Skip to content
Snippets Groups Projects
Unverified Commit f425a3a3 authored by Georgi Michev's avatar Georgi Michev
Browse files

update after bug fix in Signer, add new schemas

After partially fixing bug - signer#16
some of the tests were updated.

Based on additional bugs found new schemas were added.
signer#18
signer#19



Signed-off-by: default avatargeorgi.michev <georgi.michev@vereign.com>
parent 591d75f9
Branches
No related tags found
1 merge request!30update credential schema
Pipeline #53097 passed
...@@ -2,8 +2,7 @@ ...@@ -2,8 +2,7 @@
"for_proof": { "for_proof": {
"@context": [ "@context": [
"https://www.w3.org/2018/credentials/v1", "https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1", "https://w3id.org/security/suites/jws-2020/v1"
"https://www.w3.org/2018/credentials/examples/v1"
], ],
"id": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation", "id": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
"type": "VerifiablePresentation", "type": "VerifiablePresentation",
...@@ -12,11 +11,11 @@ ...@@ -12,11 +11,11 @@
"@context": [ "@context": [
"https://www.w3.org/2018/credentials/v1", "https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1", "https://w3id.org/security/suites/jws-2020/v1",
"https://www.w3.org/2018/credentials/examples/v1" "https://schema.org"
], ],
"credentialSubject": { "credentialSubject": {
"allow": true, "allow": true,
"id": "example/examplePolicy/1.0" "id": "https://gaiax.vereign.com/tsa/policy/example/ProofRequestResponse/1.0"
}, },
"issuanceDate": "2022-07-21T10:24:36.203848291Z", "issuanceDate": "2022-07-21T10:24:36.203848291Z",
"issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation", "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
...@@ -26,11 +25,11 @@ ...@@ -26,11 +25,11 @@
"@context": [ "@context": [
"https://www.w3.org/2018/credentials/v1", "https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1", "https://w3id.org/security/suites/jws-2020/v1",
"https://www.w3.org/2018/credentials/examples/v1" "https://schema.org"
], ],
"credentialSubject": { "credentialSubject": {
"allow": true, "allow": true,
"id": "example/ProofRequestResponse/1.0" "id": "https://gaiax.vereign.com/tsa/policy/example/ProofRequestResponse/1.0"
}, },
"issuanceDate": "2022-07-21T10:24:36.203861194Z", "issuanceDate": "2022-07-21T10:24:36.203861194Z",
"issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation", "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
...@@ -84,16 +83,53 @@ ...@@ -84,16 +83,53 @@
} }
] ]
}, },
"incorrect_ID_for_proof": {
"@context": [
"https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1"
],
"id": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
"type": "VerifiablePresentation",
"verifiableCredential": [
{
"@context": [
"https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1",
"https://schema.org"
],
"credentialSubject": {
"allow": true,
"id": "incorrect_ID"
},
"issuanceDate": "2022-07-21T10:24:36.203848291Z",
"issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
"type": "VerifiableCredential"
},
{
"@context": [
"https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1",
"https://schema.org"
],
"credentialSubject": {
"allow": true,
"id": "https://gaiax.vereign.com/tsa/policy/example/ProofRequestResponse/1.0"
},
"issuanceDate": "2022-07-21T10:24:36.203861194Z",
"issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
"type": "VerifiableCredential"
}
]
},
"modified_credentialSubject_1_allow": { "modified_credentialSubject_1_allow": {
"@context": [ "@context": [
"https://www.w3.org/2018/credentials/v1", "https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1", "https://w3id.org/security/suites/jws-2020/v1"
"https://www.w3.org/2018/credentials/examples/v1"
], ],
"id": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation", "id": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
"proof": { "proof": {
"created": "2022-07-21T14:28:09.071187173Z", "created": "2022-07-29T15:01:11.776816778Z",
"jws": "eyJhbGciOiJKc29uV2ViU2lnbmF0dXJlMjAyMCIsImI2NCI6ZmFsc2UsImNyaXQiOlsiYjY0Il19..MEQCIFkavr6XpAYbdurBmQXNei-hI8WHAcnEYkZ6J3i4d3FKAiA4BtVCAixsAypaJ5dcBxn96Ju1OGfi7Kw1QRZMlMumhg", "jws": "eyJhbGciOiJKc29uV2ViU2lnbmF0dXJlMjAyMCIsImI2NCI6ZmFsc2UsImNyaXQiOlsiYjY0Il19..MEUCIQCUaAcVPM0IuKmZMkLgQ0YwKwqcUarymUX-aE6AgZwAggIgW1-u3T2RKHHcnEI6HKTRXM3xAQ-C2ctU7qSrmzfyYl4",
