diff --git a/content/index/api-reference/ssl-certificates.adoc b/content/index/api-reference/ssl-certificates.adoc index c4cac7bdb..327898b96 100644 --- a/content/index/api-reference/ssl-certificates.adoc +++ b/content/index/api-reference/ssl-certificates.adoc @@ -3,13 +3,11 @@ You find in this section the certificates which secure the connection between the Merchant and {payment-gateway} secure (e.g. "certificate pinning"). [NOTE] ==== -- Connections to our test and production web sites and services must not be locked on target IP address. The IP addresses of our services will become dynamic, therefore usage of FQDN or URL-based filtering for outgoing connections would be adequate. - -- New digital certificates will be issued and applied on our applications. If your applications use certificate pinning, TLS connections will generate encryption errors. We advise against certificate pinning in general as a practice and kindly ask to allow the new certificates coming from our side. - -- The digital certificates behind our servers will require the usage of SNI (Server Name Indication) feature for which we kindly ask you to make sure that it is activated. Without this option enabled on the client side, TLS encrypted connections may end up with errors. As the Akamai Web Application Firewall (WAF) is a cloud based service, our applications will dynamically resolve in their DNS names therefore the SNI TLS extension is required to be enabled. - -- Customer side applications using HTTP request headers bigger than 32Kbytes will encounter connection errors. As of industry practices, even 16Kbytes is sufficient and we kindly ask to implement this limit. Nevertheless, if your applications require more, kindly contact us for this matter. +- Connections to our test and production web sites and services must not be locked on target IP address. The IP addresses of our services are dynamic, therefore usage of FQDN or URL-based filtering for outgoing connections are adequate in case of outgoing Internet connection control. +- The digital certificates used by our applications are regularly renewed. If your applications use certificate pinning, TLS connections will generate encryption errors. We advise against certificate pinning in general as a practice and kindly ask to allow new certificates coming from our side. +- The digital certificates behind our servers require the usage of SNI (Server Name Indication) feature for which we kindly ask you to make sure that it is activated in your applications. Without this option enabled on the client side, TLS encrypted connections may end up with errors. As our Web Application Firewall (WAF) is a cloud based service, our applications will dynamically resolve to cloud provider DNS entries. For TLS connections to succeed, the SNI TLS extension is required to be enabled. +- Customer side applications using HTTP request headers bigger than 32Kbytes will encounter connection errors. As of industry practices, even 16Kbytes is sufficient and we kindly ask to implement this limit. Nevertheless, if your applications require more, please contact us for this matter. + //- ==== diff --git a/content/index/home/00-home.adoc b/content/index/home/00-home.adoc index 7e454f366..21ee9d8a5 100644 --- a/content/index/home/00-home.adoc +++ b/content/index/home/00-home.adoc @@ -116,13 +116,12 @@ a| image::images/icons/info.png[note_icon] 2.+a| -- Connections to our test and production web sites and services must not be locked on target IP address. The IP addresses of our services will become dynamic, therefore usage of FQDN or URL-based filtering for outgoing connections would be adequate. - -- New digital certificates will be issued and applied on our applications. If your applications use certificate pinning, TLS connections will generate encryption errors. We advise against certificate pinning in general as a practice and kindly ask to allow the new certificates coming from our side. - -- The digital certificates behind our servers will require the usage of SNI (Server Name Indication) feature for which we kindly ask you to make sure that it is activated. Without this option enabled on the client side, TLS