Skip to content
Snippets Groups Projects
Unverified Commit 5554d205 authored by Georgi Michev's avatar Georgi Michev
Browse files

update after bug fix in Signer, add new schemas

After partially fixing bug - signer#16
some of the tests were updated.

Based on additional bugs found new schemas were added.
signer#18
signer#19



Signed-off-by: default avatargeorgi.michev <georgi.michev@vereign.com>
parent 591d75f9
No related branches found
No related tags found
No related merge requests found
Pipeline #53095 passed with stage
in 2 minutes and 56 seconds
...@@ -2,8 +2,7 @@ ...@@ -2,8 +2,7 @@
"for_proof": { "for_proof": {
"@context": [ "@context": [
"https://www.w3.org/2018/credentials/v1", "https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1", "https://w3id.org/security/suites/jws-2020/v1"
"https://www.w3.org/2018/credentials/examples/v1"
], ],
"id": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation", "id": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
"type": "VerifiablePresentation", "type": "VerifiablePresentation",
...@@ -12,11 +11,11 @@ ...@@ -12,11 +11,11 @@
"@context": [ "@context": [
"https://www.w3.org/2018/credentials/v1", "https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1", "https://w3id.org/security/suites/jws-2020/v1",
"https://www.w3.org/2018/credentials/examples/v1" "https://schema.org"
], ],
"credentialSubject": { "credentialSubject": {
"allow": true, "allow": true,
"id": "example/examplePolicy/1.0" "id": "https://gaiax.vereign.com/tsa/policy/example/ProofRequestResponse/1.0"
}, },
"issuanceDate": "2022-07-21T10:24:36.203848291Z", "issuanceDate": "2022-07-21T10:24:36.203848291Z",
"issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation", "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
...@@ -26,11 +25,11 @@ ...@@ -26,11 +25,11 @@
"@context": [ "@context": [
"https://www.w3.org/2018/credentials/v1", "https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1", "https://w3id.org/security/suites/jws-2020/v1",
"https://www.w3.org/2018/credentials/examples/v1" "https://schema.org"
], ],
"credentialSubject": { "credentialSubject": {
"allow": true, "allow": true,
"id": "example/ProofRequestResponse/1.0" "id": "https://gaiax.vereign.com/tsa/policy/example/ProofRequestResponse/1.0"
}, },
"issuanceDate": "2022-07-21T10:24:36.203861194Z", "issuanceDate": "2022-07-21T10:24:36.203861194Z",
"issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation", "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
...@@ -84,16 +83,53 @@ ...@@ -84,16 +83,53 @@
} }
] ]
}, },
"incorrect_ID_for_proof": {
"@context": [
"https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1"
],
"id": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
"type": "VerifiablePresentation",
"verifiableCredential": [
{
"@context": [
"https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1",
"https://schema.org"
],
"credentialSubject": {
"allow": true,
"id": "incorrect_ID"
},
"issuanceDate": "2022-07-21T10:24:36.203848291Z",
"issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
"type": "VerifiableCredential"
},
{
"@context": [
"https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1",
"https://schema.org"
],
"credentialSubject": {
"allow": true,
"id": "https://gaiax.vereign.com/tsa/policy/example/ProofRequestResponse/1.0"
},
"issuanceDate": "2022-07-21T10:24:36.203861194Z",
"issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
"type": "VerifiableCredential"
}
]
},
"modified_credentialSubject_1_allow": { "modified_credentialSubject_1_allow": {
"@context": [ "@context": [
"https://www.w3.org/2018/credentials/v1", "https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1", "https://w3id.org/security/suites/jws-2020/v1"
"https://www.w3.org/2018/credentials/examples/v1"
], ],
"id": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation", "id": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
"proof": { "proof": {
"created": "2022-07-21T14:28:09.071187173Z", "created": "2022-07-29T15:01:11.776816778Z",
