/
tokenizationdecisioning.go
97 lines (82 loc) · 3.67 KB
/
tokenizationdecisioning.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
// File generated from our OpenAPI spec by Stainless. See CONTRIBUTING.md for details.
package lithic
import (
"context"
"net/http"
"github.com/lithic-com/lithic-go/internal/apijson"
"github.com/lithic-com/lithic-go/internal/requestconfig"
"github.com/lithic-com/lithic-go/option"
)
// TokenizationDecisioningService contains methods and other services that help
// with interacting with the lithic API. Note, unlike clients, this service does
// not read variables from the environment automatically. You should not
// instantiate this service directly, and instead use the
// [NewTokenizationDecisioningService] method instead.
type TokenizationDecisioningService struct {
Options []option.RequestOption
}
// NewTokenizationDecisioningService generates a new service that applies the given
// options to each request. These options are applied after the parent client's
// options (if there is one), and before any request-specific options.
func NewTokenizationDecisioningService(opts ...option.RequestOption) (r *TokenizationDecisioningService) {
r = &TokenizationDecisioningService{}
r.Options = opts
return
}
// Retrieve the Tokenization Decisioning secret key. If one does not exist your
// program yet, calling this endpoint will create one for you. The headers of the
// Tokenization Decisioning request will contain a hmac signature which you can use
// to verify requests originate from Lithic. See
// [this page](https://docs.lithic.com/docs/events-api#verifying-webhooks) for more
// detail about verifying Tokenization Decisioning requests.
func (r *TokenizationDecisioningService) GetSecret(ctx context.Context, opts ...option.RequestOption) (res *TokenizationSecret, err error) {
opts = append(r.Options[:], opts...)
path := "tokenization_decisioning/secret"
err = requestconfig.ExecuteNewRequest(ctx, http.MethodGet, path, nil, &res, opts...)
return
}
// Generate a new Tokenization Decisioning secret key. The old Tokenization
// Decisioning secret key will be deactivated 24 hours after a successful request
// to this endpoint.
func (r *TokenizationDecisioningService) RotateSecret(ctx context.Context, opts ...option.RequestOption) (res *TokenizationDecisioningRotateSecretResponse, err error) {
opts = append(r.Options[:], opts...)
path := "tokenization_decisioning/secret/rotate"
err = requestconfig.ExecuteNewRequest(ctx, http.MethodPost, path, nil, &res, opts...)
return
}
type TokenizationSecret struct {
// The Tokenization Decisioning HMAC secret
Secret string `json:"secret"`
JSON tokenizationSecretJSON `json:"-"`
}
// tokenizationSecretJSON contains the JSON metadata for the struct
// [TokenizationSecret]
type tokenizationSecretJSON struct {
Secret apijson.Field
raw string
ExtraFields map[string]apijson.Field
}
func (r *TokenizationSecret) UnmarshalJSON(data []byte) (err error) {
return apijson.UnmarshalRoot(data, r)
}
func (r tokenizationSecretJSON) RawJSON() string {
return r.raw
}
type TokenizationDecisioningRotateSecretResponse struct {
// The new Tokenization Decisioning HMAC secret
Secret string `json:"secret"`
JSON tokenizationDecisioningRotateSecretResponseJSON `json:"-"`
}
// tokenizationDecisioningRotateSecretResponseJSON contains the JSON metadata for
// the struct [TokenizationDecisioningRotateSecretResponse]
type tokenizationDecisioningRotateSecretResponseJSON struct {
Secret apijson.Field
raw string
ExtraFields map[string]apijson.Field
}
func (r *TokenizationDecisioningRotateSecretResponse) UnmarshalJSON(data []byte) (err error) {
return apijson.UnmarshalRoot(data, r)
}
func (r tokenizationDecisioningRotateSecretResponseJSON) RawJSON() string {
return r.raw
}