"proofPurpose": "assertionMethod", "proofPurpose": "assertionMethod",
"type": "JsonWebSignature2020", "type": "JsonWebSignature2020",
"verificationMethod": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1" "verificationMethod": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1"
...@@ -104,11 +140,11 @@ ...@@ -104,11 +140,11 @@
"@context": [ "@context": [
"https://www.w3.org/2018/credentials/v1", "https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1", "https://w3id.org/security/suites/jws-2020/v1",
"https://www.w3.org/2018/credentials/examples/v1" "https://schema.org"
], ],
"credentialSubject": { "credentialSubject": {
"allow": false, "allow": false,
"id": "example/examplePolicy/1.0" "id": "https://gaiax.vereign.com/tsa/policy/example/ProofRequestResponse/1.0"
}, },
"issuanceDate": "2022-07-21T10:24:36.203848291Z", "issuanceDate": "2022-07-21T10:24:36.203848291Z",
"issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation", "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
...@@ -118,11 +154,56 @@ ...@@ -118,11 +154,56 @@
"@context": [ "@context": [
"https://www.w3.org/2018/credentials/v1", "https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1", "https://w3id.org/security/suites/jws-2020/v1",
"https://www.w3.org/2018/credentials/examples/v1" "https://schema.org"
], ],
"credentialSubject": { "credentialSubject": {
"allow": true, "allow": true,
"id": "example/ProofRequestResponse/1.0" "id": "https://gaiax.vereign.com/tsa/policy/example/ProofRequestResponse/1.0"
},
"issuanceDate": "2022-07-21T10:24:36.203861194Z",
"issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
"type": "VerifiableCredential"
}
]
},
"incorrect_ID": {
"@context": [
"https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1"
],
"id": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
"proof": {
"created": "2022-07-29T15:43:25.076882592Z",
"jws": "eyJhbGciOiJKc29uV2ViU2lnbmF0dXJlMjAyMCIsImI2NCI6ZmFsc2UsImNyaXQiOlsiYjY0Il19..MEUCIQD84hJZfHP84SJSL98XvtUlCNVD48GHb0R-lqqeCPw79wIgXUdmzYoDsUj0sPIVICgN66UX2BHGjDTY7Rlw74m6Rwo",
"proofPurpose": "assertionMethod",
"type": "JsonWebSignature2020",
"verificationMethod": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1"
},
"type": "VerifiablePresentation",
"verifiableCredential": [
{
"@context": [
"https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1",
"https://schema.org"
],
"credentialSubject": {
"allow": true,
"id": "incorrect_ID"
},
"issuanceDate": "2022-07-21T10:24:36.203848291Z",
"issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
"type": "VerifiableCredential"
},
{
"@context": [
"https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1",
"https://schema.org"
],
"credentialSubject": {
"allow": true,
"id": "https://gaiax.vereign.com/tsa/policy/example/ProofRequestResponse/1.0"
}, },
"issuanceDate": "2022-07-21T10:24:36.203861194Z", "issuanceDate": "2022-07-21T10:24:36.203861194Z",
"issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation", "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
...@@ -133,13 +214,12 @@ ...@@ -133,13 +214,12 @@
"modified_credentialSubject_2_allow": { "modified_credentialSubject_2_allow": {
"@context": [ "@context": [
"https://www.w3.org/2018/credentials/v1", "https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1", "https://w3id.org/security/suites/jws-2020/v1"
"https://www.w3.org/2018/credentials/examples/v1"
], ],
"id": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation", "id": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
"proof": { "proof": {
"created": "2022-07-21T14:28:09.071187173Z", "created": "2022-07-29T15:01:11.776816778Z",
"jws": "eyJhbGciOiJKc29uV2ViU2lnbmF0dXJlMjAyMCIsImI2NCI6ZmFsc2UsImNyaXQiOlsiYjY0Il19..MEQCIFkavr6XpAYbdurBmQXNei-hI8WHAcnEYkZ6J3i4d3FKAiA4BtVCAixsAypaJ5dcBxn96Ju1OGfi7Kw1QRZMlMumhg", "jws": "eyJhbGciOiJKc29uV2ViU2lnbmF0dXJlMjAyMCIsImI2NCI6ZmFsc2UsImNyaXQiOlsiYjY0Il19..MEUCIQCUaAcVPM0IuKmZMkLgQ0YwKwqcUarymUX-aE6AgZwAggIgW1-u3T2RKHHcnEI6HKTRXM3xAQ-C2ctU7qSrmzfyYl4",
"proofPurpose": "assertionMethod", "proofPurpose": "assertionMethod",
"type": "JsonWebSignature2020", "type": "JsonWebSignature2020",
