC
|
||
LIMIT 1
|
||
""",
|
||
(email,),
|
||
).fetchone()
|
||
if not row:
|
||
raise HTTPException(status_code=404, detail="No license for email")
|
||
return dict(row)
|
||
|
||
|
||
@router.post("/test_license_email")
|
||
def test_license_email(email: str) -> Dict[str, Any]:
|
||
"""Admin-Test: sendet die Lizenzschluessel-Mail erneut an eine bestehende E-Mail."""
|
||
_ensure_storage()
|
||
lk = get_license_key_for_email(email)
|
||
if not lk:
|
||
raise HTTPException(status_code=404, detail="Kein Lizenzschluessel fuer diese E-Mail")
|
||
ok = send_license_email(email, lk)
|
||
result: Dict[str, Any] = {"sent": ok, "to": email}
|
||
if not ok:
|
||
host = os.environ.get("SMTP_HOST", "")
|
||
port = os.environ.get("SMTP_PORT", "")
|
||
user = os.environ.get("SMTP_USER", "")
|
||
result["debug"] = f"host={host}, port={port}, user={user}"
|
||
result["error"] = _last_mail_error
|
||
return result
|
||
|
||
|
||
@router.post("/sync_subscription")
|
||
async def sync_subscription(payload: Optional[Dict[str, Any]] = None) -> Dict[str, Any]:
|
||
_require_env()
|
||
_ensure_storage()
|
||
_init_stripe()
|
||
|
||
subscription_id = None
|
||
if payload:
|
||
subscription_id = (payload.get("subscription_id") or "").strip() or None
|
||
|
||
if not subscription_id:
|
||
with sqlite3.connect(DB_PATH) as con:
|
||
row = con.execute(
|
||
"""
|
||
SELECT subscription_id
|
||
FROM licenses
|
||
ORDER BY updated_at DESC
|
||
LIMIT 1
|
||
"""
|
||
).fetchone()
|
||
if not row or not row[0]:
|
||
raise HTTPException(status_code=404, detail="No license found")
|
||
subscription_id = str(row[0])
|
||
|
||
sub = _stripe_to_dict(stripe.Subscription.retrieve(subscription_id))
|
||
status = (sub.get("status") or "").strip()
|
||
if status == "active" and sub.get("cancel_at_period_end"):
|
||
status = "canceled"
|
||
current_period_end = sub.get("current_period_end")
|
||
|
||
if not current_period_end:
|
||
try:
|
||
current_period_end = sub["items"]["data"][0]["current_period_end"]
|
||
except Exception:
|
||
current_period_end = None
|
||
|
||
now = int(time.time())
|
||
with sqlite3.connect(DB_PATH) as con:
|
||
con.execute(
|
||
"""
|
||
UPDATE licenses
|
||
SET status=?, current_period_end=?, updated_at=?
|
||
WHERE subscription_id=?
|
||
""",
|
||
(status, current_period_end, now, subscription_id),
|
||
)
|
||
con.commit()
|
||
|
||
return {
|
||
"subscription_id": subscription_id,
|
||
"status": status,
|
||
"current_period_end": current_period_end,
|
||
}
|
||
|
||
|
||
# Route is "/webhook" here because main.py mounts this router at prefix="/stripe".
|
||
@router.post("/webhook")
|
||
async def stripe_webhook(
|
||
request: Request,
|
||
stripe_signature: Optional[str] = Header(default=None, alias="Stripe-Signature"),
|
||
) -> JSONResponse:
|
||
_require_env()
|
||
_ensure_storage()
|
||
_init_stripe()
|
||
|
||
if not stripe_signature:
|
||
raise HTTPException(status_code=400, detail="Missing Stripe-Signature header")
|
||
|
||
body = await request.body()
|
||
try:
|
||
stripe.Webhook.construct_event(payload=body, sig_header=stripe_signature, secret=STRIPE_WEBHOOK_SECRET)
|
||
except Exception as e:
|
||
raise HTTPException(status_code=400, detail=f"Webhook signature verification failed: {e}")
|
||
|
||
# Parse as plain dict – do not use the StripeObject returned by construct_event.
|
||
event = json.loads(body)
|
||
event_id = event.get("id", "")
|
||
etype = event.get("type")
|
||
|
||
_log_event("webhook_received", {"event_id": event_id, "type": etype})
|
||
|
||
if event_id and _already_processed(event_id):
|
||
_log_event("webhook_duplicate", {"event_id": event_id, "type": etype})
|
||
return JSONResponse({"ok": True, "duplicate": True})
|
||
|
||
obj = (event.get("data") or {}).get("object") or {}
|
||
|
||
try:
|
||
if etype == "checkout.session.completed":
|
||
subscription_id = obj.get("subscription")
|
||
customer_id = obj.get("customer")
|
||
client_reference_id = obj.get("client_reference_id")
|
||
|
||
_log_event("checkout_entered", {
|
||
"event_id": event_id,
|
||
"subscription_id": subscription_id,
|
||
"customer_id": customer_id,
|
||
})
|
||
|
||
if not subscription_id or not customer_id:
|
||
_log_event("license_skip", {
|
||
"event_id": event_id,
|
||
"reason": "missing_subscription_or_customer",
|
||
"subscription_id": subscription_id,
|
||
"customer_id": customer_id,
|
||
})
|
||
else:
