Skip to content

Commit f2719b2

Browse files
authored
Merge pull request #11 from CyberSource/bugfix_dec17release
Dec 17 release,Bug fixes done
2 parents dcbde5d + 3970e7f commit f2719b2

File tree

9 files changed

+55
-58
lines changed

9 files changed

+55
-58
lines changed

CyberSource/__init__.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -10,10 +10,10 @@
1010
Generated by: https://github.com/swagger-api/swagger-codegen.git
1111
"""
1212

13-
1413
from __future__ import absolute_import
1514

1615
# import models into sdk package
16+
1717
from .models.auth_reversal_request import AuthReversalRequest
1818
from .models.body import Body
1919
from .models.body_1 import Body1

CyberSource/api_client.py

+9-19
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@
3131
from authenticationsdk.core.MerchantConfiguration import *
3232
from authenticationsdk.util.PropertiesUtil import *
3333
from authenticationsdk.util.GlobalLabelParameters import *
34-
34+
from six.moves.urllib.parse import urlencode
3535

3636
class ApiClient(object):
3737
"""
@@ -72,6 +72,7 @@ def __init__(self, host=None, header_name=None, header_value=None, cookie=None):
7272
if header_name is not None:
7373
self.default_headers[header_name] = header_value
7474
if host is None:
75+
7576
self.host = Configuration().host
7677
else:
7778
self.host = host
@@ -129,18 +130,14 @@ def set_configuration(self,config):
129130
mconfig.set_merchantconfig(config)
130131
# This implements the fall back logic for JWT parameters key alias,key password,json file path
131132
mconfig.validate_merchant_details(config, mconfig)
133+
# Setting the Host by reading the Environment(SANDBOX/PRODUCTION) from Merchant Config
134+
self.host = mconfig.request_host
132135

133136
# Calling the authentication header
134137
def call_authentication_header(self,method, header_params, body):
135138

136-
# give the URL path to where the data needs to be authenticated
137-
url = GlobalLabelParameters.HTTP_URL_PREFIX
138-
139-
time = mconfig.get_time() # mconfig.get_time()
140-
139+
time = mconfig.get_time()
141140
mconfig.request_type_method = method
142-
143-
mconfig.url = url + mconfig.request_host + mconfig.request_target
144141
if method.upper() == GlobalLabelParameters.POST or method.upper() == GlobalLabelParameters.PUT or method.upper() == GlobalLabelParameters.PATCH:
145142
mconfig.request_json_path_data = body
146143

@@ -178,18 +175,10 @@ def set_digest(self, body):
178175

179176
# Adds query param to URL
180177
def set_query_params(self, path, query_param):
181-
query_param = dict(query_param)
182178
if query_param:
183-
first_query_param = True
184-
for param in query_param:
179+
path += '?' + urlencode(query_param)
185180

186-
if (not first_query_param):
187-
path = path + "&" + param + "=" + str(query_param[param])
188-
else:
189-
path = path + "?" + param + "=" + str(query_param[param])
190-
first_query_param = False
191-
192-
return path
181+
return path
193182

194183
def __call_api(self, resource_path, method,
195184
path_params=None, query_params=None, header_params=None,
@@ -241,7 +230,8 @@ def __call_api(self, resource_path, method,
241230
body = self.sanitize_for_serialization(body)
242231

243232
# request url
244-
url = self.host + resource_path
233+
url = GlobalLabelParameters.HTTP_URL_PREFIX+self.host + resource_path
234+
245235

246236
# perform request and return response
247237
response_data = self.request(method, url,

CyberSource/rest.py

+1
Original file line numberDiff line numberDiff line change
@@ -152,6 +152,7 @@ def request(self, method, url, query_params=None, headers=None,
152152
if method in ['POST', 'PUT', 'PATCH', 'OPTIONS', 'DELETE']:
153153
if query_params:
154154
url += '?' + urlencode(query_params)
155+
155156
if re.search('json', headers['Content-Type'], re.IGNORECASE):
156157
request_body = None
157158
if body:

authenticationsdk/core/Authorization.py

+3-3
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,6 @@
44
import authenticationsdk.util.ExceptionAuth
55

66

7-
87
# This class calls for the generation of Signature message depending on the authentication type
98
class Authorization:
109