"verificationMethod": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1" "verificationMethod": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1"
...@@ -150,11 +230,11 @@ ...@@ -150,11 +230,11 @@
"@context": [ "@context": [
"https://www.w3.org/2018/credentials/v1", "https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1", "https://w3id.org/security/suites/jws-2020/v1",
"https://www.w3.org/2018/credentials/examples/v1" "https://schema.org"
], ],
"credentialSubject": { "credentialSubject": {
"allow": true, "allow": true,
"id": "example/examplePolicy/1.0" "id": "https://gaiax.vereign.com/tsa/policy/example/ProofRequestResponse/1.0"
}, },
"issuanceDate": "2022-07-21T10:24:36.203848291Z", "issuanceDate": "2022-07-21T10:24:36.203848291Z",
"issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation", "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
...@@ -164,11 +244,11 @@ ...@@ -164,11 +244,11 @@
"@context": [ "@context": [
"https://www.w3.org/2018/credentials/v1", "https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1", "https://w3id.org/security/suites/jws-2020/v1",
"https://www.w3.org/2018/credentials/examples/v1" "https://schema.org"
], ],
"credentialSubject": { "credentialSubject": {
"allow": false, "allow": false,
"id": "example/ProofRequestResponse/1.0" "id": "https://gaiax.vereign.com/tsa/policy/example/ProofRequestResponse/1.0"
}, },
"issuanceDate": "2022-07-21T10:24:36.203861194Z", "issuanceDate": "2022-07-21T10:24:36.203861194Z",
"issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation", "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
...@@ -179,13 +259,12 @@ ...@@ -179,13 +259,12 @@
"modified_credentialSubject_1_ID": { "modified_credentialSubject_1_ID": {
"@context": [ "@context": [
"https://www.w3.org/2018/credentials/v1", "https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1", "https://w3id.org/security/suites/jws-2020/v1"
"https://www.w3.org/2018/credentials/examples/v1"
], ],
"id": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation", "id": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
"proof": { "proof": {
"created": "2022-07-21T14:28:09.071187173Z", "created": "2022-07-29T15:01:11.776816778Z",
"jws": "eyJhbGciOiJKc29uV2ViU2lnbmF0dXJlMjAyMCIsImI2NCI6ZmFsc2UsImNyaXQiOlsiYjY0Il19..MEQCIFkavr6XpAYbdurBmQXNei-hI8WHAcnEYkZ6J3i4d3FKAiA4BtVCAixsAypaJ5dcBxn96Ju1OGfi7Kw1QRZMlMumhg", "jws": "eyJhbGciOiJKc29uV2ViU2lnbmF0dXJlMjAyMCIsImI2NCI6ZmFsc2UsImNyaXQiOlsiYjY0Il19..MEUCIQCUaAcVPM0IuKmZMkLgQ0YwKwqcUarymUX-aE6AgZwAggIgW1-u3T2RKHHcnEI6HKTRXM3xAQ-C2ctU7qSrmzfyYl4",
"proofPurpose": "assertionMethod", "proofPurpose": "assertionMethod",
"type": "JsonWebSignature2020", "type": "JsonWebSignature2020",
"verificationMethod": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1" "verificationMethod": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1"
...@@ -196,11 +275,11 @@ ...@@ -196,11 +275,11 @@
"@context": [ "@context": [
"https://www.w3.org/2018/credentials/v1", "https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1", "https://w3id.org/security/suites/jws-2020/v1",
"https://www.w3.org/2018/credentials/examples/v1" "https://schema.org"
], ],
"credentialSubject": { "credentialSubject": {
"allow": true, "allow": true,
"id": "example/examplePolicy/2.0" "id": "invalid_ID"
}, },
"issuanceDate": "2022-07-21T10:24:36.203848291Z", "issuanceDate": "2022-07-21T10:24:36.203848291Z",
"issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation", "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
...@@ -210,11 +289,11 @@ ...@@ -210,11 +289,11 @@
"@context": [ "@context": [
"https://www.w3.org/2018/credentials/v1", "https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1", "https://w3id.org/security/suites/jws-2020/v1",
"https://www.w3.org/2018/credentials/examples/v1" "https://schema.org"
], ],
"credentialSubject": { "credentialSubject": {
"allow": true, "allow": true,
"id": "example/ProofRequestResponse/1.0" "id": "https://gaiax.vereign.com/tsa/policy/example/ProofRequestResponse/1.0"
}, },
"issuanceDate": "2022-07-21T10:24:36.203861194Z", "issuanceDate": "2022-07-21T10:24:36.203861194Z",
"issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation", "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
...@@ -225,13 +304,12 @@ ...@@ -225,13 +304,12 @@