|
||
# customer_email: cascade through all known locations.
|
||
customer_email = (
|
||
obj.get("customer_email")
|
||
or (obj.get("customer_details") or {}).get("email")
|
||
)
|
||
if not customer_email and customer_id:
|
||
try:
|
||
cust = _stripe_to_dict(stripe.Customer.retrieve(customer_id))
|
||
customer_email = cust.get("email")
|
||
except Exception:
|
||
pass
|
||
customer_email = (customer_email or "").strip() or None
|
||
|
||
sub = _stripe_to_dict(stripe.Subscription.retrieve(subscription_id, expand=["items.data.price"]))
|
||
status = sub.get("status", "") or ""
|
||
current_period_end = sub.get("current_period_end")
|
||
if not current_period_end:
|
||
try:
|
||
current_period_end = sub["items"]["data"][0]["current_period_end"]
|
||
except Exception:
|
||
current_period_end = None
|
||
md = sub.get("metadata") or {}
|
||
lookup_key = (md.get("lookup_key") or "").strip()
|
||
allowed_users = md.get("allowed_users")
|
||
devices_per_user = md.get("devices_per_user")
|
||
|
||
if not lookup_key:
|
||
try:
|
||
price = sub["items"]["data"][0]["price"]
|
||
lookup_key = _lookup_key_from_price(price)
|
||
except Exception:
|
||
lookup_key = ""
|
||
|
||
def _to_int(x: Any) -> Optional[int]:
|
||
try:
|
||
return int(x)
|
||
except Exception:
|
||
return None
|
||
|
||
if lookup_key and not allowed_users:
|
||
policy = _policy_for_lookup_key(lookup_key)
|
||
allowed_users = allowed_users or str(policy.allowed_users)
|
||
devices_per_user = devices_per_user or str(policy.devices_per_user)
|
||
|
||
if not lookup_key:
|
||
_log_event("license_skip", {
|
||
"event_id": event_id,
|
||
"reason": "missing_lookup_key",
|
||
"subscription_id": subscription_id,
|
||
})
|
||
|
||
generated_key = _upsert_license(
|
||
subscription_id=subscription_id,
|
||
customer_id=customer_id,
|
||
status=status,
|
||
lookup_key=lookup_key,
|
||
allowed_users=_to_int(allowed_users),
|
||
devices_per_user=_to_int(devices_per_user),
|
||
customer_email=customer_email,
|
||
client_reference_id=(client_reference_id or "").strip() or None,
|
||
current_period_end=_to_int(current_period_end),
|
||
)
|
||
_log_event("license_upsert", {
|
||
"event_id": event_id,
|
||
"etype": etype,
|
||
"subscription_id": subscription_id,
|
||
"status": status,
|
||
"lookup_key": lookup_key,
|
||
"email": customer_email,
|
||
"client_reference_id": client_reference_id,
|
||
"license_key": generated_key,
|
||
})
|
||
|
||
if customer_email and generated_key:
|
||
try:
|
||
send_license_email(customer_email, generated_key)
|
||
except Exception as mail_exc:
|
||
_log_event("license_email_failed", {
|
||
"event_id": event_id,
|
||
"email": customer_email,
|
||
"error": str(mail_exc),
|
||
})
|
||
|
||
elif etype in ("customer.subscription.updated", "customer.subscription.deleted"):
|
||
subscription_id = obj.get("id")
|
||
customer_id = obj.get("customer")
|
||
status = obj.get("status", "") or ("canceled" if etype.endswith("deleted") else "")
|
||
if status == "active" and obj.get("cancel_at_period_end"):
|
||
status = "canceled"
|
||
current_period_end = obj.get("current_period_end")
|
||
if not current_period_end:
|
||
try:
|
||
items_data = (obj.get("items") or {}).get("data") or []
|
||
if items_data:
|
||
current_period_end = items_data[0].get("current_period_end")
|
||
except Exception:
|
||
current_period_end = None
|
||
md = obj.get("metadata") or {}
|
||
lookup_key = (md.get("lookup_key") or "").strip()
|
||
allowed_users = md.get("allowed_users")
|
||
devices_per_user = md.get("devices_per_user")
|
||
|
||
if not lookup_key:
|
||
try:
|
||
items = obj.get("items") or {}
|
||
data = items.get("data") or []
|
||
if data:
|
||
price = data[0].get("price") or {}
|
||
lookup_key = _lookup_key_from_price(price)
|
||
except Exception:
|
||
lookup_key = ""
|
||
|
||
def _to_int(x: Any) -> Optional[int]:
|
||
try:
|
||
return int(x)
|
||
except Exception:
|
||
return None
|
||
|
||
if not subscription_id or not customer_id:
|
||
_log_event("license_skip", {
|
||
"event_id": event_id,
|
||
"reason": "missing_subscription_or_customer",
|
||
"etype": etype,
|
||
})
|
||
else:
|
||
_upsert_license(
|
||
subscription_id=subscription_id,
|
||
customer_id=customer_id,
|
||
status=status,
|
||
lookup_key=lookup_key,
|
||
allowed_users=_to_int(allowed_users),
|
||
devices_per_user=_to_int(devices_per_user),
|
||
customer_email=None,
|
||
client_reference_id=None,
|
||
current_period_end=_to_int(current_period_end),
|
||
)
|
||
_log_event("license_upsert", {
|
||
"event_id": event_id,
|
||
"etype": etype,
|
||
"subscription_id": subscription_id,
|
||
"status": status,
|
||
"lookup_key": lookup_key,
|
||
})
|
||
|
||
else:
|
||
_log_event("stripe_event_ignored", {"event_id": event_id, "type": etype})
|
||
|
||
# Only mark as processed AFTER successful handling.
|
||
# Failed events stay unmarked so Stripe can retry them.
|
||
if event_id:
|
||
_mark_processed(event_id)
|
||
except Exception as e:
|
||
_log_event("license_error", {"event_id": event_id, "etype": etype, "error": str(e)})
|
||
|
||
return JSONResponse({"ok": True})
|
||
|