Paypal Sandbox 直接付款内部错误 10001 超时处理请求
这是在 MVC2 项目中,所以我在 ASP 中使用 C#。 这是我发送到 https://api-3t.sandbox.paypal.com/nvp 的内容:
VERSION = 65.0
SIGNATURE = AFcWxV21C7fd0v3bYYYRCpSSRl31AxdW2pQp.tWHTjGNcHflR-LJhJ0t
USER = seller_1283487740_biz_api1.gmail.com
PWD = 1283487748
AMOUNT = 50.00
CREDITCARDTYPE = Visa
ACCT = 4031477440127509
EXPDATE = 12/2015
CVV2 =123
IPADDRESS = 127.0.0.1
METHOD = DoDirectPayment
我可以 GetBalance,当我故意发送错误的内容时,我可能会产生其他错误,但 DoDirectPayment 或 DoAuthorization 返回此:
TIMESTAMP = 2010-12-24T03:35:10Z
CORRELATIONID = 2ca329fdbe3c0
ACK = Failure
L_ERRORCODE0 = 10001
L_SHORTMESSAGE0 = Internal Error
L_LONGMESSAGE0 = Timeout processing request
为什么我会收到此错误?
This is in an MVC2 project, so I'm using C# in ASP.
This is what I'm sending to https://api-3t.sandbox.paypal.com/nvp:
VERSION = 65.0
SIGNATURE = AFcWxV21C7fd0v3bYYYRCpSSRl31AxdW2pQp.tWHTjGNcHflR-LJhJ0t
USER = seller_1283487740_biz_api1.gmail.com
PWD = 1283487748
AMOUNT = 50.00
CREDITCARDTYPE = Visa
ACCT = 4031477440127509
EXPDATE = 12/2015
CVV2 =123
IPADDRESS = 127.0.0.1
METHOD = DoDirectPayment
I can GetBalance, I can produce other errors when I intentionally send something wrong, but DoDirectPayment or DoAuthorization returns this:
TIMESTAMP = 2010-12-24T03:35:10Z
CORRELATIONID = 2ca329fdbe3c0
ACK = Failure
L_ERRORCODE0 = 10001
L_SHORTMESSAGE0 = Internal Error
L_LONGMESSAGE0 = Timeout processing request
Why Am I getting this error?
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(4)
是的,我也得到同样的事情。我在他们的生产 URL 上测试了我的代码,效果很好。
考虑到他们对开发人员的关注程度,令人惊讶的是他们的 API 是多么糟糕。我可以在他们的小社交网络 x.com 上获得积分并关注其他人,但我不知道 API 的当前版本是什么!?! (您必须查看网页的源代码并发现它嵌入在 HTML 注释中)
Yeah, I'm getting the same thing. I tested my code on their production URL and it worked just fine.
Given how much they are focused on developers, it's amazing how horrible their API is. I can get points and follow other people on their little social network, x.com, but I CAN'T TELL WHAT THE CURRENT VERSION OF THE API IS!?! (You have to view the source of the webpage and find it embedded in an HTML comment)
</rant>
根据我所读到的内容,这可能是数据格式错误的迹象。就我而言,我发送表单是
因为
我没有阅读有关表单编码的文档中的任何地方,但是一旦我更改了它,PP 服务器就变得更加友好。
From what I've read around, this can be a sign of malformed data. In my case, I was sending the form as
instead of
I hadn't read anywhere in the docs about form encoding, but as soon as I changed it the PP server got a lot more friendly.
我相信它的 PayPal 防御功能能够抵御攻击。代码中存在某些执行操作的过程
I believe its Pay Pals defence againest attacks. Theres certain procedures that action in the code
如果服务器认为它受到攻击,则通过沙盒控制面板向用户提供这些错误消息。
Through a Sandbox control panel these error messages are given to a user if the server believes that it is under-attack.