encrypted connections may end up with errors. As the Akamai Web Application Firewall (WAF) is a cloud based service, our applications will dynamically resolve in their DNS names therefore the SNI TLS extension is required to be enabled. - -- Customer side applications using HTTP request headers bigger than 32Kbytes will encounter connection errors. As of industry practices, even 16Kbytes is sufficient and we kindly ask to implement this limit. Nevertheless, if your applications require more, kindly contact us for this matter. + +- Connections to our test and production web sites and services must not be locked on target IP address. The IP addresses of our services are dynamic, therefore usage of FQDN or URL-based filtering for outgoing connections are adequate in case of outgoing Internet connection control. +- The digital certificates used by our applications are regularly renewed. If your applications use certificate pinning, TLS connections will generate encryption errors. We advise against certificate pinning in general as a practice and kindly ask to allow new certificates coming from our side. +- The digital certificates behind our servers require the usage of SNI (Server Name Indication) feature for which we kindly ask you to make sure that it is activated in your applications. Without this option enabled on the client side, TLS encrypted connections may end up with errors. As our Web Application Firewall (WAF) is a cloud based service, our applications will dynamically resolve to cloud provider DNS entries. For TLS connections to succeed, the SNI TLS extension is required to be enabled. +- Customer side applications using HTTP request headers bigger than 32Kbytes will encounter connection errors. As of industry practices, even 16Kbytes is sufficient and we kindly ask to implement this limit. Nevertheless, if your applications require more, please contact us for this matter. + |=== diff --git a/content/index/integration-guides/22-integration-guides.adoc b/content/index/integration-guides/22-integration-guides.adoc index f01427452..bde0e5c11 100644 --- a/content/index/integration-guides/22-integration-guides.adoc +++ b/content/index/integration-guides/22-integration-guides.adoc @@ -3,13 +3,11 @@ [NOTE] ==== -- Connections to our test and production web sites and services must not be locked on target IP address. The IP addresses of our services will become dynamic, therefore usage of FQDN or URL-based filtering for outgoing connections would be adequate. - -- New digital certificates will be issued and applied on our applications. If your applications use certificate pinning, TLS connections will generate encryption errors. We advise against certificate pinning in general as a practice and kindly ask to allow the new certificates coming from our side. - -- The digital certificates behind our servers will require the usage of SNI (Server Name Indication) feature for which we kindly ask you to make sure that it is activated. Without this option enabled on the client side, TLS encrypted connections may end up with errors. As the Akamai Web Application Firewall (WAF) is a cloud based service, our applications will dynamically resolve in their DNS names therefore the SNI TLS extension is required to be enabled. - -- Customer side applications using HTTP request headers bigger than 32Kbytes will encounter connection errors. As of industry practices, even 16Kbytes is sufficient and we kindly ask to implement this limit. Nevertheless, if your applications require more, kindly contact us for this matter. +- Connections to our test and production web sites and services must not be locked on target IP address. The IP addresses of our services are dynamic, therefore usage of FQDN or URL-based filtering for outgoing connections are adequate in case of outgoing Internet connection control. +- The digital certificates used by our applications are regularly renewed. If your applications use certificate pinning, TLS connections will generate encryption errors. We advise against certificate pinning in general as a practice and kindly ask to allow new certificates coming from our side. +- The digital certificates behind