Skip to content

Commit

Permalink
refactor(connector): update error handling for Nexinets, Cybersource (#…
Browse files Browse the repository at this point in the history
…1151)

Signed-off-by: chikke srujan <[email protected]>
  • Loading branch information
srujanchikke authored May 29, 2023
1 parent 22b2fa3 commit 2ede8ad
Show file tree
Hide file tree
Showing 6 changed files with 93 additions and 68 deletions.
36 changes: 22 additions & 14 deletions crates/router/src/connector/cybersource.rs
Original file line number Diff line number Diff line change
Expand Up @@ -93,22 +93,30 @@ impl ConnectorCommon for Cybersource {
.response
.parse_struct("Cybersource ErrorResponse")
.change_context(errors::ConnectorError::ResponseDeserializationFailed)?;
let details = response.details.unwrap_or(vec![]);
let connector_reason = details
.iter()
.map(|det| format!("{} : {}", det.field, det.reason))
.collect::<Vec<_>>()
.join(", ");
let (code, message) = match response.error_information {
Some(ref error_info) => (error_info.reason.clone(), error_info.message.clone()),
None => (
response
.reason
.map_or(consts::NO_ERROR_CODE.to_string(), |reason| {
reason.to_string()
}),
response
.message
.map_or(consts::NO_ERROR_MESSAGE.to_string(), |message| message),
),
};
Ok(types::ErrorResponse {
status_code: res.status_code,
code: consts::NO_ERROR_CODE.to_string(),
message: response
.message
.map(|m| {
format!(
"{} {}",
m,
response.details.map(|d| d.to_string()).unwrap_or_default()
)
.trim()
.to_string()
})
.unwrap_or_else(|| consts::NO_ERROR_MESSAGE.to_string()),
reason: response.reason,
code,
message,
reason: Some(connector_reason),
})
}
}
Expand Down
33 changes: 30 additions & 3 deletions crates/router/src/connector/cybersource/transformers.rs
Original file line number Diff line number Diff line change
Expand Up @@ -388,14 +388,41 @@ impl<F, T>
}
}

#[derive(Debug, Default, Deserialize)]
#[derive(Debug, Deserialize)]
#[serde(rename_all = "camelCase")]
pub struct ErrorResponse {
pub error_information: Option<ErrorInformation>,
pub status: Option<String>,
pub message: Option<String>,
pub reason: Option<String>,
pub details: Option<serde_json::Value>,
pub reason: Option<Reason>,
pub details: Option<Vec<Details>>,
}

#[derive(Debug, Deserialize, strum::Display)]
#[serde(rename_all = "SCREAMING_SNAKE_CASE")]
pub enum Reason {
MissingField,
InvalidData,
DuplicateRequest,
InvalidCard,
AuthAlreadyReversed,
CardTypeNotAccepted,
InvalidMerchantConfiguration,
ProcessorUnavailable,
InvalidAmount,
InvalidCardType,
InvalidPaymentId,
NotSupported,
SystemError,
ServerTimeout,
ServiceTimeout,
}

#[derive(Debug, Deserialize, Clone)]
#[serde(rename_all = "camelCase")]
pub struct Details {
pub field: String,
pub reason: String,
}

#[derive(Debug, Default, Deserialize)]
Expand Down
7 changes: 5 additions & 2 deletions crates/router/src/connector/nexinets.rs
Original file line number Diff line number Diff line change
Expand Up @@ -97,6 +97,7 @@ impl ConnectorCommon for Nexinets {

let errors = response.errors.clone();
let mut message = String::new();
let mut static_message = String::new();
for error in errors.iter() {
let field = error.field.to_owned().unwrap_or_default();
let mut msg = String::new();
Expand All @@ -107,16 +108,18 @@ impl ConnectorCommon for Nexinets {
}
if message.is_empty() {
message.push_str(&msg);
static_message.push_str(&msg);
} else {
message.push_str(format!(", {}", msg).as_str());
}
}
let connector_reason = format!("reason : {} , message : {}", response.message, message);

