Ich teste die Amazon Selling Partner API (SP-API) unter Verwendung der Sandbox-Umgebung, insbesondere die GET/Bestellungen/v0/Bestellungen Endpunkt. class = "Lang-json PrettyPrint-Override">
{
"errors": [
{
"code": "Unauthorized",
"message": "Access to requested resource is denied.",
"details": "Access token is missing in the request header."
}
]
}
Request Details:
• Endpoint:
https://sandbox.sellingpartnerapi-na.amazon.com/orders/v0/orders?CreatedAfter=TEST_CASE_200&MarketplaceIds=ATVPDKIKX0DER
Headers:
x-amzn-access-token:
x-amz-security-token:
x-amz-date:
Host: sandbox.sellingpartnerapi-na.amazon.com
Accept: application/json
Authorization: AWS4-HMAC-SHA256 ... (generated with SigV4)
Auth flow:
1. Get LWA token using refresh token, client ID, and client secret.
2. AssumeRole using long-term AWS access key and secret key.
3. Sign the request with botocore’s SigV4Auth.
Code:
I’m following this basic structure:
# Get LWA token
# Assume role
# Sign request using SigV4Auth from botocore.auth
# Send with requests.Session().send()
What I’ve checked:
• LWA token is valid and not expired.
• Temporary credentials from AssumeRole include session token.
• All required headers (including x-amzn-access-token) are correctly set.
• Endpoint, query parameters, and service name are accurate.
• SigV4 signature is freshly generated for each request.
Questions:
• Is there any known issue with the sandbox and GET /orders/v0/orders?
• Is it possible the sandbox rejects requests even with proper headers for some TEST_CASE values?
• Could the issue stem from a missing permission even in the sandbox?
Any help or clarification is much appreciated!
Ich teste die Amazon Selling Partner API (SP-API) unter Verwendung der Sandbox-Umgebung, insbesondere die GET/Bestellungen/v0/Bestellungen Endpunkt. class = "Lang-json PrettyPrint-Override">[code]{ "errors": [ { "code": "Unauthorized", "message": "Access to requested resource is denied.", "details": "Access token is missing in the request header." } ] }
Auth flow: 1. Get LWA token using refresh token, client ID, and client secret. 2. AssumeRole using long-term AWS access key and secret key. 3. Sign the request with botocore’s SigV4Auth.
Code:
I’m following this basic structure: # Get LWA token # Assume role # Sign request using SigV4Auth from botocore.auth # Send with requests.Session().send()
What I’ve checked: • LWA token is valid and not expired. • Temporary credentials from AssumeRole include session token. • All required headers (including x-amzn-access-token) are correctly set. • Endpoint, query parameters, and service name are accurate. • SigV4 signature is freshly generated for each request.
Questions: • Is there any known issue with the sandbox and GET /orders/v0/orders? • Is it possible the sandbox rejects requests even with proper headers for some TEST_CASE values? • Could the issue stem from a missing permission even in the sandbox?
Any help or clarification is much appreciated! [/code]
Ich habe eine Web -App mit PHP (LaRavel genauer, aber keine Rolle), in der ich die Google OAuth 2.0 -Authentifizierung für Benutzer in den GOOGLE -Arbeitsspitzen von Customer implementiere. Der...
Mein Ziel ist es, unsere Website mit Amazon Checkout zu integrieren. Wir haben uns bereits mit Google- und PayPal -APIs mit geringfügigen Problemen miteinander verbunden. Mit Amazon haben wir jedoch...
Mit Amazon Products API möchte ich erste Produkte in Kategorien DVD und Amazon Instant Video mit Keyword My Movie gefunden.$amazonEcs = new AmazonECS(AWS_API_KEY, AWS_API_SECRET_KEY, 'com',...