our servers require the usage of SNI (Server Name Indication) feature for which we kindly ask you to make sure that it is activated in your applications. Without this option enabled on the client side, TLS encrypted connections may end up with errors. As our Web Application Firewall (WAF) is a cloud based service, our applications will dynamically resolve to cloud provider DNS entries. For TLS connections to succeed, the SNI TLS extension is required to be enabled. +- Customer side applications using HTTP request headers bigger than 32Kbytes will encounter connection errors. As of industry practices, even 16Kbytes is sufficient and we kindly ask to implement this limit. Nevertheless, if your applications require more, please contact us for this matter. + //- diff --git a/content/index/integration-options/02-general-integration-options.adoc b/content/index/integration-options/02-general-integration-options.adoc index dc9a78add..2ff21f280 100644 --- a/content/index/integration-options/02-general-integration-options.adoc +++ b/content/index/integration-options/02-general-integration-options.adoc @@ -15,13 +15,11 @@ is common for both Payment Page and REST API. [NOTE] ==== -- Connections to our test and production web sites and services must not be locked on target IP address. The IP addresses of our services will become dynamic, therefore usage of FQDN or URL-based filtering for outgoing connections would be adequate. - -- New digital certificates will be issued and applied on our applications. If your applications use certificate pinning, TLS connections will generate encryption errors. We advise against certificate pinning in general as a practice and kindly ask to allow the new certificates coming from our side. - -- The digital certificates behind our servers will require the usage of SNI (Server Name Indication) feature for which we kindly ask you to make sure that it is activated. Without this option enabled on the client side, TLS encrypted connections may end up with errors. As the Akamai Web Application Firewall (WAF) is a cloud based service, our applications will dynamically resolve in their DNS names therefore the SNI TLS extension is required to be enabled. - -- Customer side applications using HTTP request headers bigger than 32Kbytes will encounter connection errors. As of industry practices, even 16Kbytes is sufficient and we kindly ask to implement this limit. Nevertheless, if your applications require more, kindly contact us for this matter. +- Connections to our test and production web sites and services must not be locked on target IP address. The IP addresses of our services are dynamic, therefore usage of FQDN or URL-based filtering for outgoing connections are adequate in case of outgoing Internet connection control. +- The digital certificates used by our applications are regularly renewed. If your applications use certificate pinning, TLS connections will generate encryption errors. We advise against certificate pinning in general as a practice and kindly ask to allow new certificates coming from our side. +- The digital certificates behind our servers require the usage of SNI (Server Name Indication) feature for which we kindly ask you to make sure that it is activated in your applications. Without this option enabled on the client side, TLS encrypted connections may end up with errors. As our Web Application Firewall (WAF) is a cloud based service, our applications will dynamically resolve to cloud provider DNS entries. For TLS connections to succeed, the SNI TLS extension is required to be enabled. +- Customer side applications using HTTP request headers bigger than 32Kbytes will encounter connection errors. As of industry practices, even 16Kbytes is sufficient and we kindly ask to implement this limit. Nevertheless, if your applications require more, please contact us for this matter. + //- diff --git a/content/resources/3-d-secure-2/usecase_pm-collection/one-time-payment.postman_collection.json b/content/resources/3-d-secure-2/usecase_pm-collection/one-time-payment.postman_collection.json index 6beeb49ea..d6f9cbc9f 100644 --- a/content/resources/3-d-secure-2/usecase_pm-collection/one-time-payment.postman_collection.json +++ b/content/resources/3-d-secure-2/usecase_pm-collection/one-time-payment.postman_collection.json @@ -1,8 +1,8 @@ { "info": { - "_postman_id": "14e175b5-22fc-43f9-96eb-1d43c701b257", + "_postman_id": "929b40d7-3c3d-4ac9-9e62-c8b1a0112f1c", "name": "one-time-payment", - "description": "One-time purchase is one of the most common scenarios: a consumer places an order for a product or service. The merchant fulfills the order in a single shipment and before expiration of the authorization.