"jws": "eyJhbGciOiJKc29uV2ViU2lnbmF0dXJlMjAyMCIsImI2NCI6ZmFsc2UsImNyaXQiOlsiYjY0Il19..MEQCIFkavr6XpAYbdurBmQXNei-hI8WHAcnEYkZ6J3i4d3FKAiA4BtVCAixsAypaJ5dcBxn96Ju1OGfi7Kw1QRZMlMumhg", "jws": "eyJhbGciOiJKc29uV2ViU2lnbmF0dXJlMjAyMCIsImI2NCI6ZmFsc2UsImNyaXQiOlsiYjY0Il19..MEUCIQCUaAcVPM0IuKmZMkLgQ0YwKwqcUarymUX-aE6AgZwAggIgW1-u3T2RKHHcnEI6HKTRXM3xAQ-C2ctU7qSrmzfyYl4",
"proofPurpose": "assertionMethod", "proofPurpose": "assertionMethod",
"type": "JsonWebSignature2020", "type": "JsonWebSignature2020",
"verificationMethod": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1" "verificationMethod": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1"
...@@ -104,11 +140,11 @@ ...@@ -104,11 +140,11 @@
"@context": [ "@context": [
"https://www.w3.org/2018/credentials/v1", "https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1", "https://w3id.org/security/suites/jws-2020/v1",
"https://www.w3.org/2018/credentials/examples/v1" "https://schema.org"
], ],
"credentialSubject": { "credentialSubject": {
"allow": false, "allow": false,
"id": "example/examplePolicy/1.0" "id": "https://gaiax.vereign.com/tsa/policy/example/ProofRequestResponse/1.0"
}, },
"issuanceDate": "2022-07-21T10:24:36.203848291Z", "issuanceDate": "2022-07-21T10:24:36.203848291Z",
"issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation", "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
...@@ -118,11 +154,56 @@ ...@@ -118,11 +154,56 @@
"@context": [ "@context": [
"https://www.w3.org/2018/credentials/v1", "https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1", "https://w3id.org/security/suites/jws-2020/v1",
"https://www.w3.org/2018/credentials/examples/v1" "https://schema.org"
], ],
"credentialSubject": { "credentialSubject": {
"allow": true, "allow": true,
"id": "example/ProofRequestResponse/1.0" "id": "https://gaiax.vereign.com/tsa/policy/example/ProofRequestResponse/1.0"
},
"issuanceDate": "2022-07-21T10:24:36.203861194Z",
"issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
"type": "VerifiableCredential"
}
]
},
"incorrect_ID": {
"@context": [
"https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1"
],
"id": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
"proof": {
"created": "2022-07-29T15:43:25.076882592Z",
"jws": "eyJhbGciOiJKc29uV2ViU2lnbmF0dXJlMjAyMCIsImI2NCI6ZmFsc2UsImNyaXQiOlsiYjY0Il19..MEUCIQD84hJZfHP84SJSL98XvtUlCNVD48GHb0R-lqqeCPw79wIgXUdmzYoDsUj0sPIVICgN66UX2BHGjDTY7Rlw74m6Rwo",
"proofPurpose": "assertionMethod",
"type": "JsonWebSignature2020",
"verificationMethod": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1"
},
"type": "VerifiablePresentation",
"verifiableCredential": [
{
"@context": [
"https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1",
"https://schema.org"
],
"credentialSubject": {
"allow": true,
"id": "incorrect_ID"
},
"issuanceDate": "2022-07-21T10:24:36.203848291Z",
"issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
"type": "VerifiableCredential"
},
{
"@context": [
"https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1",
"https://schema.org"
],
"credentialSubject": {
"allow": true,
"id": "https://gaiax.vereign.com/tsa/policy/example/ProofRequestResponse/1.0"
}, },
"issuanceDate": "2022-07-21T10:24:36.203861194Z", "issuanceDate": "2022-07-21T10:24:36.203861194Z",
"issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation", "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
...@@ -133,13 +214,12 @@ ...@@ -133,13 +214,12 @@
"modified_credentialSubject_2_allow": { "modified_credentialSubject_2_allow": {
"@context": [ "@context": [
"https://www.w3.org/2018/credentials/v1", "https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1", "https://w3id.org/security/suites/jws-2020/v1"
"https://www.w3.org/2018/credentials/examples/v1"
], ],
"id": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation", "id": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
"proof": { "proof": {
"created": "2022-07-21T14:28:09.071187173Z", "created": "2022-07-29T15:01:11.776816778Z",
"jws": "eyJhbGciOiJKc29uV2ViU2lnbmF0dXJlMjAyMCIsImI2NCI6ZmFsc2UsImNyaXQiOlsiYjY0Il19..MEQCIFkavr6XpAYbdurBmQXNei-hI8WHAcnEYkZ6J3i4d3FKAiA4BtVCAixsAypaJ5dcBxn96Ju1OGfi7Kw1QRZMlMumhg", "jws": "eyJhbGciOiJKc29uV2ViU2lnbmF0dXJlMjAyMCIsImI2NCI6ZmFsc2UsImNyaXQiOlsiYjY0Il19..MEUCIQCUaAcVPM0IuKmZMkLgQ0YwKwqcUarymUX-aE6AgZwAggIgW1-u3T2RKHHcnEI6HKTRXM3xAQ-C2ctU7qSrmzfyYl4",