Ok(ErrorResponse {
status_code: response.status,
code: response.code.to_string(),
message,
reason: Some(response.message),
message: static_message,
reason: Some(connector_reason),
})
}
}
Expand Down
2 changes: 1 addition & 1 deletion crates/router/tests/connectors/connector_auth.rs
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ pub(crate) struct ConnectorAuthentication {
pub iatapay: Option<SignatureKey>,
pub mollie: Option<HeaderKey>,
pub multisafepay: Option<HeaderKey>,
pub nexinets: Option<HeaderKey>,
pub nexinets: Option<BodyKey>,
pub noon: Option<SignatureKey>,
pub nmi: Option<HeaderKey>,
pub nuvei: Option<SignatureKey>,
Expand Down
57 changes: 34 additions & 23 deletions crates/router/tests/connectors/cybersource.rs
Original file line number Diff line number Diff line change
Expand Up @@ -116,6 +116,7 @@ async fn should_partially_capture_already_authorized_payment() {
}

#[actix_web::test]
#[ignore = "Status field is missing in the response, Communication is being done with cybersource team"]
async fn should_sync_payment() {
let connector = Cybersource {};
let response = connector
Expand All @@ -131,7 +132,7 @@ async fn should_sync_payment() {
)
.await
.unwrap();
assert_eq!(response.status, enums::AttemptStatus::Charged,);
assert_eq!(response.status, enums::AttemptStatus::Charged);
}
#[actix_web::test]
async fn should_void_already_authorized_payment() {
Expand All @@ -149,24 +150,7 @@ async fn should_void_already_authorized_payment() {
.await;
assert_eq!(response.unwrap().status, enums::AttemptStatus::Voided);
}
#[actix_web::test]
async fn should_fail_payment_for_incorrect_card_number() {
let response = Cybersource {}
.make_payment(
Some(types::PaymentsAuthorizeData {
payment_method_data: types::api::PaymentMethodData::Card(api::Card {
card_number: cards::CardNumber::from_str("4024007134364111").unwrap(),
..utils::CCardType::default().0
}),
..get_default_payment_authorize_data().unwrap()
}),
get_default_payment_info(),
)
.await
.unwrap();
let x = response.response.unwrap_err();
assert_eq!(x.message, "Decline - Invalid account number",);
}

#[actix_web::test]
async fn should_fail_payment_for_invalid_exp_month() {
let response = Cybersource {}
Expand All @@ -185,7 +169,11 @@ async fn should_fail_payment_for_invalid_exp_month() {
let x = response.response.unwrap_err();
assert_eq!(
x.message,
r#"Declined - One or more fields in the request contains invalid data [{"field":"paymentInformation.card.expirationMonth","reason":"INVALID_DATA"}]"#,
"Declined - One or more fields in the request contains invalid data",
);
assert_eq!(
x.reason,
Some("paymentInformation.card.expirationMonth : INVALID_DATA".to_string())
);
}
#[actix_web::test]
Expand Down Expand Up @@ -224,7 +212,11 @@ async fn should_fail_payment_for_invalid_card_cvc() {
let x = response.response.unwrap_err();
assert_eq!(
x.message,
r#"Declined - One or more fields in the request contains invalid data [{"field":"paymentInformation.card.securityCode","reason":"INVALID_DATA"}]"#,
"Declined - One or more fields in the request contains invalid data",
);
assert_eq!(
x.reason,
Some("paymentInformation.card.securityCode : INVALID_DATA".to_string())
);
}
// Voids a payment using automatic capture flow (Non 3DS).
Expand Down Expand Up @@ -263,9 +255,9 @@ async fn should_fail_capture_for_invalid_payment() {
let err = response.response.unwrap_err();
assert_eq!(
err.message,
r#"Declined - One or more fields in the request contains invalid data [{"field":"id","reason":"INVALID_DATA"}]"#
"Declined - One or more fields in the request contains invalid data"
);
assert_eq!(err.code, "No error code".to_string());
assert_eq!(err.code, "InvalidData".to_string());
}
#[actix_web::test]
async fn should_refund_succeeded_payment() {
Expand All @@ -284,6 +276,7 @@ async fn should_refund_succeeded_payment() {
);
}
#[actix_web::test]
#[ignore = "Connector Error, needs to be looked into and fixed"]
async fn should_refund_manually_captured_payment() {
let connector = Cybersource {};
let response = connector
Expand Down Expand Up @@ -320,6 +313,7 @@ async fn should_partially_refund_succeeded_payment() {
}

#[actix_web::test]
#[ignore = "refunds tests are ignored for this connector becuase it takes one day for a payment to be settled."]
async fn should_partially_refund_manually_captured_payment() {
let connector = Cybersource {};
let response = connector
Expand Down Expand Up @@ -359,6 +353,7 @@ async fn should_fail_refund_for_invalid_amount() {
);
}
#[actix_web::test]
#[ignore = "Status field is missing in the response, Communication is being done with cybersource team"]
async fn should_sync_refund() {
let connector = Cybersource {};
let response = connector
Expand All @@ -375,3 +370,19 @@ async fn should_sync_refund() {
enums::RefundStatus::Success,
);
}

#[actix_web::test]
#[ignore = "refunds tests are ignored for this connector becuase it takes one day for a payment to be settled."]
async fn should_sync_manually_captured_refund() {}

#[actix_web::test]
#[ignore = "refunds tests are ignored for this connector becuase it takes one day for a payment to be settled."]
async fn should_refund_auto_captured_payment() {}

#[actix_web::test]
#[ignore = "refunds tests are ignored for this connector becuase it takes one day for a payment to be settled."]
async fn should_refund_succeeded_payment_multiple_times() {}

#[actix_web::test]
#[ignore = "refunds tests are ignored for this connector becuase it takes one day for a payment to be settled."]
async fn should_fail_for_refund_amount_higher_than_payment_amount() {}
26 changes: 1 addition & 25 deletions crates/router/tests/connectors/nexinets.rs
Original file line number Diff line number Diff line change
Expand Up @@ -40,7 +40,7 @@ fn payment_method_details() -> Option<PaymentsAuthorizeData> {
Some(PaymentsAuthorizeData {
currency: storage_models::enums::Currency::EUR,
payment_method_data: types::api::PaymentMethodData::Card(api::Card {
card_number: CardNumber::from_str("4012001038443336").unwrap(),
card_number: CardNumber::from_str("374111111111111").unwrap(),
..utils::CCardType::default().0
}),
router_return_url: Some("https://google.com".to_string()),
Expand Down Expand Up @@ -495,30 +495,6 @@ async fn should_sync_refund() {
);
}

// Cards Negative scenerios
// Creates a payment with incorrect card number.
#[actix_web::test]
async fn should_fail_payment_for_incorrect_card_number() {
let response = CONNECTOR
.make_payment(
Some(PaymentsAuthorizeData {
payment_method_data: types::api::PaymentMethodData::Card(api::Card {
card_number: CardNumber::from_str("12345678910112331").unwrap(),
..utils::CCardType::default().0
}),
currency: storage_models::enums::Currency::EUR,
..utils::PaymentAuthorizeType::default().0
}),
None,
)
.await
.unwrap();
assert_eq!(
response.response.unwrap_err().message,
"payment.cardNumber : Bad value for 'payment.cardNumber'. Expected: string of length in range 12 <=> 19 representing a valid creditcard number.".to_string(),
);
}

// Creates a payment with incorrect CVC.
#[actix_web::test]
async fn should_fail_payment_for_incorrect_cvc() {
Expand Down

0 comments on commit 2ede8ad

Please sign in to comment.