public Issue(IssueResponse resultItem) : this(resultItem.id) { Url = resultItem.self; Key = resultItem.key; // main fields CreatedDate = resultItem.fields.created; ResolutionDate = resultItem.fields.resolutiondate; Summary = resultItem.fields.summary; if (resultItem.fields.assignee != null) { Assignee = new User(Converter.Unpack <IssueResponse.JiraUser>(resultItem.fields.assignee)); } IssueType = new IssueType(Converter.Unpack <IssueResponse.Issuetype>(resultItem.fields.issuetype)); Project = new Project(Converter.Unpack <IssueResponse.Project>(resultItem.fields.project)); Status = new Status(Converter.Unpack <IssueResponse.Status>(resultItem.fields.status)); if (resultItem.fields.priority != null) { Priority = new Priority(Converter.Unpack <IssueResponse.Priority>(resultItem.fields.priority)); } // all the stuffs IDictionary <string, JToken> obj = (IDictionary <string, JToken>)resultItem.fields; CustomFields = obj.ToDictionary(pair => pair.Key, pair => pair.Value as object); }
/// <summary> /// Acquires Holder of Key Token by Username and Password. /// HoK token issuance requires Clients to /// 1. Sign AcquireToken Request with the private key of their Signing Certificate /// 2. To present the public key of the Signing Certificate to the Authorization Server in the AcquireToken Request /// 3. Authorization Server validate the request signature is signed with the private key of the presented public key /// This way Authorization Server ensures request is not modified and the client has the private key corresponding the public key. /// HoK tokens are valid for longer period of time compared to the bearer tokens. /// HoK tokens can be used to acquire baerer tokens on behalf of the subject. This way servers /// can keep HoK and issue Bearer Tokens with which to present the Subject to other services. /// 4. HoK token can be delegetable to delegate authorization to other services to act on behalf of the subject. /// User authorizes one service to act on his behalf against another server /// </summary> /// <param name="username"></param> /// <param name="password"></param> /// <param name="signingCertitificate">The Signing Certificate of the client that will be used to sign the request and present the public key to the Authorization Server</param> /// <param name="actAsSamlToken">Act As Saml token</param> /// <returns>Raw XML representation of the SAML 2.0 HoK Token</returns> public XmlElement IssueActAsHoKTokenByUserCredential( string username, SecureString password, X509Certificate2 signingCertitificate, XmlElement actAsSamlToken) { if (username == null) { throw new ArgumentNullException("username"); } // SAML Token Request var securityTokenRequest = new RequestSecurityTokenType { RequestType = @"http://docs.oasis-open.org/ws-sx/ws-trust/200512/Issue", TokenType = "urn:oasis:names:tc:SAML:2.0:assertion", KeyType = "http://docs.oasis-open.org/ws-sx/ws-trust/200512/PublicKey", ActAs = actAsSamlToken, DelegatableSpecified = true, Delegatable = true, Renewing = new RenewingType { AllowSpecified = true, Allow = true, OKSpecified = true, OK = true }, SignatureAlgorithm = "http://www.w3.org/2001/04/xmldsig-more#rsa-sha512" }; // Security Token Request Authorization Header var securityContext = new WsSecurityContext { ClientChannel = _stsServiceClient.InnerChannel, Properties = { Credentials = { User = username, Password = password, // Certificate which will be used by the Authorization Server to validate the signature of the request ClientCertificate = signingCertitificate }, // This Key will be used to sign the request SigningKey = signingCertitificate.PrivateKey } }; // Request Authorization Server to Issue HoK Token IssueResponse response = securityContext.InvokeOperation(() => _stsServiceClient.IssueAsync(securityTokenRequest).Result); // Extract the Raw XML Token from the Authorizations Server's Response return((XmlElement) response. RequestSecurityTokenResponseCollection. RequestSecurityTokenResponse. Items[0]); }
public async Task <IssueResponse> HandleAsync(GetIssue query) { var issue = await issueRepository.GetAsync(query.IssueId); var issueType = IssueHelpers.GetIssueType(issue); var usersNames = await userSearcher.GetUsers(issue.Comments.Select(x => x.MemberId).ToList()); var issueResponse = new IssueResponse(issue.Id, issue.ProjectId, issue.SprintId, issueType, issue.Title, issue.Description, issue.Status, issue.Reporter.Id, issue.Reporter.GetFullName(), issue.Reporter.Email, issue.Assignee?.Id, issue.Comments.Select(x => new CommentResponse(x.MemberId, usersNames[x.MemberId], x.Content, x.AddedAt)).ToList(), issue.Labels.Select(x => new LabelResponse(x.Id, x.Name, x.Description)).ToList(), issue.Version); var linkedIssues = new List <LinkedIssue>(); if (issue is Storage.Models.Task) { var issues = await issueSearcher.GetIssuesRelatedToTask(issue.Id); linkedIssues = issues.Select(x => new LinkedIssue(x.Id, x.Title, IssueHelpers.GetIssueType(x))).ToList(); } else if (issue is Storage.Models.Nfr) { var issues = await issueSearcher.GetIssuesRelatedToNfr(issue.Id); linkedIssues = issues.Select(x => new LinkedIssue(x.Id, x.Title, IssueHelpers.GetIssueType(x))).ToList(); } else if (issue is Storage.Models.Subtask) { var parentIssue = await issueSearcher.GetParentIssueToSubtask(issue.Id); issueResponse.SetLinkedTo(parentIssue.Id, parentIssue.Title, IssueType.Task); } else { var parentIssue = await issueSearcher.GetParentIssueToBug(issue.Id); if (parentIssue != null) { issueResponse.SetLinkedTo(parentIssue.Id, parentIssue.Title, IssueHelpers.GetIssueType(parentIssue)); } } if (linkedIssues.Count != 0) { issueResponse.SetLinkedIssues(linkedIssues); } return(issueResponse); }
/// <summary> /// Acquires Bearer Token by Username and Password. /// Bearer Token is short lived token that can be presented to the resource server /// to authorize the request to access the resource. Typically used by /// clients to authorize their requests to the server. /// </summary> /// <param name="username"></param> /// <param name="password"></param> /// <returns>Raw XML representation of the SAML 2.0 Bearer Token</returns> public XmlElement IssueBearerTokenByUserCredential( string username, SecureString password) { if (username == null) { throw new ArgumentNullException("username"); } if (password == null) { throw new ArgumentNullException("password"); } // SAML Token Request var securityTokenRequest = new RequestSecurityTokenType { RequestType = @"http://docs.oasis-open.org/ws-sx/ws-trust/200512/Issue", TokenType = "urn:oasis:names:tc:SAML:2.0:assertion", KeyType = "http://docs.oasis-open.org/ws-sx/ws-trust/200512/Bearer", Lifetime = null, Delegatable = true, DelegatableSpecified = true }; // Security Token Request Authorization Header var securityContext = new WsSecurityContext { ClientChannel = _stsServiceClient.InnerChannel, Properties = { Credentials = { User = username, Password = password } } }; // Request Authorization Server to Issue Bearer Token IssueResponse response = securityContext.InvokeOperation(() => _stsServiceClient.IssueAsync(securityTokenRequest).Result); // Extract the Raw XML Token from the Authorizations Server's Response return((XmlElement) response. RequestSecurityTokenResponseCollection. RequestSecurityTokenResponse. Items[0]); }
public IssueResponse RegisterIssue(IssueData issueData) { var data = issueData.ToIssueData(); var jsonFormatter = new JsonMediaTypeFormatter(); var content = new ObjectContent <RegisterIssueRequest>(data, jsonFormatter); var x = ExecuteQuery <RegisterIssueRequest, RegisterIssueResponse>(content, "issue", "register"); var response = new IssueResponse { IssueTypeTicket = x.IssueTypeTicket, IssueInstanceTicket = x.IssueInstanceTicket, IsOfficial = x.IsOfficial, ResponseMessage = x.ResponseMessage, }; return(response); }
protected void Page_Load(object sender, EventArgs e) { /** * "임시저장" 또는 "(역)발행대기" 상태의 세금계산서를 발행(전자서명)하며, "발행완료" 상태로 처리합니다. * - "발행완료"된 전자세금계산서는 국세청 전송 이전에 (CancelIssue API)함수로 국세청 신고 대상에서 제외할 수 있습니다. * - 세금계산서 국세청 전송 정책 : https://docs.popbill.com/taxinvoice/ntsSendPolicy?lang=dotnet * - https://docs.popbill.com/taxinvoice/dotnet/api#TIIssue */ // 팝빌회원 사업자번호, '-' 제외 10자리 String testCorpNum = "1234567890"; // 팝빌회원 아이디 String testUserID = "testkorea"; // 세금계산서 발행유형, SELL-매출, BUY-매입, TRUSTEE-위수탁 MgtKeyType KeyType = MgtKeyType.SELL; // 세금계산서 문서번호 String mgtKey = "20220525-20220501"; // 메모 String memo = "발행메모"; // 지연발행 강제여부, 기본값 - False // 발행마감일이 지난 세금계산서를 발행하는 경우, 가산세가 부과될 수 있습니다. // 지연발행 세금계산서를 신고해야 하는 경우 forceIssue 값을 True로 선언하여 발행(Issue API)을 호출할 수 있습니다. bool forceIssue = false; try { IssueResponse response = Global.taxinvoiceService.Issue(testCorpNum, KeyType, mgtKey, memo, forceIssue, testUserID); code = response.code.ToString(); message = response.message; ntsConfirmNum = response.ntsConfirmNum; } catch (PopbillException ex) { code = ex.code.ToString(); message = ex.Message; } }
/// <summary> /// Acquires Bearer Token by HoK Token. /// This is the use-case of server that holds HoK token to issue bearer token and /// use them to authorize requests to other services. /// </summary> /// <param name="hokToken"></param> /// <param name="signingCertitificate"></param> /// <returns></returns> public XmlElement IssueBearerTokenByHoKToken( XmlElement hokToken, X509Certificate2 signingCertitificate) { if (hokToken == null) { throw new ArgumentNullException("hokToken"); } // SAML Token Request var securityTokenRequest = new RequestSecurityTokenType { RequestType = @"http://docs.oasis-open.org/ws-sx/ws-trust/200512/Issue", TokenType = "urn:oasis:names:tc:SAML:2.0:assertion", KeyType = "http://docs.oasis-open.org/ws-sx/ws-trust/200512/Bearer", Lifetime = null, Delegatable = true, DelegatableSpecified = true }; // Security Token Request Authorization Header var securityContext = new WsSecurityContext { ClientChannel = _stsServiceClient.InnerChannel, Properties = { Credentials = { HolderOfKeyToken = hokToken }, SigningKey = signingCertitificate.PrivateKey } }; // Request Authorization Server to Issue HoK Token IssueResponse response = securityContext.InvokeOperation(() => _stsServiceClient.IssueAsync(securityTokenRequest).Result); // Extract the Raw XML Token from the Authorizations Server's Response return((XmlElement) response. RequestSecurityTokenResponseCollection. RequestSecurityTokenResponse. Items[0]); }
