Using Postman: Difference between revisions

From Izara Wiki
Jump to navigation Jump to search
No edit summary
 
(13 intermediate revisions by 2 users not shown)
Line 1: Line 1:
= Connecting Postman to API Gateway =
= Connecting Postman to API Gateway =
== Connect API to Post man.  ==
 
== Connect API to Postman ==
 
# AWS API Gateway: click name of service api
# AWS API Gateway: click name of service api
#: [[File:Screenshot from 2022-10-10 10-07-58.png]]
#: [[File:Screenshot from 2022-10-10 10-07-58.png]]
# Click stage /Test  
# Click stage /Test  
#: [[File:Screenshot from 2022-10-10 10-33-30.png]]
#: [[File:Screenshot from 2022-10-10 10-33-30.png]]
#* and click export choose ..”Export as Swagger+Postman Extensions” copy code JSON  
#* and click export choose ..”Export as Swagger+Postman Extensions” copy code JSON, if Postman does not work with JSON, try YAML
#: [[File:Screenshot from 2022-10-10 10-38-08.png]]
#: [[File:Screenshot from 2022-10-10 10-38-08.png]]
# Go to postman and paste in import/ Raw text/ continue.
# Go to postman and paste in import/ Raw text/ continue.
Line 13: Line 15:
#: [[File:Screenshot from 2022-10-10 10-46-07.png]]
#: [[File:Screenshot from 2022-10-10 10-46-07.png]]


== Manually get Access Token ==
=== Method 1: Use Izara frontend ===
* Only works if frontend signin  currently functioning


== Access Token ==
web interface: https://d1ky427yqbqz8o.cloudfront.net/buying
web interface: https://d1gix48j5w3eur.cloudfront.net/buying
# Navbar > Sign in using mock account (suggested), if you signup with new user will get default role in  basicUser, that mean you NOT allow to access all functions.
# Navbar > Sign in using mock account (suggested), if you signup with new user will get default role in  basicUser, that mean you NOT allow to access all functions.
#:[[File:Screenshot from 2022-10-10 10-55-56.png]]
#:[[File:Screenshot from 2022-10-10 10-55-56.png]]
Line 23: Line 29:
#* Session Storage > http... > access_token and copy these token to postman  
#* Session Storage > http... > access_token and copy these token to postman  
#:[[File:Screenshot from 2022-10-10 10-58-56.png]]
#:[[File:Screenshot from 2022-10-10 10-58-56.png]]
#  Go to postman and paste token to Authorization > TYPE: Bearer Token >> 
[Token] ...
#:[[File:Screenshot from 2022-10-10 11-00-12.png]]
# For auth: UserLevel, need to send “targerUserId” in Params>Path Variables>
KEY: targetUserId
VALUE: <targetUserId>


=== Email ===
=== Method 2: Use AWS Interface and Postman ===
* Email use in web interface for get access token.
 
# basicUserA
# go to AWS > Cognito > UserPool > App Client Settings
# click on Laung Hosted UI for correct client app
# sign in
# Cognito will try to redirect and may fail, but can copy code from url:
#: [[File:CognitoSignInUrlWithCode_2023-01-13_12-45-29.png]]
# Postman setup new request as follows:
#: [[File:PostmanConfigForRequestToken_2023-01-13_12-49-57.png]]
# invoke request and should get access token
# TTL of token will depend on setting in Cognito app, can increase so not need to do often
 
=== Add Access Token to Postman requests ===
 
# paste token to Authorization > TYPE: Bearer Token >>  [Token] ...
#: [[File:Screenshot from 2022-10-10 11-00-12.png]]
# For auth: UserLevel, need to send '''“targerUserId”''' in Params > Path Variables > KEY: targetUserId, VALUE: <targetUserId>
 
== Default Test Seed Data email accounts ==
Email use in web interface for get access token.
# '''basicUserA'''
#:Email: success+basicUserTest@simulator.amazonses.com
#:Email: success+basicUserTest@simulator.amazonses.com
#:Password: Abc123456!  
#:Password: Abc123456!  
# verifiedUserA
# '''verifiedUserA'''
#:Email: success+verifiedUserTestA@simulator.amazonses.com  
#:Email: success+verifiedUserTestA@simulator.amazonses.com  
#:Password: Abc123456!
#:Password: Abc123456!
# verifiedUserB
# '''verifiedUserB'''
#:Email: success+verifiedUserTestB@simulator.amazonses.com
#:Email: success+verifiedUserTestB@simulator.amazonses.com
#:Password: Abc123456!
#:Password: Abc123456!
#superUserA
#'''superUserA'''
#:Email: success+superUserTest@simulator.amazonses.com  
#:Email: success+superUserTest@simulator.amazonses.com  
#:Password: Abc123456!
#:Password: Abc123456!


