spec/api/tokens_api_spec.rb in velopayments-2.18.113 vs spec/api/tokens_api_spec.rb in velopayments-2.19.40.beta1

- old
+ new

@@ -1,14 +1,14 @@ =begin #Velo Payments APIs ### Terms and Definitions Throughout this document and the Velo platform the following terms are used: * **Payor.** An entity (typically a corporation) which wishes to pay funds to one or more payees via a payout. * **Payee.** The recipient of funds paid out by a payor. * **Payment.** A single transfer of funds from a payor to a payee. * **Payout.** A batch of Payments, typically used by a payor to logically group payments (e.g. by business day). Technically there need be no relationship between the payments in a payout - a single payout can contain payments to multiple payees and/or multiple payments to a single payee. * **Sandbox.** An integration environment provided by Velo Payments which offers a similar API experience to the production environment, but all funding and payment events are simulated, along with many other services such as OFAC sanctions list checking. ## Overview The Velo Payments API allows a payor to perform a number of operations. The following is a list of the main capabilities in a natural order of execution: * Authenticate with the Velo platform * Maintain a collection of payees * Query the payor’s current balance of funds within the platform and perform additional funding * Issue payments to payees * Query the platform for a history of those payments This document describes the main concepts and APIs required to get up and running with the Velo Payments platform. It is not an exhaustive API reference. For that, please see the separate Velo Payments API Reference. ## API Considerations The Velo Payments API is REST based and uses the JSON format for requests and responses. Most calls are secured using OAuth 2 security and require a valid authentication access token for successful operation. See the Authentication section for details. Where a dynamic value is required in the examples below, the {token} format is used, suggesting that the caller needs to supply the appropriate value of the token in question (without including the { or } characters). Where curl examples are given, the –d @filename.json approach is used, indicating that the request body should be placed into a file named filename.json in the current directory. Each of the curl examples in this document should be considered a single line on the command-line, regardless of how they appear in print. ## Authenticating with the Velo Platform Once Velo backoffice staff have added your organization as a payor within the Velo platform sandbox, they will create you a payor Id, an API key and an API secret and share these with you in a secure manner. You will need to use these values to authenticate with the Velo platform in order to gain access to the APIs. The steps to take are explained in the following: create a string comprising the API key (e.g. 44a9537d-d55d-4b47-8082-14061c2bcdd8) and API secret (e.g. c396b26b-137a-44fd-87f5-34631f8fd529) with a colon between them. E.g. 44a9537d-d55d-4b47-8082-14061c2bcdd8:c396b26b-137a-44fd-87f5-34631f8fd529 base64 encode this string. E.g.: NDRhOTUzN2QtZDU1ZC00YjQ3LTgwODItMTQwNjFjMmJjZGQ4OmMzOTZiMjZiLTEzN2EtNDRmZC04N2Y1LTM0NjMxZjhmZDUyOQ== create an HTTP **Authorization** header with the value set to e.g. Basic NDRhOTUzN2QtZDU1ZC00YjQ3LTgwODItMTQwNjFjMmJjZGQ4OmMzOTZiMjZiLTEzN2EtNDRmZC04N2Y1LTM0NjMxZjhmZDUyOQ== perform the Velo authentication REST call using the HTTP header created above e.g. via curl: ``` curl -X POST \\ -H \"Content-Type: application/json\" \\ -H \"Authorization: Basic NDRhOTUzN2QtZDU1ZC00YjQ3LTgwODItMTQwNjFjMmJjZGQ4OmMzOTZiMjZiLTEzN2EtNDRmZC04N2Y1LTM0NjMxZjhmZDUyOQ==\" \\ 'https://api.sandbox.velopayments.com/v1/authenticate?grant_type=client_credentials' ``` If successful, this call will result in a **200** HTTP status code and a response body such as: ``` { \"access_token\":\"19f6bafd-93fd-4747-b229-00507bbc991f\", \"token_type\":\"bearer\", \"expires_in\":1799, \"scope\":\"...\" } ``` ## API access following authentication Following successful authentication, the value of the access_token field in the response (indicated in green above) should then be presented with all subsequent API calls to allow the Velo platform to validate that the caller is authenticated. This is achieved by setting the HTTP Authorization header with the value set to e.g. Bearer 19f6bafd-93fd-4747-b229-00507bbc991f such as the curl example below: ``` -H \"Authorization: Bearer 19f6bafd-93fd-4747-b229-00507bbc991f \" ``` If you make other Velo API calls which require authorization but the Authorization header is missing or invalid then you will get a **401** HTTP status response. -The version of the OpenAPI document: 2.18.113 +The version of the OpenAPI document: 2.19.40 Generated by: https://openapi-generator.tech -OpenAPI Generator version: 4.2.1-SNAPSHOT +OpenAPI Generator version: 4.2.3-SNAPSHOT =end require 'spec_helper' require 'json' @@ -30,146 +30,17 @@ it 'should create an instance of TokensApi' do expect(@api_instance).to be_instance_of(VeloPayments::TokensApi) end end - # unit tests for generate_otp - # Generate an OTP - # Generate an OTP and send to the MFA type specified in the request body - # @param token_id The UUID of the Token - # @param generate_otp_request The MFA type to send the generated OTP to - # @param [Hash] opts the optional parameters - # @return [nil] - describe 'generate_otp test' do - it 'should work' do - # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers - end - end - - # unit tests for generate_otp_for_sms - # Send an OTP to SMS Users - # <p>Generate an OTP and send to the SMS device if the user</p> <p>Only users who have SMS as their registered MFA device will receive an OTP</p> <p>Used in conjuction with endpoints that require the Velo-OTP header</p> - # @param token_id The UUID of the Token - # @param [Hash] opts the optional parameters - # @return [nil] - describe 'generate_otp_for_sms test' do - it 'should work' do - # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers - end - end - - # unit tests for get_qr_code_for_mfa - # Get a QR Code image - # <p>Get a QR Code for an MFA device that supports it </p> <p>The device must have first been registered</p> - # @param token_id The UUID of the Token - # @param [Hash] opts the optional parameters - # @option opts [Integer] :width The width of the image - # @option opts [Integer] :height The height of the image - # @return [File] - describe 'get_qr_code_for_mfa test' do - it 'should work' do - # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers - end - end - - # unit tests for get_verification_token_by_id - # Get Token - # Get a Single Verification Token by Id. - # @param token_id The UUID of the Token - # @param [Hash] opts the optional parameters - # @return [CheckTokenResponse] - describe 'get_verification_token_by_id test' do - it 'should work' do - # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers - end - end - - # unit tests for register_mfa - # Register an MFA Device - # <p>Some MFA Devices based on TOTP require a registration step (Authy, Authenticator) </p> <p>Registering the device will create a shared secret that the MFA device uses to generate OTPs</p> - # @param token_id The UUID of the Token - # @param register_mfa_request The MFA Type to register - # @param [Hash] opts the optional parameters - # @return [RegisterMFAResponse] - describe 'register_mfa test' do - it 'should work' do - # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers - end - end - # unit tests for resend_token # Resend a token # <p>Resend the specified token </p> <p>The token to resend must already exist for the user </p> <p>It will be revoked and a new one issued</p> # @param user_id The UUID of the User. # @param resend_token_request The type of token to resend # @param [Hash] opts the optional parameters # @return [nil] describe 'resend_token test' do - it 'should work' do - # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers - end - end - - # unit tests for submit_password - # Submit a password - # Submit a password - # @param token_id The UUID of the Token - # @param password_request The password - # @param [Hash] opts the optional parameters - # @option opts [String] :velo_otp required when updating password using reset password <P> The OTP is supplied by the users MFA device - # @return [AccessTokenResponse] - describe 'submit_password test' do - it 'should work' do - # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers - end - end - - # unit tests for unlock_account_with_token - # Unlock the user - # <p>When a user is locked out of their account due to execeding the limit of login attempts</p> <p>They can use a token to unlock their account </p> <p>Submitting the token will unlock the account associated with the token</p> - # @param token_id The UUID of the Token - # @param [Hash] opts the optional parameters - # @return [nil] - describe 'unlock_account_with_token test' do - it 'should work' do - # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers - end - end - - # unit tests for validate_mfa - # Validate an MFA Device - # <p>Validate the user's registered MFA device with an OTP </p> <p>The response will be different based on the token type against which the MFA is validated </p> <p>For INVITE_MFA_USER tokens the response will be 200 and an access token will be returned i the response </p> <p>For MFA_REGISTRATION tokens the response will be 204</p> - # @param token_id The UUID of the Token - # @param validate_mfa_request The OTP generated or received by the device - # @param [Hash] opts the optional parameters - # @return [AccessTokenResponse] - describe 'validate_mfa test' do - it 'should work' do - # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers - end - end - - # unit tests for validate_otp - # Validate an OTP - # <p>Validate the OTP </p> <p>The token that was used in the request will be revoked and a new token issued </p> <p>The new token link will be returned in a location header</p> <p>If there are too many invalid OTP requests the token may be disabled</p> - # @param token_id The UUID of the Token - # @param validate_otp_request The OTP generated and sent to the device - # @param [Hash] opts the optional parameters - # @return [nil] - describe 'validate_otp test' do - it 'should work' do - # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers - end - end - - # unit tests for validate_password - # Validate the proposed password - # validate the password and return a score - # @param token_id The UUID of the Token - # @param password_request The password - # @param [Hash] opts the optional parameters - # @return [ValidatePasswordResponse] - describe 'validate_password test' do it 'should work' do # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers end end