private static T ConvertToBacklogItem <T>(IssueResponse issue, IList <UserReference> userReferences, Action <T> settingExtraFields) where T : BacklogItemAddUpdRequestBase, new() { var dto = new T { Title = issue.Title }; if (issue.Labels?.Any() == true) { dto.Tags = issue.Labels.Select(l => l.Name).ToArray(); } if (userReferences.Any()) { dto.AssigneeId = userReferences.OrderBy(x => Guid.NewGuid()).First().Id; } settingExtraFields.Invoke(dto); return(dto); }
/// <summary> /// Acquires Holder of Key Token by Certificate. /// HoK token issuance requires Clients to /// 1. Sign AcquireToken Request with the private key of their Signing Certificate /// 2. To present the public key of the Signing Certificate to the Authorization Server in the AcquireToken Request /// 3. Authorization Server validate the request signature is signed with the private key of the presented public key /// This way Authorization Server ensures request is not modified and the client has the private key corresponding the public key. /// HoK tokens are valid for longer period of time compared to the bearer tokens. /// HoK tokens can be used to acquire bearer tokens on behalf of the subject. This way servers /// can keep HoK and issue Bearer Tokens with which to present the Subject to other services. /// 4. HoK token can be delegatable to delegate authorization to other services to act on behalf of the subject. /// User authorizes one service to act on his behalf against another server /// </summary> /// <param name="signingCertitificate">Solution user certificate</param> /// <param name="lifetimeSpan"></param> /// <returns>Raw XML representation of the SAML 2.0 HoK Token</returns> public XmlElement IssueHoKTokenByCertificate( X509Certificate2 signingCertitificate, TimeSpan?lifetimeSpan = null) { // SAML Token Request var securityTokenRequest = new RequestSecurityTokenType { RequestType = @"http://docs.oasis-open.org/ws-sx/ws-trust/200512/Issue", TokenType = "urn:oasis:names:tc:SAML:2.0:assertion", KeyType = "http://docs.oasis-open.org/ws-sx/ws-trust/200512/PublicKey", Lifetime = GetLifetime(lifetimeSpan), DelegatableSpecified = true, Delegatable = true, SignatureAlgorithm = "http://www.w3.org/2001/04/xmldsig-more#rsa-sha512" }; // Security Token Request Authorization Header var securityContext = new WsSecurityContext { ClientChannel = _stsServiceClient.InnerChannel, Properties = { Credentials = { // Certificate which will be used by the Authorization Server to validate the signature of the request ClientCertificate = signingCertitificate }, // This Key will be used to sign the request SigningKey = signingCertitificate.PrivateKey } }; // Request Authorization Server to Issue HoK Token IssueResponse response = securityContext.InvokeOperation(() => _stsServiceClient.IssueAsync(securityTokenRequest).Result); // Extract the Raw XML Token from the Authorizations Server's Response return((XmlElement) response. RequestSecurityTokenResponseCollection. RequestSecurityTokenResponse. Items[0]); }