@@ -36,7 +35,8 @@ def get_token(self, mconfig, date_time, logger):
3635
encoded_digest = digest_obj.string_digest_generation(
3736
mconfig.request_json_path_data)
3837
logger.info(
39-
GlobalLabelParameters.DIGEST + ":" + GlobalLabelParameters.DIGEST_PREFIX + (encoded_digest).decode("utf-8"))
38+
GlobalLabelParameters.DIGEST + ":" + GlobalLabelParameters.DIGEST_PREFIX + (
39+
encoded_digest).decode("utf-8"))
4040
logger.info("Signature: " + sig_token)
4141

4242
return sig_token
@@ -82,5 +82,5 @@ def get_token(self, mconfig, date_time, logger):
8282
def validate_request_type_method(self, mconfig):
8383

8484
if not (
85-
mconfig.request_type_method.upper() == GlobalLabelParameters.GET or mconfig.request_type_method.upper() == GlobalLabelParameters.POST or mconfig.request_type_method.upper() == GlobalLabelParameters.PUT or mconfig.request_type_method.upper() == GlobalLabelParameters.DELETE or mconfig.request_type_method.upper() == GlobalLabelParameters.PATCH):
85+
mconfig.request_type_method.upper() == GlobalLabelParameters.GET or mconfig.request_type_method.upper() == GlobalLabelParameters.POST or mconfig.request_type_method.upper() == GlobalLabelParameters.PUT or mconfig.request_type_method.upper() == GlobalLabelParameters.DELETE or mconfig.request_type_method.upper() == GlobalLabelParameters.PATCH):
8686
raise ApiException(1, GlobalLabelParameters.INVALID_REQUEST_TYPE_METHOD)

authenticationsdk/core/MerchantConfiguration.py

+2-5
Original file line numberDiff line numberDiff line change
@@ -142,8 +142,6 @@ def set_merchantconfig(self, val):
142142
self.set_proxy_address(val)
143143
self.set_proxy_port(val)
144144

145-
146-
147145
# Returns the time in format as defined by RFC7231
148146
def get_time(self):
149147
now = datetime.now()
@@ -154,7 +152,7 @@ def get_time(self):
154152
# This validates the Merchant details
155153
def validate_merchant_details(self, details, mconfig):
156154
# verify Mandatory Properties
157-
logger =authenticationsdk.logger.Log.setup_logger(mconfig)
155+
logger = authenticationsdk.logger.Log.setup_logger(mconfig)
158156
mconfig.log = logger
159157
if self.enable_log is True:
160158
logger.info("START> ======================================= ")
@@ -168,7 +166,6 @@ def validate_merchant_details(self, details, mconfig):
168166
GlobalLabelParameters.AUTHENTICATION_REQ,
169167
mconfig)
170168

171-
172169
if self.run_environment is None or self.run_environment == "":
173170
authenticationsdk.util.ExceptionAuth.validate_merchant_details_log(logger,
174171
GlobalLabelParameters.RUN_ENVIRONMENT_EMPTY,
@@ -185,7 +182,7 @@ def validate_merchant_details(self, details, mconfig):
185182
GlobalLabelParameters.LOG_MAXIMUM_SIZE_DEFAULT_MESSAGE,
186183
mconfig)
187184
if details.get('log_file_name') is None or details.get('log_file_name') == "":
188-
authenticationsdk.util.ExceptionAuth.validate_default_values(logger,
185+
authenticationsdk.util.ExceptionAuth.validate_default_values(logger,
189186
GlobalLabelParameters.DEFAULT_LOG_FILE_NAME,
190187
mconfig)
191188

authenticationsdk/core/MockData.py

+27-13
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,4 @@
1+
import os
12
class MockData:
23
HTTP_VALUES = {
34
"authentication_type": "HTTP_SIGNATURE",
@@ -6,14 +7,14 @@ class MockData:
67
"key_alias": "testrest",
78
"key_password": "testrest",
89
"key_file_name": "testrest",
9-
"keys_directory": "../../cybersource_authentication_sdk_python/Resources/",
10+
"keys_directory": os.path.join(os.getcwd(),"resources"),
1011
"merchant_keyid": "08c94330-f618-42a3-b09d-e1e43be5efda",
1112
"merchant_secretkey": "yBJxy6LjM2TmcPGu+GaJrHtkke25fPpUX+UY6/L/1tE=",
12-
"enable_log": True,
13+
"enable_log": False,
1314
"log_file_name": "cybs",
1415
"log_maximum_size": 10485760,
15-
"log_directory": "../../cybersource_authentication_sdk_python/Logs/",
16-
"proxy_address": "userproxy.visa.com",
16+
"log_directory": os.path.join(os.getcwd(),"Logs"),
17+
"proxy_address": "userproxy.com",
1718
"proxy_port": ""
1819
}
1920
JWT_VALUES = {
@@ -23,14 +24,14 @@ class MockData:
2324
"key_alias": "testrest",
2425
"key_password": "testrest",
2526
"key_file_name": "testrest",
26-
"keys_directory": "../../cybersource_authentication_sdk_python/Resources/",
27+
"keys_directory": os.path.join(os.getcwd(),"resources"),
2728
"merchant_keyid": "08c94330-f618-42a3-b09d-e1e43be5efda",
2829
"merchant_secretkey": "yBJxy6LjM2TmcPGu+GaJrHtkke25fPpUX+UY6/L/1tE=",
29-
"enable_log": True,
30+
"enable_log": False,
3031
"log_file_name": "cybs",
3132
"log_maximum_size": 10485760,
32-
"log_directory": "../../cybersource_authentication_sdk_python/Logs/",
33-
"proxy_address": "userproxy.visa.com",
33+
"log_directory": os.path.join(os.getcwd(),"Logs"),
34+
"proxy_address": "userproxy.com",
3435
"proxy_port": ""
3536
}
3637
HTTP_DEFAULT_VALUES = {
@@ -40,14 +41,14 @@ class MockData:
4041
"key_alias": "testrest",
4142
"key_password": "testrest",
4243
"key_file_name": "testrest",
43-
"keys_directory": "../../cybersource_authentication_sdk_python/Resources/",
44+
"keys_directory": os.path.join(os.getcwd(),"resources"),
4445
"merchant_keyid": "08c94330-f618-42a3-b09d-e1e43be5efda",
4546
"merchant_secretkey": "yBJxy6LjM2TmcPGu+GaJrHtkke25fPpUX+UY6/L/1tE=",
4647
"enable_log": "",
4748
"log_file_name": "cybs",
4849
"log_maximum_size": "",
4950
"log_directory": "",
50-
"proxy_address": "userproxy.visa.com",
51+
"proxy_address": "userproxy.com",
5152
"proxy_port": ""
5253
}
5354
JWT_VALUES_FOR_PRODUCTION = {
@@ -60,11 +61,11 @@ class MockData:
6061
"keys_directory": "",
6162
"merchant_keyid": "08c94330-f618-42a3-b09d-e1e43be5efda",
6263
"merchant_secretkey": "yBJxy6LjM2TmcPGu+GaJrHtkke25fPpUX+UY6/L/1tE=",
63-
"enable_log": True,
64+
"enable_log": False,
6465
"log_file_name": "cybs",
6566
"log_maximum_size": 10485760,
66-
"log_directory": "../../cybersource_authentication_sdk_python/Logs/",
67-
"proxy_address": "userproxy.visa.com",
67+
"log_directory": os.path.join(os.getcwd(),"Logs"),
68+
"proxy_address": "userproxy.com",
6869
"proxy_port": ""
6970
}
7071
REQUEST_DATA = {
@@ -121,3 +122,16 @@ class MockData:
121122
}
122123
}
123124
}
125+
TRR_DATA = {
126+
"startDay": "23",
127+
"timeZone": "America/Chicago",
128+
"reportDefinitionName": "TransactionRequestClass",
129+
"startTime": "1100",
130+
"reportFrequency": "DAILY",
131+
"ReportName": "TRRReport",
132+
"reportFormat": "csv",
133+
"orgId": "testrest",
134+
"reportType": "detail",
135+
"reportFields": ["Request.RequestID", "Request.TransactionDate", "Request.MerchantReferenceNumber",
136+
"Request.MerchantID"]
137+
}

authenticationsdk/logger/Log.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ def setup_logger(mconfig):
1515
open(logger_file, "a+")
1616
if logger_file:
1717
if os.stat(logger_file).st_size > int(mconfig.maximum_size):
18-
updated_file = logger_folder + mconfig.log_file_name+"_" + datetime.now().strftime("%Y%m%d%H%M%S") + ".log"
18+
updated_file = os.path.join(logger_folder , mconfig.log_file_name)+"_" + datetime.now().strftime("%Y%m%d%H%M%S") + ".log"
1919
os.rename(logger_file, updated_file)
2020
# setting the logger object
2121
logger = logging.getLogger()

authenticationsdk/test/test_Authorization.py

+10-15
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,14 @@
33
from authenticationsdk.core.Authorization import *
44
import authenticationsdk.logger.Log
55
import authenticationsdk.util.PropertiesUtil
6-
import cybersource_rest_samples_python.data.RequestData
76
import logging
87
from authenticationsdk.core.MockData import *
98

109

1110
class TestBasicFunction(unittest.TestCase):
1211
def setUp(self):
1312
self.func = Authorization()
14-
self.merchant_config = MerchantConfiguration()
13+
self.merchant_config =MerchantConfiguration()
1514
self.date = self.merchant_config.get_time()
1615
logging.disable(logging.CRITICAL)
1716

@@ -61,9 +60,8 @@ def test_token_for_post_http(self):
6160
self.merchant_config.request_target = "/pts/v2/payments"
6261

6362
self.logger = authenticationsdk.logger.Log.setup_logger(self.merchant_config)
64-
self.request_json_path = "../../cybersource_authentication_sdk_python/Resources/request.json"
65-
self.merchant_config.request_json_path_data = cybersource_rest_samples_python.data.RequestData.json_file_data(
66-
self.request_json_path, self.merchant_config)
63+
64+
self.merchant_config.request_json_path_data = json.dumps(MockData.REQUEST_DATA)
6765

6866
self.assertIsNotNone(self.func.get_token(self.merchant_config, self.date, self.logger))
6967

@@ -75,9 +73,8 @@ def test_token_for_put_http(self):
7573
self.merchant_config.request_target = "/reporting/v2/reportSubscriptions/TRRReport?organizationId=testrest"
7674

7775
self.logger = authenticationsdk.logger.Log.setup_logger(self.merchant_config)
78-
self.request_json_path = "../../cybersource_authentication_sdk_python/Resources/trr_report.json"
79-
self.merchant_config.request_json_path_data = cybersource_rest_samples_python.data.RequestData.json_file_data(
80-
self.request_json_path, self.merchant_config)
76+
77+
self.merchant_config.request_json_path_data = json.dumps(MockData.TRR_DATA)
8178

8279
self.assertIsNotNone(self.func.get_token(self.merchant_config, self.date, self.logger))
8380

@@ -108,11 +105,10 @@ def test_token_for_post_jwt(self):
108105
self.merchant_config.set_merchantconfig(MockData.JWT_VALUES)
109106
self.merchant_config.request_type_method = "POST"
110107
self.merchant_config.request_target = "/pts/v2/payments/5246387105766473203529"
111-
108+
112109
self.logger = authenticationsdk.logger.Log.setup_logger(self.merchant_config)
113-
self.request_json_path = "../../cybersource_authentication_sdk_python/Resources/request.json"
114-
self.merchant_config.request_json_path_data = cybersource_rest_samples_python.data.RequestData.json_file_data(
115-
self.request_json_path, self.merchant_config)
110+
111+
self.merchant_config.request_json_path_data = json.dumps(MockData.REQUEST_DATA)
116112

117113
self.assertIsNotNone(self.func.get_token(self.merchant_config, self.date, self.logger))
118114

@@ -124,9 +120,8 @@ def test_token_for_put_jwt(self):
124120
self.merchant_config.request_target = "/reporting/v2/reportSubscriptions/TRRReport?organizationId=testrest"
125121

126122
self.logger = authenticationsdk.logger.Log.setup_logger(self.merchant_config)
127-
self.request_json_path = "../../cybersource_authentication_sdk_python/Resources/trr_report.json"
128-
self.merchant_config.request_json_path_data = cybersource_rest_samples_python.data.RequestData.json_file_data(
129-
self.request_json_path, self.merchant_config)
123+
124+
self.merchant_config.request_json_path_data =json.dumps(MockData.TRR_DATA)
130125

131126
self.assertIsNotNone(self.func.get_token(self.merchant_config, self.date, self.logger))
132127

setup.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
from setuptools import setup, find_packages
55

66
NAME = "cybersource-rest-client-python"
7-
VERSION = "0.0.3"
7+
VERSION = "0.0.4"
88
# To install the library, run the following
99
#
1010
# python setup.py install

0 commit comments

Comments
 (0)