"modified_credentialSubject_2_ID": { "modified_credentialSubject_2_ID": {
"@context": [ "@context": [
"https://www.w3.org/2018/credentials/v1", "https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1", "https://w3id.org/security/suites/jws-2020/v1"
"https://www.w3.org/2018/credentials/examples/v1"
], ],
"id": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation", "id": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
"proof": { "proof": {
"created": "2022-07-21T14:28:09.071187173Z", "created": "2022-07-29T15:01:11.776816778Z",
"jws": "eyJhbGciOiJKc29uV2ViU2lnbmF0dXJlMjAyMCIsImI2NCI6ZmFsc2UsImNyaXQiOlsiYjY0Il19..MEQCIFkavr6XpAYbdurBmQXNei-hI8WHAcnEYkZ6J3i4d3FKAiA4BtVCAixsAypaJ5dcBxn96Ju1OGfi7Kw1QRZMlMumhg", "jws": "eyJhbGciOiJKc29uV2ViU2lnbmF0dXJlMjAyMCIsImI2NCI6ZmFsc2UsImNyaXQiOlsiYjY0Il19..MEUCIQCUaAcVPM0IuKmZMkLgQ0YwKwqcUarymUX-aE6AgZwAggIgW1-u3T2RKHHcnEI6HKTRXM3xAQ-C2ctU7qSrmzfyYl4",
"proofPurpose": "assertionMethod", "proofPurpose": "assertionMethod",
"type": "JsonWebSignature2020", "type": "JsonWebSignature2020",
"verificationMethod": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1" "verificationMethod": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1"
...@@ -242,11 +320,11 @@ ...@@ -242,11 +320,11 @@
"@context": [ "@context": [
"https://www.w3.org/2018/credentials/v1", "https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1", "https://w3id.org/security/suites/jws-2020/v1",
"https://www.w3.org/2018/credentials/examples/v1" "https://schema.org"
], ],
"credentialSubject": { "credentialSubject": {
"allow": true, "allow": true,
"id": "example/examplePolicy/1.0" "id": "https://gaiax.vereign.com/tsa/policy/example/ProofRequestResponse/1.0"
}, },
"issuanceDate": "2022-07-21T10:24:36.203848291Z", "issuanceDate": "2022-07-21T10:24:36.203848291Z",
"issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation", "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
...@@ -256,11 +334,11 @@ ...@@ -256,11 +334,11 @@
"@context": [ "@context": [
"https://www.w3.org/2018/credentials/v1", "https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1", "https://w3id.org/security/suites/jws-2020/v1",
"https://www.w3.org/2018/credentials/examples/v1" "https://schema.org"
], ],
"credentialSubject": { "credentialSubject": {
"allow": true, "allow": true,
"id": "example/ProofRequestResponse/2.0" "id": "invalid_ID"
}, },
"issuanceDate": "2022-07-21T10:24:36.203861194Z", "issuanceDate": "2022-07-21T10:24:36.203861194Z",
"issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation", "issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
...@@ -359,5 +437,43 @@ ...@@ -359,5 +437,43 @@
"type": "VerifiableCredential" "type": "VerifiableCredential"
} }
] ]
},
"missing_proof": {
"@context": [
"https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1"
],
"id": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
"type": "VerifiablePresentation",
"verifiableCredential": [
{
"@context": [
"https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1",
"https://schema.org"
],
"credentialSubject": {
"allow": true,
"id": "https://gaiax.vereign.com/tsa/policy/example/ProofRequestResponse/1.0"
},
"issuanceDate": "2022-07-21T10:24:36.203848291Z",
"issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
"type": "VerifiableCredential"
},
{
"@context": [
"https://www.w3.org/2018/credentials/v1",
"https://w3id.org/security/suites/jws-2020/v1",
"https://schema.org"
],
"credentialSubject": {
"allow": true,
"id": "https://gaiax.vereign.com/tsa/policy/example/ProofRequestResponse/1.0"
},
"issuanceDate": "2022-07-21T10:24:36.203861194Z",
"issuer": "did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation",
"type": "VerifiableCredential"
}
]
} }
} }
\ No newline at end of file
...@@ -36,6 +36,32 @@ Feature: API - TSA - Signer presentation verify - v1/presentation/verify POST ...@@ -36,6 +36,32 @@ Feature: API - TSA - Signer presentation verify - v1/presentation/verify POST
And the status code should be {200} And the status code should be {200}
And the field {valid} has the value {true} And the field {valid} has the value {true}
@wip @bug-signer#19 @negative
Scenario: TSA - verify presentation proof with missing proof - Negative
When I load the REST request {Presentation.json} with profile {for_proof}
When I create presentation proof via TSA Signer API
And the status code should be {200}
And the response is valid according to the {Signer_PresentationProof_schema.json} REST schema
And the field {proof.verificationMethod} has the value {did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1}
Then I get the last response body and load it to the current request body
When I load the REST request {Presentation.json} with profile {missing_proof}
And I verify presentation proof via TSA Signer API
# And the status code should be {400}
# And the field {message} has the value {check embedded proof: check linked data proof: ecdsa: invalid signature}
@wip @bug-signer#18 @negative
Scenario: TSA - verify presentation proof with incorrect ID field - Negative
When I load the REST request {Presentation.json} with profile {incorrect_ID_for_proof}
When I create presentation proof via TSA Signer API
And the status code should be {200}
And the response is valid according to the {Signer_PresentationProof_schema.json} REST schema
And the field {proof.verificationMethod} has the value {did:web:gaiax.vereign.com:tsa:policy:policy:example:returnDID:1.0:evaluation#key1}
Then I get the last response body and load it to the current request body
When I load the REST request {Presentation.json} with profile {incorrect_ID}
And I verify presentation proof via TSA Signer API
# And the status code should be {400}
# And the field {message} has the value {check embedded proof: check linked data proof: ecdsa: invalid signature}
@negative @negative
Scenario: TSA - verify presentation proof with modified ID field - Negative Scenario: TSA - verify presentation proof with modified ID field - Negative
When I load the REST request {Presentation.json} with profile {for_proof} When I load the REST request {Presentation.json} with profile {for_proof}
...@@ -62,8 +88,8 @@ Feature: API - TSA - Signer presentation verify - v1/presentation/verify POST ...@@ -62,8 +88,8 @@ Feature: API - TSA - Signer presentation verify - v1/presentation/verify POST
And the status code should be {400} And the status code should be {400}
And the field {message} has the value {check embedded proof: check linked data proof: ecdsa: invalid signature} And the field {message} has the value {check embedded proof: check linked data proof: ecdsa: invalid signature}
@wip @bug-issue-signer#16 @negative @negative
Scenario: TSA - verify presentation proof with modified credentialSubject.allow field - Negative Scenario: TSA - verify presentation proof with modified first credentialSubject.allow field - Negative
When I load the REST request {Presentation.json} with profile {for_proof} When I load the REST request {Presentation.json} with profile {for_proof}
When I create presentation proof via TSA Signer API When I create presentation proof via TSA Signer API
And the status code should be {200} And the status code should be {200}
...@@ -72,11 +98,11 @@ Feature: API - TSA - Signer presentation verify - v1/presentation/verify POST ...@@ -72,11 +98,11 @@ Feature: API - TSA - Signer presentation verify - v1/presentation/verify POST
Then I get the last response body and load it to the current request body Then I get the last response body and load it to the current request body
When I load the REST request {Presentation.json} with profile {modified_credentialSubject_1_allow} When I load the REST request {Presentation.json} with profile {modified_credentialSubject_1_allow}
And I verify presentation proof via TSA Signer API And I verify presentation proof via TSA Signer API
# And the status code should be {400} And the status code should be {400}
# And the field {message} has the value {check embedded proof: check linked data proof: ecdsa: invalid signature} And the field {message} has the value {check embedded proof: check linked data proof: ecdsa: invalid signature}
@wip @bug-issue-signer#16 @negative @negative
Scenario: TSA - verify presentation proof with modified credentialSubject.allow field - Negative Scenario: TSA - verify presentation proof with modified second credentialSubject.allow field - Negative
When I load the REST request {Presentation.json} with profile {for_proof} When I load the REST request {Presentation.json} with profile {for_proof}