public async Task LoadIssue() { var response = await mainWindow.CommandQueryDispatcher.SendAsync <IssueResponse>($"api/project-management/projects/{projectId}/issues/{issueId}"); if (response.StatusCode != System.Net.HttpStatusCode.OK) { MessageBox.Show($"Cannot load issue. Http operation status code: {response.StatusCode}"); mainWindow.MainFrame.Content = previousPage; return; } issueResponse = response.ResponseContent; TitleTextBlock.Text = issueResponse.Title; DescriptionTextBlock.Text = issueResponse.Description; Status.Text = issueResponse.Status.ToString(); Reporter.Text = issueResponse.ReporterFullName; Comments.ItemsSource = issueResponse.Comments; switch (issueResponse.Status) { case Contracts.Issue.Enums.IssueStatus.Todo: MoveToDoneButton.IsEnabled = false; MoveToInProgressButton.IsEnabled = true; break; case Contracts.Issue.Enums.IssueStatus.InProgress: MoveToDoneButton.IsEnabled = true; MoveToInProgressButton.IsEnabled = false; break; case Contracts.Issue.Enums.IssueStatus.Done: MoveToDoneButton.IsEnabled = false; MoveToInProgressButton.IsEnabled = false; Assignee.IsEnabled = false; Sprint.IsEnabled = false; break; } }
/// <summary> /// /// </summary> /// <param name="hokToken"></param> /// <param name="signingCertificate"></param> /// <returns></returns> public XmlElement IssueHoKTokenByHoKToken( XmlElement hokToken, X509Certificate2 signingCertificate) { if (hokToken == null) { throw new ArgumentNullException("hokToken"); } var securityTokenRequest = new RequestSecurityTokenType { RequestType = @"http://docs.oasis-open.org/ws-sx/ws-trust/200512/Issue", TokenType = "urn:oasis:names:tc:SAML:2.0:assertion", KeyType = "http://docs.oasis-open.org/ws-sx/ws-trust/200512/PublicKey", SignatureAlgorithm = "http://www.w3.org/2001/04/xmldsig-more#rsa-sha512", DelegatableSpecified = true, Delegatable = true }; var securityContext = new WsSecurityContext { ClientChannel = _stsServiceClient.InnerChannel, Properties = { Credentials = { HolderOfKeyToken = hokToken }, SigningKey = signingCertificate.PrivateKey } }; IssueResponse response = securityContext.InvokeOperation(() => _stsServiceClient.IssueAsync(securityTokenRequest).Result); return((XmlElement) response. RequestSecurityTokenResponseCollection. RequestSecurityTokenResponse. Items[0]); }
public RegisterCompleteEventArgs(bool isServerOnline, IssueResponse issueResponse, OriginalData originalData) { _isServerOnline = isServerOnline; _issueResponse = issueResponse; _originalData = originalData; }
public static Issue ToIssue(IssueResponse input) { return(new Issue(input)); }
//public static extern int NativeExecuteQueryAsync(byte [] query, byte [] options, IntPtr QpEnv, IssueResponse issueResponse); public static extern int NativeExecuteQueryAsync([MarshalAs(UnmanagedType.LPWStr)] string pQuery, IntPtr QpEnv, IssueResponse issueResponse);