\r\n\r\na. Immediately\r\n\ti. Authentication (full amount)\r\n\tii. Authorization (full amount)\r\nb. When ready to ship\r\n\ti. Capture (full amount)\r\n", + "description": "One-time purchase is one of the most common scenarios: a consumer places an order for a product or service. The merchant fulfills the order in a single shipment and before expiration of the authorization.\r\n\r\na. Immediately\r\n\ti. Authentication (full amount)\r\n\tii. Purchase (full amount)\r\n\r\n", "schema": "https://schema.getpostman.com/json/collection/v2.1.0/collection.json" }, "item": [ @@ -12,9 +12,7 @@ { "listen": "test", "script": { - "id": "be28bcf2-5fcd-499d-9cc0-fa90af733e3d", "exec": [ - "// Convert XML output to JSON format\r", "var xml2JsonData = xml2Json(responseBody);\r", "\r", "var xml = cheerio.load(responseBody, {\r", @@ -22,8 +20,6 @@ " xmlMode: true\r", "});\r", "\r", - "//console.log(xml.xml()); // Serialize the jQuery as a string\r", - "\r", "pm.globals.set(\"$p_guwid_enroll\", xml(\"payment\").find(\"transaction-id\").text());\r", "pm.globals.set(\"$pareq\", xml(\"payment\").find(\"three-d\").find(\"pareq\").text());\r", "pm.globals.set(\"$acs_url\", xml(\"payment\").find(\"three-d\").find(\"acs-url\").text());\r", @@ -56,9 +52,7 @@ { "listen": "prerequest", "script": { - "id": "f37884bf-d593-4dbb-88e1-08535c4d9354", "exec": [ - "", "var guid = (function() {", " function s4() {", " return Math.floor((1 + Math.random()) * 0x10000)", @@ -72,16 +66,16 @@ "})();", "", "pm.globals.set(\"$descriptor\", \"3DS-2 Use-Cases: One-Time Purchase - Simplified\");", - "pm.globals.set(\"$handler\", guid());", - "console.info(\"UUID: \"+pm.globals.get(\"$handler\"));", + "pm.globals.set(\"$guid\", guid());", + "console.info(\"UUID: \"+pm.globals.get(\"$guid\"));", "", "", "pm.globals.set(\"$p_guwid\", null);", "pm.globals.set(\"$p_guwid_enroll\", null);", "pm.globals.set(\"$p_guwid_check\", null);", - "pm.globals.set(\"$p_guwid_auth_1\", null);", - "pm.globals.set(\"$p_guwid_auth_2\", null);", - "pm.globals.set(\"$p_guwid_auth_only\", null);", + "pm.globals.set(\"$p_guwid_purch\", null);", + "", + "", "", "", "pm.globals.set(\"$pares\", null);", @@ -98,12 +92,12 @@ "basic": [ { "key": "password", - "value": "8mhwavKVb91T", + "value": "4cHLRE-Q7YcAP", "type": "string" }, { "key": "username", - "value": "70000-APILUHN-CARD", + "value": "515225-GetnetEuropeTEST", "type": "string" } ] @@ -113,7 +107,7 @@ { "key": "Authorization", "type": "text", - "value": " Basic NzAwMDAtQVBJTFVITi1DQVJEOjhtaHdhdktWYjkxVA==" + "value": "Basic ODQzMjAtZ2V0bmV0ZXVyb3BlOjJOUUJudWNVMTltWQ==" }, { "key": "Content-Type", @@ -124,14 +118,14 @@ ], "body": { "mode": "raw", - "raw": "\n\n 33f6d473-3036-4ca5-acb5-8c64dac862d1\n {{$guid}}\n check-enrollment\n 10.00\n \n \n \n \n Manon\n Mertens\n m.mertens@example.com\n +3228089336\n +32496000000\n
\n Rue de la Loi 1\n Brussels\n BRU\n BE\n 1000\n
\n https://demoshop-test.wirecard.com/demoshop/#/success\n https://demoshop-test.wirecard.com/demoshop/#/error\n https://demoshop-test.wirecard.com/demoshop/#/cancel\n 01\n XWLfrzuGhpajYxFiFgNScwcLhtIOvXNxMIcrxIPTHqgroaFiPNDqMxGBXYUhMVBZ\n \n 01\n 2019-05-05T21:46:00.000Z\n 01\n 2019-05-05Z\n 2019-06-07Z\n 2019-06-08Z\n 2019-06-09Z\n 1\n 10\n 2\n 4\n false\n 2018-06-16Z\n \n
\n \n Manon\n Mertens\n
\n Rue de la Loi 1\n Brussels\n BRU\n BE\n 1000\n
\n home_delivery\n
\n \n 5413330300201192\n 01\n 2025\n 192\n mastercard\n 02\n \n 127.0.0.1\n {{$handler}}\n {{$descriptor}}\n \n \n \n \n \n 01\n 01\n \n \n \n 360\n 800x600\n 01\n 48\n true\n en\n \n \n 01\n m.mertens@example.com\n 04\n \n \n 9.99\n \n \n 2019-07-16Z\n 01\n \n
" + "raw": "\n\n 5c4a8a42-04a8-4970-a595-262f0ba0a108\n {{$guid}}\n check-enrollment\n 10.00\n \n \n \n \n Manon\n Mertens\n m.mertens@example.com\n +3228089336\n +32496000000\n
\n Rue de la Loi 1\n Brussels\n BRU\n BE\n 1000\n
\n https://demoshop-test.getneteurope.com/demoshop/#/cancel\n https://demoshop-test.getneteurope.com/demoshop/#/error\n https://demoshop-test.getneteurope.com/demoshop/#/success\n 01\n XWLfrzuGhpajYxFiFgNScwcLhtIOvXNxMIcrxIPTHqgroaFiPNDqMxGBXYUhMVBZ\n \n 01\n 2019-05-05T21:46:00.000Z\n 01\n 2019-05-05Z\n 2019-06-07Z\n 2019-06-08Z\n 2019-06-09Z\n 1\n 10\n 2\n 4\n false\n 2018-06-16Z\n \n
\n \n Manon\n Mertens\n
\n Rue de la Loi 1\n Brussels\n BRU\n BE\n 1000\n
\n home_delivery\n
\n \n 5413330300201192\n 01\n 2025\n 192\n mastercard\n 02\n \n \n 2.1.0\n \n 127.0.0.1\n {{$handler}}\n {{$descriptor}}\n \n \n \n \n \n 01\n 01\n \n \n \n 360\n 800x600\n 01\n 48\n true\n en\n \n \n 01\n m.mertens@example.com\n 04\n \n \n 9.99\n \n \n 2019-07-16Z\n 01\n \n
" }, "url": { "raw": "https://api-test.getneteurope.com/engine/rest/payments/", "protocol": "https", "host": [ "api-test", - "wirecard", + "getneteurope", "com" ], "path": [ @@ -142,100 +136,7 @@ ] } }, - "response": [ - { - "name": "3D (Automatic Card Brand Recognition) Sign In", - "originalRequest": { - "method": "POST", - "header": [ - { - "key": "Authorization", - "value": " Basic NzAwMDAtQVBJTFVITi1DQVJEOjhtaHdhdktWYjkxVA==", - "type": "text" - }, - { - "key": "Content-Type", - "value": " application/xml", - "type": "text" - } - ], - "body": { - "mode": "raw", - "raw": "" - }, - "url": { - "raw": "https://api-test.getneteurope.com/engine/rest/payments/", - "protocol": "https", - "host": [ - "api-test", - "wirecard", - "com" - ], - "path": [ - "engine", - "rest", - "payments", - "" - ] - } - }, - "status": "Internal Server Error", - "code": 500, - "_postman_previewlanguage": "xml", - "header": [ - { - "key": "Cache-Control", - "value": "no-cache, no-store, max-age=0, must-revalidate" - }, - { - "key": "Pragma", - "value": "no-cache" - }, - { - "key": "Expires", - "value": "0" - }, - { - "key": "X-XSS-Protection", - "value": "1; mode=block" - }, - { - "key": "X-Content-Type-Options", - "value": "nosniff" - }, - { - "key": "Content-Type", - "value": "application/xml;charset=UTF-8" - }, - { - "key": "Content-Language", - "value": "en-US" - }, - { - "key": "Content-Length", - "value": "303" - }, - { - "key": "Date", - "value": "Wed, 19 Jun 2019 11:44:51 GMT" - }, - { - "key": "Connection", - "value": "close" - }, - { - "key": "Server", - "value": "" - }, - { - "key": "Strict-Transport-Security", - "value": "max-age=16070400; includeSubDomains" - } - ], - "cookie": [], - "body": "\n\n failed\n \n \n \n" - } - ] + "response": [] }, { "name": "1.2.a.i.2 Webhook", @@ -243,7 +144,6 @@ { "listen": "test", "script": { - "id": "be28bcf2-5fcd-499d-9cc0-fa90af733e3d", "exec": [ "responseHTML = cheerio(pm.response.text()); console.log(responseHTML.find('[name=\"PaRes\"]').val());\r", "pm.globals.set(\"$pares\", responseHTML.find('[name=\"PaRes\"]').val());\r", @@ -265,7 +165,6 @@ { "listen": "prerequest", "script": { - "id": "f37884bf-d593-4dbb-88e1-08535c4d9354", "exec": [ "" ], @@ -318,100 +217,7 @@ ] } }, - "response": [ - { - "name": "3D (Automatic Card Brand Recognition) Sign In", - "originalRequest": { - "method": "POST", - "header": [ - { - "key": "Authorization", - "value": " Basic NzAwMDAtQVBJTFVITi1DQVJEOjhtaHdhdktWYjkxVA==", - "type": "text" - }, - { - "key": "Content-Type", - "value": " application/xml", - "type": "text" - } - ], - "body": { - "mode": "raw", - "raw": "" - }, - "url": { - "raw": "https://api-test.getneteurope.com/engine/rest/payments/", - "protocol": "https", - "host": [ - "api-test", - "wirecard", - "com" - ], - "path": [ - "engine", - "rest", - "payments", - "" - ] - } - }, - "status": "Internal Server Error", - "code": 500, - "_postman_previewlanguage": "xml", - "header": [ - { - "key": "Cache-Control", - "value": "no-cache, no-store, max-age=0, must-revalidate" - }, - { - "key": "Pragma", - "value": "no-cache" - }, - { - "key": "Expires", - "value": "0" - }, - { - "key": "X-XSS-Protection", - "value": "1; mode=block" - }, - { - "key": "X-Content-Type-Options", - "value": "nosniff" - }, - { - "key": "Content-Type", - "value": "application/xml;charset=UTF-8" - }, - { - "key": "Content-Language", - "value": "en-US" - }, - { - "key": "Content-Length", - "value": "303" - }, - { - "key": "Date", - "value": "Wed, 19 Jun 2019 11:44:51 GMT" - }, - { - "key": "Connection", - "value": "close" - }, - { - "key": "Server", - "value": "" - }, - { - "key": "Strict-Transport-Security", - "value": "max-age=16070400; includeSubDomains" - } - ], - "cookie": [], - "body": "\n\n failed\n \n \n \n" - } - ] + "response": [] }, { "name": "1.2.a.i.3 Check-Payer-Response", @@ -419,9 +225,22 @@ { "listen": "prerequest", "script": { - "id": "c077fed1-54bf-489b-97bb-db5fab20228f", "exec": [ - "" + "var guid = (function() {\r", + " function s4() {\r", + " return Math.floor((1 + Math.random()) * 0x10000)\r", + " .toString(16)\r", + " .substring(1);\r", + " }\r", + " return function() {\r", + " return s4() + s4() + '-' + s4() + '-' + s4() + '-' +\r", + " s4() + '-' + s4() + s4() + s4();\r", + " };\r", + "})();\r", + "\r", + "pm.globals.set(\"$descriptor\", \"3DS-2 Use-Cases: One-Time Purchase - Simplified\");\r", + "pm.globals.set(\"$guid\", guid());\r", + "console.info(\"UUID: \"+pm.globals.get(\"$guid\"));" ], "type": "text/javascript" } @@ -429,7 +248,6 @@ { "listen": "test", "script": { - "id": "0452501a-d310-4418-ad70-a9248b7fc195", "exec": [ "// Convert XML output to JSON format", "var xml2JsonData = xml2Json(responseBody);", @@ -456,10 +274,6 @@ "", "pm.test(\"Check Payer Response Transaction ID: \"+pm.globals.get(\"$p_guwid_check\"), function(){", " pm.expect(pm.globals.get(\"$p_guwid_check\")).not.equal(null);", - "});", - "", - "pm.test(\"3DS Version: \"+xml(\"payment\").find(\"three-d\").find(\"version\").text(), function(){", - " pm.expect(xml(\"payment\").find(\"three-d\").find(\"version\").text()).to.equal(\"2.1.0\");", "});" ], "type": "text/javascript" @@ -472,12 +286,12 @@ "basic": [ { "key": "password", - "value": "8mhwavKVb91T", + "value": "4cHLRE-Q7YcAP", "type": "string" }, { "key": "username", - "value": "70000-APILUHN-CARD", + "value": "515225-GetnetEuropeTEST", "type": "string" } ] @@ -498,14 +312,14 @@ ], "body": { "mode": "raw", - "raw": "\n\n 33f6d473-3036-4ca5-acb5-8c64dac862d1\n {{$guid}}\n check-payer-response\n {{$p_guwid_enroll}}\n \n {{$pares}}\n \n {{$handler}}\n {{$descriptor}}\n" + "raw": "\n\n 5c4a8a42-04a8-4970-a595-262f0ba0a108\n {{$guid}}\n check-payer-response\n {{$p_guwid_enroll}}\n \n {{$pares}}\n 2.1\n \n {{$handler}}\n {{$descriptor}}\n" }, "url": { "raw": "https://api-test.getneteurope.com/engine/rest/payments/", "protocol": "https", "host": [ "api-test", - "wirecard", + "getneteurope", "com" ], "path": [ @@ -516,104 +330,14 @@ ] } }, - "response": [ - { - "name": "3D (Automatic Card Brand Recognition) Sign In", - "originalRequest": { - "method": "POST", - "header": [ - { - "key": "Authorization", - "value": " Basic NzAwMDAtQVBJTFVITi1DQVJEOjhtaHdhdktWYjkxVA==", - "type": "text" - }, - { - "key": "Content-Type", - "value": " application/xml", - "type": "text" - } - ], - "url": { - "raw": "https://api-test.getneteurope.com/engine/rest/payments/", - "protocol": "https", - "host": [ - "api-test", - "wirecard", - "com" - ], - "path": [ - "engine", - "rest", - "payments", - "" - ] - } - }, - "status": "Internal Server Error", - "code": 500, - "_postman_previewlanguage": "xml", - "header": [ - { - "key": "Cache-Control", - "value": "no-cache, no-store, max-age=0, must-revalidate" - }, - { - "key": "Pragma", - "value": "no-cache" - }, - { - "key": "Expires", - "value": "0" - }, - { - "key": "X-XSS-Protection", - "value": "1; mode=block" - }, - { - "key": "X-Content-Type-Options", - "value": "nosniff" - }, - { - "key": "Content-Type", - "value": "application/xml;charset=UTF-8" - }, - { - "key": "Content-Language", - "value": "en-US" - }, - { - "key": "Content-Length", - "value": "303" - }, - { - "key": "Date", - "value": "Wed, 19 Jun 2019 11:44:51 GMT" - }, - { - "key": "Connection", - "value": "close" - }, - { - "key": "Server", - "value": "" - }, - { - "key": "Strict-Transport-Security", - "value": "max-age=16070400; includeSubDomains" - } - ], - "cookie": [], - "body": "\n\n failed\n \n \n \n" - } - ] + "response": [] }, { - "name": "1.2.a.ii Authorization", + "name": "1.2.a.ii Purchase", "event": [ { "listen": "test", "script": { - "id": "be28bcf2-5fcd-499d-9cc0-fa90af733e3d", "exec": [ "// Convert XML output to JSON format\r", "var xml2JsonData = xml2Json(responseBody);\r", @@ -624,18 +348,18 @@ "});\r", "\r", "\r", - "console.info(\"AuthO GUWID: \"+xml(\"payment\").find(\"transaction-id\").text());\r", + "console.info(\"Purchase GUWID: \"+xml(\"payment\").find(\"transaction-id\").text());\r", "\r", "\r", "var $status=xml(\"payment\").find(\"transaction-state\").text();\r", "pm.globals.set(\"$p_guwid_auth_1\", xml(\"payment\").find(\"transaction-id\").text());\r", "\r", "\r", - "pm.test(\"Authorization Transaction\", function(){\r", + "pm.test(\"Purchase Transaction\", function(){\r", " pm.expect($status).to.equal(\"success\"); \r", "});\r", "\r", - "pm.test(\"AuthO Transaction ID: \"+pm.globals.get(\"$p_guwid_auth_1\"), function(){\r", + "pm.test(\"Purchase Transaction ID: \"+pm.globals.get(\"$p_guwid_auth_1\"), function(){\r", " pm.expect(pm.globals.get(\"$p_guwid_auth_1\")).not.equal(null);\r", "});" ], @@ -645,203 +369,23 @@ { "listen": "prerequest", "script": { - "id": "f37884bf-d593-4dbb-88e1-08535c4d9354", - "exec": [ - "" - ], - "type": "text/javascript" - } - } - ], - "request": { - "auth": { - "type": "basic", - "basic": [ - { - "key": "password", - "value": "8mhwavKVb91T", - "type": "string" - }, - { - "key": "username", - "value": "70000-APILUHN-CARD", - "type": "string" - } - ] - }, - "method": "POST", - "header": [ - { - "key": "Authorization", - "type": "text", - "value": " Basic NzAwMDAtQVBJTFVITi1DQVJEOjhtaHdhdktWYjkxVA==" - }, - { - "key": "Content-Type", - "name": "Content-Type", - "type": "text", - "value": "application/xml" - } - ], - "body": { - "mode": "raw", - "raw": "\n\n 33f6d473-3036-4ca5-acb5-8c64dac862d1\n {{$guid}}\n authorization\n 10.00\n {{$p_guwid_check}}\n {{$handler}}\n {{$descriptor}}\n", - "options": { - "raw": { - "language": "xml" - } - } - }, - "url": { - "raw": "https://api-test.getneteurope.com/engine/rest/payments/", - "protocol": "https", - "host": [ - "api-test", - "wirecard", - "com" - ], - "path": [ - "engine", - "rest", - "payments", - "" - ] - } - }, - "response": [ - { - "name": "3D (Automatic Card Brand Recognition) Sign In", - "originalRequest": { - "method": "POST", - "header": [ - { - "key": "Authorization", - "value": " Basic NzAwMDAtQVBJTFVITi1DQVJEOjhtaHdhdktWYjkxVA==", - "type": "text" - }, - { - "key": "Content-Type", - "value": " application/xml", - "type": "text" - } - ], - "body": { - "mode": "raw", - "raw": "" - }, - "url": { - "raw": "https://api-test.getneteurope.com/engine/rest/payments/", - "protocol": "https", - "host": [ - "api-test", - "wirecard", - "com" - ], - "path": [ - "engine", - "rest", - "payments", - "" - ] - } - }, - "status": "Internal Server Error", - "code": 500, - "_postman_previewlanguage": "xml", - "header": [ - { - "key": "Cache-Control", - "value": "no-cache, no-store, max-age=0, must-revalidate" - }, - { - "key": "Pragma", - "value": "no-cache" - }, - { - "key": "Expires", - "value": "0" - }, - { - "key": "X-XSS-Protection", - "value": "1; mode=block" - }, - { - "key": "X-Content-Type-Options", - "value": "nosniff" - }, - { - "key": "Content-Type", - "value": "application/xml;charset=UTF-8" - }, - { - "key": "Content-Language", - "value": "en-US" - }, - { - "key": "Content-Length", - "value": "303" - }, - { - "key": "Date", - "value": "Wed, 19 Jun 2019 11:44:51 GMT" - }, - { - "key": "Connection", - "value": "close" - }, - { - "key": "Server", - "value": "" - }, - { - "key": "Strict-Transport-Security", - "value": "max-age=16070400; includeSubDomains" - } - ], - "cookie": [], - "body": "\n\n failed\n \n \n \n" - } - ] - }, - { - "name": "1.2.b Capture", - "event": [ - { - "listen": "test", - "script": { - "id": "be28bcf2-5fcd-499d-9cc0-fa90af733e3d", "exec": [ - "// Convert XML output to JSON format\r", - "var xml2JsonData = xml2Json(responseBody);\r", - "\r", - "var xml = cheerio.load(responseBody, {\r", - " ignoreWhitespace: true,\r", - " xmlMode: true\r", - "});\r", - "\r", - "\r", - "console.info(\"Capture GUWID: \"+xml(\"payment\").find(\"transaction-id\").text());\r", - "\r", + "var guid = (function() {\r", + " function s4() {\r", + " return Math.floor((1 + Math.random()) * 0x10000)\r", + " .toString(16)\r", + " .substring(1);\r", + " }\r", + " return function() {\r", + " return s4() + s4() + '-' + s4() + '-' + s4() + '-' +\r", + " s4() + '-' + s4() + s4() + s4();\r", + " };\r", + "})();\r", "\r", - "var $status=xml(\"payment\").find(\"transaction-state\").text();\r", - "\r", - "pm.test(\"Capture Transaction\", function(){\r", - " pm.expect($status).to.equal(\"success\"); \r", - "});\r", - "\r", - "pm.test(\"Capture Transaction ID: \"+xml(\"payment\").find(\"transaction-id\"), function(){\r", - " pm.expect(xml(\"payment\").find(\"transaction-id\")).not.equal(null);\r", - "});" - ], - "type": "text/javascript" - } - }, - { - "listen": "prerequest", - "script": { - "id": "f37884bf-d593-4dbb-88e1-08535c4d9354", - "exec": [ - "" + "pm.globals.set(\"$descriptor\", \"3DS-2 Use-Cases: One-Time Purchase - Simplified\");\r", + "pm.globals.set(\"$guid\", guid());\r", + "pm.globals.set(\"$handler\", \"Order0000001701\");\r", + "console.info(\"UUID: \"+pm.globals.get(\"$guid\"));" ], "type": "text/javascript" } @@ -853,12 +397,12 @@ "basic": [ { "key": "password", - "value": "8mhwavKVb91T", + "value": "4cHLRE-Q7YcAP", "type": "string" }, { "key": "username", - "value": "70000-APILUHN-CARD", + "value": "515225-GetnetEuropeTEST", "type": "string" } ] @@ -879,7 +423,7 @@ ], "body": { "mode": "raw", - "raw": "\n\n 33f6d473-3036-4ca5-acb5-8c64dac862d1\n {{$guid}}\n capture-authorization\n 10.00\n \n \n \n {{$p_guwid_auth_1}}\n {{$handler}}\n {{$descriptor}}\n", + "raw": "\n\n 5c4a8a42-04a8-4970-a595-262f0ba0a108\n {{$guid}}\n purchase\n 10.00\n {{$p_guwid_check}}\n {{$handler}}\n {{$descriptor}}\n", "options": { "raw": { "language": "xml" @@ -891,7 +435,7 @@ "protocol": "https", "host": [ "api-test", - "wirecard", + "getneteurope", "com" ], "path": [ @@ -902,100 +446,7 @@ ] } }, - "response": [ - { - "name": "3D (Automatic Card Brand Recognition) Sign In", - "originalRequest": { - "method": "POST", - "header": [ - { - "key": "Authorization", - "value": " Basic NzAwMDAtQVBJTFVITi1DQVJEOjhtaHdhdktWYjkxVA==", - "type": "text" - }, - { - "key": "Content-Type", - "value": " application/xml", - "type": "text" - } - ], - "body": { - "mode": "raw", - "raw": "" - }, - "url": { - "raw": "https://api-test.getneteurope.com/engine/rest/payments/", - "protocol": "https", - "host": [ - "api-test", - "wirecard", - "com" - ], - "path": [ - "engine", - "rest", - "payments", - "" - ] - } - }, - "status": "Internal Server Error", - "code": 500, - "_postman_previewlanguage": "xml", - "header": [ - { - "key": "Cache-Control", - "value": "no-cache, no-store, max-age=0, must-revalidate" - }, - { - "key": "Pragma", - "value": "no-cache" - }, - { - "key": "Expires", - "value": "0" - }, - { - "key": "X-XSS-Protection", - "value": "1; mode=block" - }, - { - "key": "X-Content-Type-Options", - "value": "nosniff" - }, - { - "key": "Content-Type", - "value": "application/xml;charset=UTF-8" - }, - { - "key": "Content-Language", - "value": "en-US" - }, - { - "key": "Content-Length", - "value": "303" - }, - { - "key": "Date", - "value": "Wed, 19 Jun 2019 11:44:51 GMT" - }, - { - "key": "Connection", - "value": "close" - }, - { - "key": "Server", - "value": "" - }, - { - "key": "Strict-Transport-Security", - "value": "max-age=16070400; includeSubDomains" - } - ], - "cookie": [], - "body": "\n\n failed\n \n \n \n" - } - ] + "response": [] } ], "auth": { @@ -1003,12 +454,12 @@ "basic": [ { "key": "password", - "value": "8mhwavKVb91T", + "value": "", "type": "string" }, { "key": "username", - "value": "70000-APILUHN-CARD", + "value": "", "type": "string" } ] @@ -1017,7 +468,6 @@ { "listen": "prerequest", "script": { - "id": "36274761-0a0e-43ad-9255-41c1d3e0e90b", "type": "text/javascript", "exec": [ "" @@ -1027,13 +477,11 @@ { "listen": "test", "script": { - "id": "a9e65808-b3a0-491b-acf5-00b901122b8b", "type": "text/javascript", "exec": [ "" ] } } - ], - "protocolProfileBehavior": {} + ] }