== Test API in post man ==
= Setup requests in Postman =
# Click on workspace and choose folder and file testing  
 
#*Click Body choose rew> JSON and push your request in code block.  
# click on workspace and choose folder and file testing  
#*and send message.   
#* click Body choose raw > JSON and push your request in code block.  
#:[[File:Screenshot from 2022-10-10 11-31-23.png]]
#* and send message.   
#Below block show return response.
#: [[File:Screenshot from 2022-10-10 11-31-23.png]]
#*If test api works . will show '''return response''' and status code: '''200 OK'''
# below block show return response.
#*You can see more response see in '''cloudwatch''' in function testing.
#* If test api works . will show '''return response''' and status code: '''200 OK'''
#:[[File:Screenshot from 2022-10-10 11-39-07.png]]
#* You can see more response see in '''cloudwatch''' in function testing.
#: [[File:Screenshot from 2022-10-10 11-39-07.png]]
 
 
= [[API Gateway Authorizers]] =

Latest revision as of 06:55, 19 January 2023

Connecting Postman to API Gateway

Connect API to Postman

  1. AWS API Gateway: click name of service api
    Screenshot from 2022-10-10 10-07-58.png
  2. Click stage /Test
    Screenshot from 2022-10-10 10-33-30.png
    • and click export choose ..”Export as Swagger+Postman Extensions” copy code JSON, if Postman does not work with JSON, try YAML
    Screenshot from 2022-10-10 10-38-08.png
  3. Go to postman and paste in import/ Raw text/ continue.
    • a. Screenshot from 2022-10-10 10-41-59.png
    • b. Screenshot from 2022-10-10 10-43-05.png
  4. Now My Workspace connect to Api finished.
    Screenshot from 2022-10-10 10-46-07.png

Manually get Access Token

Method 1: Use Izara frontend

  • Only works if frontend signin currently functioning

web interface: https://d1ky427yqbqz8o.cloudfront.net/buying

  1. Navbar > Sign in using mock account (suggested), if you signup with new user will get default role in basicUser, that mean you NOT allow to access all functions.
    Screenshot from 2022-10-10 10-55-56.png
  2. F12 to see element
    • select tab >> Application
    Screenshot from 2022-10-10 10-56-31.png
    • Session Storage > http... > access_token and copy these token to postman
    Screenshot from 2022-10-10 10-58-56.png

Method 2: Use AWS Interface and Postman

  1. go to AWS > Cognito > UserPool > App Client Settings
  2. click on Laung Hosted UI for correct client app
  3. sign in
  4. Cognito will try to redirect and may fail, but can copy code from url:
    CognitoSignInUrlWithCode 2023-01-13 12-45-29.png
  5. Postman setup new request as follows:
    PostmanConfigForRequestToken 2023-01-13 12-49-57.png
  6. invoke request and should get access token
  7. TTL of token will depend on setting in Cognito app, can increase so not need to do often

Add Access Token to Postman requests

  1. paste token to Authorization > TYPE: Bearer Token >> [Token] ...
    Screenshot from 2022-10-10 11-00-12.png
  2. For auth: UserLevel, need to send “targerUserId” in Params > Path Variables > KEY: targetUserId, VALUE: <targetUserId>

Default Test Seed Data email accounts

Email use in web interface for get access token.

  1. basicUserA
    Email: success+basicUserTest@simulator.amazonses.com
    Password: Abc123456!
  2. verifiedUserA
    Email: success+verifiedUserTestA@simulator.amazonses.com
    Password: Abc123456!
  3. verifiedUserB
    Email: success+verifiedUserTestB@simulator.amazonses.com
    Password: Abc123456!
  4. superUserA
    Email: success+superUserTest@simulator.amazonses.com
    Password: Abc123456!

Setup requests in Postman

  1. click on workspace and choose folder and file testing
    • click Body choose raw > JSON and push your request in code block.
    • and send message.
    Screenshot from 2022-10-10 11-31-23.png
  2. below block show return response.
    • If test api works . will show return response and status code: 200 OK
    • You can see more response see in cloudwatch in function testing.
    Screenshot from 2022-10-10 11-39-07.png


API Gateway Authorizers