/// <summary> /// Acquires delegate to HoK token by another solution HoK token. /// This method issues Token delegated to /// service with id <param name="delegateToServiceId"></param> which is registered in the /// SSO with solution user <param name="delegateToSolutionUser"></param> /// https://wiki.eng.vmware.com/SSO/UseCases#Executing_tasks_on_behalf_of_an_user_.28delegation.29 /// </summary> /// <param name="hokToken"></param> /// <param name="signingCertitificate"></param> /// <param name="delegateToServiceId"></param> /// <param name="delegateToSolutionUser"></param> /// <param name="renewableOk">True to allow token to be renewed after it has expired. Default is false, it is recommended to remain with default value.</param> /// <returns>Raw XML representation of the SAML 2.0 DelegateTo token</returns> public XmlElement IssueDelegateToHoKTokenBySolutionHoK( XmlElement hokToken, X509Certificate2 signingCertificate, string delegateToServiceId, string delegateToSolutionUser, TimeSpan?lifetime = null, bool?renewable = null, bool renewableOk = false) { // SAML Token Request var securityTokenRequest = new RequestSecurityTokenType { RequestType = @"http://docs.oasis-open.org/ws-sx/ws-trust/200512/Issue", TokenType = "urn:oasis:names:tc:SAML:2.0:assertion", KeyType = "http://docs.oasis-open.org/ws-sx/ws-trust/200512/PublicKey", Lifetime = GetLifetime(lifetime), DelegateTo = new DelegateToType { UsernameToken = new UsernameTokenType { Id = $"Id-{Guid.NewGuid().ToString()}", Username = new AttributedString { Id = $"Id-{delegateToServiceId}", Value = delegateToSolutionUser } }, }, DelegatableSpecified = true, Delegatable = true, SignatureAlgorithm = "http://www.w3.org/2001/04/xmldsig-more#rsa-sha512" }; if (renewable != null) { securityTokenRequest.Renewing = new RenewingType { Allow = renewable.Value, AllowSpecified = true, OK = renewableOk, OKSpecified = true, }; } // Security Token Request Authorization Header var securityContext = new WsSecurityContext { ClientChannel = _stsServiceClient.InnerChannel, Properties = { Credentials = { HolderOfKeyToken = hokToken }, SigningKey = signingCertificate.PrivateKey } }; // Request Authorization Server to Issue HoK Token IssueResponse response = securityContext.InvokeOperation(() => _stsServiceClient.IssueAsync(securityTokenRequest).Result); // Extract the Raw XML Token from the Authorizations Server's Response return((XmlElement) response. RequestSecurityTokenResponseCollection. RequestSecurityTokenResponse. Items[0]); }
protected void Page_Load(object sender, EventArgs e) { /** * 작성된 세금계산서 데이터를 팝빌에 저장과 동시에 발행(전자서명)하여 "발행완료" 상태로 처리합니다. * - 세금계산서 국세청 전송 정책 [https://docs.popbill.com/taxinvoice/ntsSendPolicy?lang=dotnet] * - "발행완료"된 전자세금계산서는 국세청 전송 이전에 발행취소(CancelIssue API) 함수로 국세청 신고 대상에서 제외할 수 있습니다. * - 임시저장(Register API) 함수와 발행(Issue API) 함수를 한 번의 프로세스로 처리합니다. * - 세금계산서 발행을 위해서 공급자의 인증서가 팝빌 인증서버에 사전등록 되어야 합니다. * └ 위수탁발행의 경우, 수탁자의 인증서 등록이 필요합니다. * - https://docs.popbill.com/taxinvoice/dotnet/api#RegistIssue */ // 팝빌회원 사업자번호, '-' 제외 10자리 String testCorpNum = "1234567890"; // 팝빌회원 아이디 String userID = "testkorea"; // 세금계산서 문서번호, 최대 24자리, 영문, 숫자 '-', '_'를 조합하여 사업자별로 중복되지 않도록 구성 String mgtKey = "20220525-001"; // 세금계산서 정보 객체 Taxinvoice taxinvoice = new Taxinvoice(); // 기재상 작성일자, 날자형식(yyyyMMdd) taxinvoice.writeDate = "20220525"; // 과금방향, {정과금, 역과금}중 선택 // - 정과금(공급자과금), 역과금(공급받는자과금) // - 역과금은 역발행 세금계산서를 발행하는 경우만 가능 taxinvoice.chargeDirection = "정과금"; // 발행형태, {정발행, 역발행, 위수탁} 중 기재 taxinvoice.issueType = "정발행"; // {영수, 청구} 중 기재 taxinvoice.purposeType = "영수"; // 과세형태, {과세, 영세, 면세} 중 기재 taxinvoice.taxType = "과세"; /***************************************************************** * 공급자 정보 * *****************************************************************/ // 공급자 사업자번호, '-' 제외 10자리 taxinvoice.invoicerCorpNum = testCorpNum; // 공급자 종사업장 식별번호. 필요시 기재. 형식은 숫자 4자리. taxinvoice.invoicerTaxRegID = ""; // 공급자 상호 taxinvoice.invoicerCorpName = "공급자 상호"; // 공급자 문서번호, 최대 24자리, 영문, 숫자 '-', '_'를 조합하여 사업자별로 중복되지 않도록 구성 taxinvoice.invoicerMgtKey = mgtKey; // 공급자 대표자 성명 taxinvoice.invoicerCEOName = "공급자 대표자 성명"; // 공급자 주소 taxinvoice.invoicerAddr = "공급자 주소"; // 공급자 종목 taxinvoice.invoicerBizClass = "공급자 종목"; // 공급자 업태 taxinvoice.invoicerBizType = "공급자 업태,업태2"; // 공급자 담당자 성명 taxinvoice.invoicerContactName = "공급자 담당자명"; // 공급자 담당자 메일주소 taxinvoice.invoicerEmail = ""; // 공급자 담당자 연락처 taxinvoice.invoicerTEL = ""; // 공급자 담당자 휴대폰번호 taxinvoice.invoicerHP = ""; // 발행 안내 문자 전송여부 (true / false 중 택 1) // └ true = 전송 , false = 미전송 // └ 공급받는자 (주)담당자 휴대폰번호 {invoiceeHP1} 값으로 문자 전송 // - 전송 시 포인트 차감되며, 전송실패시 환불처리 taxinvoice.invoicerSMSSendYN = false; /********************************************************************* * 공급받는자 정보 * *********************************************************************/ // 공급받는자 구분, {사업자, 개인, 외국인} 중 기재 taxinvoice.invoiceeType = "사업자"; // 공급받는자 사업자번호 // - {invoiceeType}이 "사업자" 인 경우, 사업자번호 (하이픈 ('-') 제외 10자리) // - {invoiceeType}이 "개인" 인 경우, 주민등록번호 (하이픈 ('-') 제외 13자리) // - {invoiceeType}이 "외국인" 인 경우, "9999999999999" (하이픈 ('-') 제외 13자리) taxinvoice.invoiceeCorpNum = "8888888888"; // 공급받는자 상호 taxinvoice.invoiceeCorpName = "공급받는자 상호"; // [역발행시 필수] 공급받는자 문서번호, 최대 24자리, 영문, 숫자 '-', '_'를 조합하여 사업자별로 중복되지 않도록 구성 taxinvoice.invoiceeMgtKey = ""; // 공급받는자 대표자 성명 taxinvoice.invoiceeCEOName = "공급받는자 대표자 성명"; // 공급받는자 주소 taxinvoice.invoiceeAddr = "공급받는자 주소"; // 공급받는자 종목 taxinvoice.invoiceeBizClass = "공급받는자 종목"; // 공급받는자 업태 taxinvoice.invoiceeBizType = "공급받는자 업태"; // 공급받는자 담당자 연락처 taxinvoice.invoiceeTEL1 = ""; // 공급받는자 담당자명 taxinvoice.invoiceeContactName1 = "공급받는자 담당자명"; // 공급받는자 담당자 메일주소 // 팝빌 개발환경에서 테스트하는 경우에도 안내 메일이 전송되므로, // 실제 거래처의 메일주소가 기재되지 않도록 주의 taxinvoice.invoiceeEmail1 = ""; // 공급받는자 담당자 휴대폰번호 taxinvoice.invoiceeHP1 = ""; // 역발행시 알림문자 전송여부 taxinvoice.invoiceeSMSSendYN = false; /********************************************************************* * 세금계산서 정보 * *********************************************************************/ // 공급가액 합계 taxinvoice.supplyCostTotal = "100000"; // 세액 합계 taxinvoice.taxTotal = "10000"; // 합계금액, 공급가액 합계 + 세액 합계 taxinvoice.totalAmount = "110000"; // 기재상 일련번호 항목 taxinvoice.serialNum = "123"; // 기재상 현금 항목 taxinvoice.cash = ""; // 기재상 수표 항목 taxinvoice.chkBill = ""; // 기재상 어음 항목 taxinvoice.note = ""; // 기재상 외상미수금 항목 taxinvoice.credit = ""; // 비고 // {invoiceeType}이 "외국인" 이면 remark1 필수 // - 외국인 등록번호 또는 여권번호 입력 taxinvoice.remark1 = "비고1"; taxinvoice.remark2 = "비고2"; taxinvoice.remark3 = "비고3"; // 기재상 권 항목, 최대값 32767 // 미기재시 taxinvoice.kwon = null; taxinvoice.kwon = 1; // 기재상 호 항목, 최대값 32767 // 미기재시 taxinvoice.ho = null; taxinvoice.ho = 1; // 사업자등록증 이미지 첨부여부 (true / false 중 택 1) // └ true = 첨부 , false = 미첨부(기본값) // - 팝빌 사이트 또는 인감 및 첨부문서 등록 팝업 URL (GetSealURL API) 함수를 이용하여 등록 taxinvoice.businessLicenseYN = false; // 통장사본 이미지 첨부여부 (true / false 중 택 1) // └ true = 첨부 , false = 미첨부(기본값) // - 팝빌 사이트 또는 인감 및 첨부문서 등록 팝업 URL (GetSealURL API) 함수를 이용하여 등록 taxinvoice.bankBookYN = false; /************************************************************************** * 수정세금계산서 정보 (수정세금계산서 작성시에만 기재 * - 수정세금계산서 관련 정보는 연동매뉴얼 또는 개발가이드 링크 참조 * - [참고] 수정세금계산서 작성방법 안내 - https://docs.popbill.com/taxinvoice/modify?lang=dotnet *************************************************************************/ // 수정사유코드, 1~6까지 선택기재. taxinvoice.modifyCode = null; // 수정세금계산서 작성시 원본세금계산서의 국세청승인번호 기재 taxinvoice.orgNTSConfirmNum = ""; /************************************************************************** * 상세항목(품목) 정보 * * - 상세항목 정보는 세금계산서 필수기재사항이 아니므로 작성하지 않더라도 * * 세금계산서 발행이 가능합니다. * * - 최대 99건까지 작성가능 * **************************************************************************/ taxinvoice.detailList = new List <TaxinvoiceDetail>(); TaxinvoiceDetail detail = new TaxinvoiceDetail(); detail.serialNum = 1; // 일련번호, 1부터 순차기재 detail.purchaseDT = "20220525"; // 거래일자 detail.itemName = "품목명"; // 품목명 detail.spec = "규격"; // 규격 detail.qty = "1"; // 수량 detail.unitCost = "50000"; // 단가 detail.supplyCost = "50000"; // 공급가액 detail.tax = "5000"; // 세액 detail.remark = "품목비고"; // 비고 taxinvoice.detailList.Add(detail); detail = new TaxinvoiceDetail(); detail.serialNum = 2; // 일련번호, 1부터 순차기재 detail.purchaseDT = "20220525"; // 거래일자 detail.itemName = "품목명"; // 품목명 detail.spec = "규격"; // 규격 detail.qty = "1"; // 수량 detail.unitCost = "50000"; // 단가 detail.supplyCost = "50000"; // 공급가액 detail.tax = "5000"; // 세액 detail.remark = "품목비고"; // 비고 taxinvoice.detailList.Add(detail); /************************************************************************* * 추가담당자 정보 * * - 세금계산서 발행안내 메일을 수신받을 공급받는자 담당자가 다수인 경우 * * 담당자 정보를 추가하여 발행안내메일을 다수에게 전송할 수 있습니다. * * - 최대 5개까지 기재가능 * *************************************************************************/ taxinvoice.addContactList = new List <TaxinvoiceAddContact>(); TaxinvoiceAddContact addContact = new TaxinvoiceAddContact(); addContact.serialNum = 1; // 일련번호, 1부터 순차기재 addContact.email = ""; // 추가담당자 메일주소 addContact.contactName = "추가담당자명"; // 추가담당자 성명 taxinvoice.addContactList.Add(addContact); TaxinvoiceAddContact addContact2 = new TaxinvoiceAddContact(); addContact2.serialNum = 2; // 일련번호, 1부터 순차기재 addContact2.email = ""; // 추가담당자 메일주소 addContact2.contactName = "추가담당자명"; // 추가담당자 성명 taxinvoice.addContactList.Add(addContact2); // 지연발행 강제여부 (true / false 중 택 1) // └ true = 가능 , false = 불가능 // - 미입력 시 기본값 false 처리 // - 발행마감일이 지난 세금계산서를 발행하는 경우, 가산세가 부과될 수 있습니다. // - 가산세가 부과되더라도 발행을 해야하는 경우에는 forceIssue의 값을 // true로 선언하여 발행(Issue API)를 호출하시면 됩니다. bool forceIssue = false; // 즉시발행 메모 String memo = "즉시발행 메모"; // 거래명세서 동시작성여부 (true / false 중 택 1) // └ true = 사용 , false = 미사용 // - 미입력 시 기본값 false 처리 bool writeSpecification = false; // {writeSpecification} = true인 경우, 거래명세서 문서번호 할당 // - 미입력시 기본값 세금계산서 문서번호와 동일하게 할당 String dealInvoiceMgtkey = ""; // 안내메일 제목, 미기재시 기본제목으로 전송 String emailSubject = ""; try { IssueResponse response = Global.taxinvoiceService.RegistIssue(testCorpNum, taxinvoice, forceIssue, memo, writeSpecification, dealInvoiceMgtkey, emailSubject, userID); code = response.code.ToString(); message = response.message; ntsConfirmNum = response.ntsConfirmNum; } catch (PopbillException ex) { code = ex.code.ToString(); message = ex.Message; } }