diff --git a/.gitignore b/.gitignore index cf8e193b86d560afadbb4f86fc753430ecda6d74..6135ee87981cb7b54b81915e48fb68d53a1d369a 100644 --- a/.gitignore +++ b/.gitignore @@ -74,3 +74,4 @@ build/tmp/ reports/ devRun.sh +.gitlab-ci.yml diff --git a/src/test/resources/features/tsa/policy/policy/{respository}/{group}/{name}/{version}/key/GET.feature b/src/test/resources/features/tsa/policy/policy/{respository}/{group}/{name}/{version}/key/GET.feature index e74f35c6a3d5991da96991748b96f02ce77cf1f1..261b3eed96c3bf31e160398af2f987dff910f75f 100644 --- a/src/test/resources/features/tsa/policy/policy/{respository}/{group}/{name}/{version}/key/GET.feature +++ b/src/test/resources/features/tsa/policy/policy/{respository}/{group}/{name}/{version}/key/GET.feature @@ -17,8 +17,8 @@ Feature: API - TSA - policy - {repository}/{group}/{name}/{version}/key GET And the field {crv} contains the value {P-256} And the field {kid} contains the value {key1} And the field {kty} contains the value {EC} - And the field {x} contains the value {AgBT2YKnE4JFm4zNng9fSQ4wEE4mdSdW-MrqQoSquyA} - And the field {y} contains the value {wewXbULR-jiHnpDIHMxLepfHdDVbEs6nFO2Yq5mXg5I} + And the field {x} is present and not empty + And the field {y} is present and not empty @negative Scenario: TSA - Export signing key information for policy with no export config information - Negative diff --git a/src/test/resources/features/tsa/signer/v1/credential/proof/POST.feature b/src/test/resources/features/tsa/signer/v1/credential/proof/POST.feature index 8b48c20b8a67ce73838fc41dfeac2725da900dfe..8f810a284ee9ca6b33ed61479b71b21595747ae4 100644 --- a/src/test/resources/features/tsa/signer/v1/credential/proof/POST.feature +++ b/src/test/resources/features/tsa/signer/v1/credential/proof/POST.feature @@ -22,7 +22,7 @@ Feature: API - TSA - Signer credential proof - v1/credential/proof POST | alumni of | for_proof_alumni | Signer_CredentialProof_alumni_schema.json | | without ID | for_proof_without_ID | Signer_CredentialProof_without_ID_schema.json | - @phase2 @IDM.TSA.E1.00005 @IDM.TSA.E1.00006 + @phase2 @IDM.TSA.E1.00005 @IDM.TSA.E1.00006 @IDM.TSA.E1.00019 Scenario: TSA - create two consecutive proofs - Positive When I load the REST request {Credential.json} with profile {for_proof_with_02_proof} And I create credential proof via TSA Signer API @@ -31,21 +31,21 @@ Feature: API - TSA - Signer credential proof - v1/credential/proof POST And the field {proof[1].verificationMethod} contains the value {did:web:vault.vereign.com:tsa:policy:policy:policies:example:returnDID:1.0:evaluation#key1} And the field {proof[2].verificationMethod} contains the value {did:web:vault.vereign.com:tsa:policy:policy:policies:example:returnDID:1.0:evaluation#key1} - @negative @phase2 @IDM.TSA.E1.00005 @IDM.TSA.E1.00006 + @negative @phase2 @IDM.TSA.E1.00005 @IDM.TSA.E1.00006 @IDM.TSA.E1.00019 Scenario: TSA - create two consecutive proofs with modified issuance date - Negative When I load the REST request {Credential.json} with profile {for_proof_with_modified_second_proof_date} And I create credential proof via TSA Signer API Then the status code should be {403} And the field {message} contains the value {invalid signature} - @negative @phase2 @IDM.TSA.E1.00005 @IDM.TSA.E1.00006 + @negative @phase2 @IDM.TSA.E1.00005 @IDM.TSA.E1.00006 @IDM.TSA.E1.00019 Scenario: TSA - create two consecutive proofs with modified credential subject ID - Negative When I load the REST request {Credential.json} with profile {for_proof_with_modified_second_proof_cred_subject} And I create credential proof via TSA Signer API Then the status code should be {403} And the field {message} contains the value {invalid signature} - @negative @phase2 @IDM.TSA.E1.00005 @IDM.TSA.E1.00006 + @negative @phase2 @IDM.TSA.E1.00005 @IDM.TSA.E1.00006 @IDM.TSA.E1.00019 Scenario: TSA - create two consecutive proofs with modified credential subject allow - Negative When I load the REST request {Credential.json} with profile {for_proof_with_modified_second_proof_cred_subject_allow} And I create credential proof via TSA Signer API