When I create presentation proof via TSA Signer API When I create presentation proof via TSA Signer API
And the status code should be {200} And the status code should be {200}
...@@ -85,11 +111,11 @@ Feature: API - TSA - Signer presentation verify - v1/presentation/verify POST ...@@ -85,11 +111,11 @@ Feature: API - TSA - Signer presentation verify - v1/presentation/verify POST
Then I get the last response body and load it to the current request body Then I get the last response body and load it to the current request body
When I load the REST request {Presentation.json} with profile {modified_credentialSubject_2_allow} When I load the REST request {Presentation.json} with profile {modified_credentialSubject_2_allow}
And I verify presentation proof via TSA Signer API And I verify presentation proof via TSA Signer API
# And the status code should be {400} And the status code should be {400}
# And the field {message} has the value {check embedded proof: check linked data proof: ecdsa: invalid signature} And the field {message} has the value {check embedded proof: check linked data proof: ecdsa: invalid signature}
@wip @bug-issue-signer#16 @negative @negative
Scenario: TSA - verify presentation proof with modified credentialSubject.ID field - Negative Scenario: TSA - verify presentation proof with modified first credentialSubject.ID field - Negative
When I load the REST request {Presentation.json} with profile {for_proof} When I load the REST request {Presentation.json} with profile {for_proof}
When I create presentation proof via TSA Signer API When I create presentation proof via TSA Signer API
And the status code should be {200} And the status code should be {200}
...@@ -98,11 +124,11 @@ Feature: API - TSA - Signer presentation verify - v1/presentation/verify POST ...@@ -98,11 +124,11 @@ Feature: API - TSA - Signer presentation verify - v1/presentation/verify POST
Then I get the last response body and load it to the current request body Then I get the last response body and load it to the current request body
When I load the REST request {Presentation.json} with profile {modified_credentialSubject_1_ID} When I load the REST request {Presentation.json} with profile {modified_credentialSubject_1_ID}
And I verify presentation proof via TSA Signer API And I verify presentation proof via TSA Signer API
# And the status code should be {400} And the status code should be {400}
# And the field {message} has the value {check embedded proof: check linked data proof: ecdsa: invalid signature} And the field {message} has the value {check embedded proof: check linked data proof: ecdsa: invalid signature}
@wip @bug-issue-signer#16 @negative @negative
Scenario: TSA - verify presentation proof with modified credentialSubject.ID field - Negative Scenario: TSA - verify presentation proof with modified second credentialSubject.ID field - Negative
When I load the REST request {Presentation.json} with profile {for_proof} When I load the REST request {Presentation.json} with profile {for_proof}
When I create presentation proof via TSA Signer API When I create presentation proof via TSA Signer API
And the status code should be {200} And the status code should be {200}
...@@ -111,5 +137,5 @@ Feature: API - TSA - Signer presentation verify - v1/presentation/verify POST ...@@ -111,5 +137,5 @@ Feature: API - TSA - Signer presentation verify - v1/presentation/verify POST
Then I get the last response body and load it to the current request body Then I get the last response body and load it to the current request body
When I load the REST request {Presentation.json} with profile {modified_credentialSubject_2_ID} When I load the REST request {Presentation.json} with profile {modified_credentialSubject_2_ID}
And I verify presentation proof via TSA Signer API And I verify presentation proof via TSA Signer API
# And the status code should be {400} And the status code should be {400}
# And the field {message} has the value {check embedded proof: check linked data proof: ecdsa: invalid signature} And the field {message} has the value {check embedded proof: check linked data proof: ecdsa: invalid signature}
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment