diff --git a/features/proof/findProofByPresentationId.feature b/features/proof/findProofByPresentationId.feature new file mode 100644 index 0000000000000000000000000000000000000000..3f79e64fd13c201d7770d7cb9ffc43c4b7d539bb --- /dev/null +++ b/features/proof/findProofByPresentationId.feature @@ -0,0 +1,29 @@ +Feature: Get Proof Presentation By Id + Return the single proof presentation details + +Scenario: Provide valid presentation id + Given The presentation id is available on agent database. + When provide valid presentation id. + Then should return proof presentation details. + +Scenario: Provide invalid presentation id + Given The presentation id available. + When provide invalid presentation id. + Then should return no data found with status code 404. + +Scenario: Provide validated page and pageSize + Given proof presentation data available on OCM database. + When passed valid page. + And passed valid pageSize. + Then should get proof presentation list. + +Scenario: Provide validated page and pageSize + Given proof presentation data is not available on OCM database. + When passed valid page. + And passed valid pageSize. + Then should get http status 404. + +Scenario: Not provide a presentation id + Given The presentation id available. + When not provide presentation id. + Then should return presentation request required following attributes ( presentation_id ) with status code 400. \ No newline at end of file diff --git a/features/proof/sendOutOfBandPresentationRequest.feature b/features/proof/sendOutOfBandPresentationRequest.feature new file mode 100644 index 0000000000000000000000000000000000000000..b8c631cd566f1c2ef4bdd0cd413f428a57dd7fa9 --- /dev/null +++ b/features/proof/sendOutOfBandPresentationRequest.feature @@ -0,0 +1,14 @@ +As a OCM Admin + I want to verify credentials without connection. + +Scenario: OCM admin verify credentials + Given PCM user should hold credentials in there wallet. + When OCM verifer orgnization sends a proof presentation request with following fields ( schemaId or credentialDefId, attributes ) to PCM user. + And PCM user share the attributes from requested credentials to OCM verifer. + And OCM verifer verify the presentation acknowledgement. + Then Presentation request should be in 'verified' state. + +Scenario: OCM admin verify credentials + Given PCM user should hold credentials in there wallet. + When OCM admin send a credential request to PCM user. + And PCM user decline the credential request witch will requested from OCM admin. diff --git a/features/proof/sendPresentationRequest.feature b/features/proof/sendPresentationRequest.feature new file mode 100644 index 0000000000000000000000000000000000000000..ad11156844ffbd25faba9d8ac50ae257d7dfc80b --- /dev/null +++ b/features/proof/sendPresentationRequest.feature @@ -0,0 +1,18 @@ +As a OCM Admin + I want to verify credentials. + +Scenario: OCM admin verify credentials + Given PCM user should hold credentials in there wallet. + And PCM user connection must be in trusted state with verifer. + When OCM verifer orgnization sends a proof presentation request with following fields ( connectionId, schemaId or credentialDefId, attributes ) to PCM user. + And PCM user share the attributes from requested credentials to OCM verifer. + And OCM verifer verify the presentation acknowledgement. + Then Presentation request should be in 'verified' state. + +Scenario: PCM user decline proof request + Given PCM user should hold credentials in there wallet. + And PCM user connection must be in trusted state with verifer. + When OCM verifer orgnization sends a proof presentation request with following fields ( connectionId, schemaId or credentialDefId, attributes ) to PCM user. + And PCM user declines the presentation request. + Then Presentation request is not 'verified'. + diff --git a/features/proof/sendPrincipalCredentialPresentationRequest.feature b/features/proof/sendPrincipalCredentialPresentationRequest.feature new file mode 100644 index 0000000000000000000000000000000000000000..fd68ed18adb523db49393e5dd4e4ba386c9c4ddc --- /dev/null +++ b/features/proof/sendPrincipalCredentialPresentationRequest.feature @@ -0,0 +1,10 @@ +Feature: I am able to prove as GAIA-X ecosystem member. + To make the existing connection trusted. + +Scenario: Make the existing connection trusted + Given PCM user should hold principal membership credentials in there wallet. + And PCM user connection must be in complete state with verifer. + When OCM verifer orgnization sends a proof presentation request with following fields ( schemaId, attributes ) to PCM user. + And PCM user share the attributes from requested credentials to OCM verifer. + And OCM verifer verify the presentation acknowledgement. + Then Presentation request should be in 'trusted' state.