"proofPurpose": "assertionMethod", "proofPurpose": "assertionMethod",
"type": "JsonWebSignature2020", "type": "JsonWebSignature2020",
"verificationMethod": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1" "verificationMethod": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1"
...@@ -150,11 +230,11 @@ ...@@ -150,11 +230,11 @@
"@context": [ "@context": [
"https://www.w3.org/2018/credentials/v1", "https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1", "https://w3id.org/security/suites/jws-2020/v1",
"https://www.w3.org/2018/credentials/examples/v1" "https://schema.org"
], ],
"credentialSubject": { "credentialSubject": {
"allow": true, "allow": true,
"id": "example/examplePolicy/1.0" "id": "https://gaiax.vereign.com/tsa/policy/example/ProofRequestResponse/1.0"
}, },
"issuanceDate": "2022-07-21T10:24:36.203848291Z", "issuanceDate": "2022-07-21T10:24:36.203848291Z",
"issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation", "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
...@@ -164,11 +244,11 @@ ...@@ -164,11 +244,11 @@
"@context": [ "@context": [
"https://www.w3.org/2018/credentials/v1", "https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1", "https://w3id.org/security/suites/jws-2020/v1",
"https://www.w3.org/2018/credentials/examples/v1" "https://schema.org"
], ],
"credentialSubject": { "credentialSubject": {
"allow": false, "allow": false,
"id": "example/ProofRequestResponse/1.0" "id": "https://gaiax.vereign.com/tsa/policy/example/ProofRequestResponse/1.0"
}, },
"issuanceDate": "2022-07-21T10:24:36.203861194Z", "issuanceDate": "2022-07-21T10:24:36.203861194Z",
"issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation", "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
...@@ -179,13 +259,12 @@ ...@@ -179,13 +259,12 @@
"modified_credentialSubject_1_ID": { "modified_credentialSubject_1_ID": {
"@context": [ "@context": [
"https://www.w3.org/2018/credentials/v1", "https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1", "https://w3id.org/security/suites/jws-2020/v1"
"https://www.w3.org/2018/credentials/examples/v1"
], ],
"id": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation", "id": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
"proof": { "proof": {
"created": "2022-07-21T14:28:09.071187173Z", "created": "2022-07-29T15:01:11.776816778Z",
"jws": "eyJhbGciOiJKc29uV2ViU2lnbmF0dXJlMjAyMCIsImI2NCI6ZmFsc2UsImNyaXQiOlsiYjY0Il19..MEQCIFkavr6XpAYbdurBmQXNei-hI8WHAcnEYkZ6J3i4d3FKAiA4BtVCAixsAypaJ5dcBxn96Ju1OGfi7Kw1QRZMlMumhg", "jws": "eyJhbGciOiJKc29uV2ViU2lnbmF0dXJlMjAyMCIsImI2NCI6ZmFsc2UsImNyaXQiOlsiYjY0Il19..MEUCIQCUaAcVPM0IuKmZMkLgQ0YwKwqcUarymUX-aE6AgZwAggIgW1-u3T2RKHHcnEI6HKTRXM3xAQ-C2ctU7qSrmzfyYl4",
"proofPurpose": "assertionMethod", "proofPurpose": "assertionMethod",
"type": "JsonWebSignature2020", "type": "JsonWebSignature2020",
"verificationMethod": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1" "verificationMethod": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1"
...@@ -196,11 +275,11 @@ ...@@ -196,11 +275,11 @@
"@context": [ "@context": [
"https://www.w3.org/2018/credentials/v1", "https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1", "https://w3id.org/security/suites/jws-2020/v1",
"https://www.w3.org/2018/credentials/examples/v1" "https://schema.org"
], ],
"credentialSubject": { "credentialSubject": {
"allow": true, "allow": true,
"id": "example/examplePolicy/2.0" "id": "invalid_ID"
}, },
"issuanceDate": "2022-07-21T10:24:36.203848291Z", "issuanceDate": "2022-07-21T10:24:36.203848291Z",
"issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation", "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
...@@ -210,11 +289,11 @@ ...@@ -210,11 +289,11 @@
"@context": [ "@context": [
"https://www.w3.org/2018/credentials/v1", "https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1", "https://w3id.org/security/suites/jws-2020/v1",
"https://www.w3.org/2018/credentials/examples/v1" "https://schema.org"
], ],
"credentialSubject": { "credentialSubject": {
"allow": true, "allow": true,
"id": "example/ProofRequestResponse/1.0" "id": "https://gaiax.vereign.com/tsa/policy/example/ProofRequestResponse/1.0"
}, },
"issuanceDate": "2022-07-21T10:24:36.203861194Z", "issuanceDate": "2022-07-21T10:24:36.203861194Z",
"issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation", "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
...@@ -225,13 +304,12 @@ ...@@ -225,13 +304,12 @@
"modified_credentialSubject_2_ID": { "modified_credentialSubject_2_ID": {
"@context": [ "@context": [
"https://www.w3.org/2018/credentials/v1", "https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1", "https://w3id.org/security/suites/jws-2020/v1"
"https://www.w3.org/2018/credentials/examples/v1"
], ],
"id": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation", "id": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
"proof": { "proof": {
"created": "2022-07-21T14:28:09.071187173Z", "created": "2022-07-29T15:01:11.776816778Z",
"jws": "eyJhbGciOiJKc29uV2ViU2lnbmF0dXJlMjAyMCIsImI2NCI6ZmFsc2UsImNyaXQiOlsiYjY0Il19..MEQCIFkavr6XpAYbdurBmQXNei-hI8WHAcnEYkZ6J3i4d3FKAiA4BtVCAixsAypaJ5dcBxn96Ju1OGfi7Kw1QRZMlMumhg", "jws": "eyJhbGciOiJKc29uV2ViU2lnbmF0dXJlMjAyMCIsImI2NCI6ZmFsc2UsImNyaXQiOlsiYjY0Il19..MEUCIQCUaAcVPM0IuKmZMkLgQ0YwKwqcUarymUX-aE6AgZwAggIgW1-u3T2RKHHcnEI6HKTRXM3xAQ-C2ctU7qSrmzfyYl4",
"proofPurpose": "assertionMethod", "proofPurpose": "assertionMethod",
"type": "JsonWebSignature2020", "type": "JsonWebSignature2020",
"verificationMethod": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1" "verificationMethod": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1"
...@@ -242,11 +320,11 @@ ...@@ -242,11 +320,11 @@
"@context": [ "@context": [
"https://www.w3.org/2018/credentials/v1", "https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1", "https://w3id.org/security/suites/jws-2020/v1",
"https://www.w3.org/2018/credentials/examples/v1" "https://schema.org"
], ],
"credentialSubject": { "credentialSubject": {
"allow": true, "allow": true,
"id": "example/examplePolicy/1.0" "id": "https://gaiax.vereign.com/tsa/policy/example/ProofRequestResponse/1.0"
}, },
"issuanceDate": "2022-07-21T10:24:36.203848291Z", "issuanceDate": "2022-07-21T10:24:36.203848291Z",
"issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation", "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
...@@ -256,11 +334,11 @@ ...@@ -256,11 +334,11 @@
"@context": [ "@context": [
"https://www.w3.org/2018/credentials/v1", "https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1", "https://w3id.org/security/suites/jws-2020/v1",
"https://www.w3.org/2018/credentials/examples/v1" "https://schema.org"
], ],
"credentialSubject": { "credentialSubject": {
"allow": true, "allow": true,
"id": "example/ProofRequestResponse/2.0" "id": "invalid_ID"
}, },
"issuanceDate": "2022-07-21T10:24:36.203861194Z", "issuanceDate": "2022-07-21T10:24:36.203861194Z",
"issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation", "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
...@@ -359,5 +437,43 @@ ...@@ -359,5 +437,43 @@
"type": "VerifiableCredential" "type": "VerifiableCredential"
} }
] ]
},
"missing_proof": {
"@context": [
"https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1"
],
"id": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
"type": "VerifiablePresentation",
"verifiableCredential": [
{
"@context": [
"https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1",
"https://schema.org"
],
"credentialSubject": {
"allow": true,
"id": "https://gaiax.vereign.com/tsa/policy/example/ProofRequestResponse/1.0"
},
"issuanceDate": "2022-07-21T10:24:36.203848291Z",
"issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
"type": "VerifiableCredential"
},
{
"@context": [
"https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1",
"https://schema.org"
],
"credentialSubject": {
"allow": true,
"id": "https://gaiax.vereign.com/tsa/policy/example/ProofRequestResponse/1.0"
},
"issuanceDate": "2022-07-21T10:24:36.203861194Z",
"issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
"type": "VerifiableCredential"
}
]
} }
} }
\ No newline at end of file
...@@ -36,6 +36,32 @@ Feature: API - TSA - Signer presentation verify - v1/presentation/verify POST ...@@ -36,6 +36,32 @@ Feature: API - TSA - Signer presentation verify - v1/presentation/verify POST
And the status code should be {200} And the status code should be {200}
And the field {valid} has the value {true} And the field {valid} has the value {true}
@wip @bug-signer#19 @negative
Scenario: TSA - verify presentation proof with missing proof - Negative
When I load the REST request {Presentation.json} with profile {for_proof}
When I create presentation proof via TSA Signer API
And the status code should be {200}
And the response is valid according to the {Signer_PresentationProof_schema.json} REST schema
And the field {proof.verificationMethod} has the value {did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1}
Then I get the last response body and load it to the current request body
When I load the REST request {Presentation.json} with profile {missing_proof}
And I verify presentation proof via TSA Signer API
# And the status code should be {400}
# And the field {message} has the value {check embedded proof: check linked data proof: ecdsa: invalid signature}
@wip @bug-signer#18 @negative
Scenario: TSA - verify presentation proof with modified ID field - Negative
When I load the REST request {Presentation.json} with profile {incorrect_ID_for_proof}
When I create presentation proof via TSA Signer API
And the status code should be {200}
And the response is valid according to the {Signer_PresentationProof_schema.json} REST schema
And the field {proof.verificationMethod} has the value {did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1}
Then I get the last response body and load it to the current request body
When I load the REST request {Presentation.json} with profile {incorrect_ID}
And I verify presentation proof via TSA Signer API
# And the status code should be {400}
# And the field {message} has the value {check embedded proof: check linked data proof: ecdsa: invalid signature}
@negative @negative
Scenario: TSA - verify presentation proof with modified ID field - Negative Scenario: TSA - verify presentation proof with modified ID field - Negative
When I load the REST request {Presentation.json} with profile {for_proof} When I load the REST request {Presentation.json} with profile {for_proof}
...@@ -62,7 +88,7 @@ Feature: API - TSA - Signer presentation verify - v1/presentation/verify POST ...@@ -62,7 +88,7 @@ Feature: API - TSA - Signer presentation verify - v1/presentation/verify POST
And the status code should be {400} And the status code should be {400}
And the field {message} has the value {check embedded proof: check linked data proof: ecdsa: invalid signature} And the field {message} has the value {check embedded proof: check linked data proof: ecdsa: invalid signature}
@wip @bug-issue-signer#16 @negative @negative
Scenario: TSA - verify presentation proof with modified credentialSubject.allow field - Negative Scenario: TSA - verify presentation proof with modified credentialSubject.allow field - Negative
When I load the REST request {Presentation.json} with profile {for_proof} When I load the REST request {Presentation.json} with profile {for_proof}
When I create presentation proof via TSA Signer API When I create presentation proof via TSA Signer API
...@@ -72,10 +98,10 @@ Feature: API - TSA - Signer presentation verify - v1/presentation/verify POST ...@@ -72,10 +98,10 @@ Feature: API - TSA - Signer presentation verify - v1/presentation/verify POST
Then I get the last response body and load it to the current request body Then I get the last response body and load it to the current request body
When I load the REST request {Presentation.json} with profile {modified_credentialSubject_1_allow} When I load the REST request {Presentation.json} with profile {modified_credentialSubject_1_allow}
And I verify presentation proof via TSA Signer API And I verify presentation proof via TSA Signer API
# And the status code should be {400} And the status code should be {400}
# And the field {message} has the value {check embedded proof: check linked data proof: ecdsa: invalid signature} And the field {message} has the value {check embedded proof: check linked data proof: ecdsa: invalid signature}
@wip @bug-issue-signer#16 @negative @negative
Scenario: TSA - verify presentation proof with modified credentialSubject.allow field - Negative Scenario: TSA - verify presentation proof with modified credentialSubject.allow field - Negative
When I load the REST request {Presentation.json} with profile {for_proof} When I load the REST request {Presentation.json} with profile {for_proof}
When I create presentation proof via TSA Signer API When I create presentation proof via TSA Signer API
...@@ -85,10 +111,10 @@ Feature: API - TSA - Signer presentation verify - v1/presentation/verify POST ...@@ -85,10 +111,10 @@ Feature: API - TSA - Signer presentation verify - v1/presentation/verify POST
Then I get the last response body and load it to the current request body Then I get the last response body and load it to the current request body
When I load the REST request {Presentation.json} with profile {modified_credentialSubject_2_allow} When I load the REST request {Presentation.json} with profile {modified_credentialSubject_2_allow}
And I verify presentation proof via TSA Signer API And I verify presentation proof via TSA Signer API
# And the status code should be {400} And the status code should be {400}
# And the field {message} has the value {check embedded proof: check linked data proof: ecdsa: invalid signature} And the field {message} has the value {check embedded proof: check linked data proof: ecdsa: invalid signature}
@wip @bug-issue-signer#16 @negative @negative
Scenario: TSA - verify presentation proof with modified credentialSubject.ID field - Negative Scenario: TSA - verify presentation proof with modified credentialSubject.ID field - Negative
When I load the REST request {Presentation.json} with profile {for_proof} When I load the REST request {Presentation.json} with profile {for_proof}
When I create presentation proof via TSA Signer API When I create presentation proof via TSA Signer API
...@@ -98,10 +124,10 @@ Feature: API - TSA - Signer presentation verify - v1/presentation/verify POST ...@@ -98,10 +124,10 @@ Feature: API - TSA - Signer presentation verify - v1/presentation/verify POST
Then I get the last response body and load it to the current request body Then I get the last response body and load it to the current request body
When I load the REST request {Presentation.json} with profile {modified_credentialSubject_1_ID} When I load the REST request {Presentation.json} with profile {modified_credentialSubject_1_ID}
And I verify presentation proof via TSA Signer API And I verify presentation proof via TSA Signer API
# And the status code should be {400} And the status code should be {400}
# And the field {message} has the value {check embedded proof: check linked data proof: ecdsa: invalid signature} And the field {message} has the value {check embedded proof: check linked data proof: ecdsa: invalid signature}
@wip @bug-issue-signer#16 @negative @negative
Scenario: TSA - verify presentation proof with modified credentialSubject.ID field - Negative Scenario: TSA - verify presentation proof with modified credentialSubject.ID field - Negative
When I load the REST request {Presentation.json} with profile {for_proof} When I load the REST request {Presentation.json} with profile {for_proof}
When I create presentation proof via TSA Signer API When I create presentation proof via TSA Signer API
...@@ -111,5 +137,5 @@ Feature: API - TSA - Signer presentation verify - v1/presentation/verify POST ...@@ -111,5 +137,5 @@ Feature: API - TSA - Signer presentation verify - v1/presentation/verify POST
Then I get the last response body and load it to the current request body Then I get the last response body and load it to the current request body
When I load the REST request {Presentation.json} with profile {modified_credentialSubject_2_ID} When I load the REST request {Presentation.json} with profile {modified_credentialSubject_2_ID}
And I verify presentation proof via TSA Signer API And I verify presentation proof via TSA Signer API
# And the status code should be {400} And the status code should be {400}
# And the field {message} has the value {check embedded proof: check linked data proof: ecdsa: invalid signature} And the field {message} has the value {check embedded proof: check linked data proof: ecdsa: invalid signature}
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment