diff --git a/api-test/src/main/java/io/mosip/testrig/apirig/injicertify/testscripts/AddIdentity.java b/api-test/src/main/java/io/mosip/testrig/apirig/injicertify/testscripts/AddIdentity.java index 9a202a64..2b56c4c1 100644 --- a/api-test/src/main/java/io/mosip/testrig/apirig/injicertify/testscripts/AddIdentity.java +++ b/api-test/src/main/java/io/mosip/testrig/apirig/injicertify/testscripts/AddIdentity.java @@ -32,8 +32,8 @@ import io.mosip.testrig.apirig.testrunner.JsonPrecondtion; import io.mosip.testrig.apirig.utils.AdminTestException; import io.mosip.testrig.apirig.utils.AdminTestUtil; -import io.mosip.testrig.apirig.utils.AuthenticationTestException; import io.mosip.testrig.apirig.utils.GlobalConstants; +import io.mosip.testrig.apirig.utils.GlobalMethods; import io.mosip.testrig.apirig.utils.KernelAuthentication; import io.mosip.testrig.apirig.utils.OutputValidationUtil; import io.mosip.testrig.apirig.utils.ReportUtil; @@ -44,6 +44,7 @@ public class AddIdentity extends AdminTestUtil implements ITest { private static final Logger logger = Logger.getLogger(AddIdentity.class); protected String testCaseName = ""; public Response response = null; + private boolean isWaitRequired = false; /** * get current testcaseName @@ -80,53 +81,99 @@ public Object[] getTestCaseList(ITestContext context) { * @param objTestParameters * @param testScenario * @param testcaseName - * @throws AuthenticationTestException - * @throws AdminTestException + * @throws Exception */ @Test(dataProvider = "testcaselist") - public void test(TestCaseDTO testCaseDTO) throws AuthenticationTestException, AdminTestException { + public void test(TestCaseDTO testCaseDTO) throws Exception { testCaseName = testCaseDTO.getTestCaseName(); testCaseName = InjiCertifyUtil.isTestCaseValidForExecution(testCaseDTO); if (HealthChecker.signalTerminateExecution) { throw new SkipException( GlobalConstants.TARGET_ENV_HEALTH_CHECK_FAILED + HealthChecker.healthCheckFailureMapS); } - testCaseDTO.setInputTemplate(AdminTestUtil.modifySchemaGenerateHbs(testCaseDTO.isRegenerateHbs())); - String uin = JsonPrecondtion - .getValueFromJson( - RestClient.getRequestWithCookie(ApplnURI + "/v1/idgenerator/uin", MediaType.APPLICATION_JSON, - MediaType.APPLICATION_JSON, COOKIENAME, - new KernelAuthentication().getTokenByRole(testCaseDTO.getRole())).asString(), - "response.uin"); - - testCaseName = isTestCaseValidForExecution(testCaseDTO); - - DateFormat dateFormatter = new SimpleDateFormat("yyyyMMddHHmmss"); - Calendar cal = Calendar.getInstance(); - String timestampValue = dateFormatter.format(cal.getTime()); - String genRid = "27847" + generateRandomNumberString(10) + timestampValue; - - String jsonInput = testCaseDTO.getInput(); - - String inputJson = getJsonFromTemplate(jsonInput, testCaseDTO.getInputTemplate(), false); - - inputJson = inputJson.replace("$UIN$", uin); - inputJson = inputJson.replace("$RID$", genRid); - String phoneNumber = ""; - String email = testCaseName +"@mosip.net"; - if (inputJson.contains("$PHONENUMBERFORIDENTITY$")) { - if (!phoneSchemaRegex.isEmpty()) - try { - phoneNumber = genStringAsperRegex(phoneSchemaRegex); - } catch (Exception e) { - logger.error(e.getMessage()); - } - inputJson = replaceKeywordWithValue(inputJson, "$PHONENUMBERFORIDENTITY$", phoneNumber); - inputJson = replaceKeywordWithValue(inputJson, "$EMAILVALUE$", email); - } - response = postWithBodyAndCookie(ApplnURI + testCaseDTO.getEndPoint(), inputJson, COOKIENAME, - testCaseDTO.getRole(), testCaseDTO.getTestCaseName()); + if (testCaseDTO.getEndPoint().contains("mock-identity-system")) { + String individualIDStr = String.valueOf(Calendar.getInstance().getTimeInMillis()); + String phoneStr = generateRandomNumberString(10); + String emailStr = testCaseName + "@mosip.net"; + String passWordStr = properties.getProperty("passwordForAddIdentity"); + String url = ApplnURI.replace("-internal", "") + testCaseDTO.getEndPoint(); + + String inputJson = getJsonFromTemplate(testCaseDTO.getInput(), testCaseDTO.getInputTemplate()); + + inputJson = InjiCertifyUtil.inputstringKeyWordHandeler(inputJson, testCaseName); + + if (inputJson.contains("$RANDOMINDIVIDUALIDFORMOCKIDENTITY$")) { + inputJson = replaceKeywordWithValue(inputJson, "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", individualIDStr); + writeAutoGeneratedId(testCaseName, "UIN", individualIDStr); + } + + if (inputJson.contains("$EMAILIDFORMOCKIDENTITY$")) { + inputJson = replaceKeywordWithValue(inputJson, "$EMAILIDFORMOCKIDENTITY$", emailStr); + writeAutoGeneratedId(testCaseName, "EMAIL", emailStr); + } + if (inputJson.contains("$PASSWORDFORMOCKIDENTITY$")) { + inputJson = replaceKeywordWithValue(inputJson, "$PASSWORDFORMOCKIDENTITY$", passWordStr); + writeAutoGeneratedId(testCaseName, "PASSWORD", passWordStr); + } + if (inputJson.contains("$PHONEFORMOCKIDENTITY$")) { + inputJson = replaceKeywordWithValue(inputJson, "$PHONEFORMOCKIDENTITY$", phoneStr); + writeAutoGeneratedId(testCaseName, "PHONE", phoneStr); + } + + GlobalMethods.reportRequest(null, inputJson, url); + + response = RestClient.post(url, inputJson); + + GlobalMethods.reportResponse(response.getHeaders().asList().toString(), url, response); + } else { + isWaitRequired = true; + testCaseDTO.setInputTemplate(AdminTestUtil.modifySchemaGenerateHbs(testCaseDTO.isRegenerateHbs())); + String uin = JsonPrecondtion.getValueFromJson( + RestClient.getRequestWithCookie(ApplnURI + "/v1/idgenerator/uin", MediaType.APPLICATION_JSON, + MediaType.APPLICATION_JSON, COOKIENAME, + new KernelAuthentication().getTokenByRole(testCaseDTO.getRole())).asString(), + "response.uin"); + + testCaseName = isTestCaseValidForExecution(testCaseDTO); + + DateFormat dateFormatter = new SimpleDateFormat("yyyyMMddHHmmss"); + Calendar cal = Calendar.getInstance(); + String timestampValue = dateFormatter.format(cal.getTime()); + String genRid = "27847" + generateRandomNumberString(10) + timestampValue; + + String jsonInput = testCaseDTO.getInput(); + + String inputJson = getJsonFromTemplate(jsonInput, testCaseDTO.getInputTemplate(), false); + + inputJson = inputJson.replace("$UIN$", uin); + inputJson = inputJson.replace("$RID$", genRid); + String phoneNumber = ""; + String email = testCaseName + "@mosip.net"; + if (inputJson.contains("$PHONENUMBERFORIDENTITY$")) { + if (!phoneSchemaRegex.isEmpty()) + try { + phoneNumber = genStringAsperRegex(phoneSchemaRegex); + } catch (Exception e) { + logger.error(e.getMessage()); + } + inputJson = replaceKeywordWithValue(inputJson, "$PHONENUMBERFORIDENTITY$", phoneNumber); + inputJson = replaceKeywordWithValue(inputJson, "$EMAILVALUE$", email); + } + + response = postWithBodyAndCookie(ApplnURI + testCaseDTO.getEndPoint(), inputJson, COOKIENAME, + testCaseDTO.getRole(), testCaseDTO.getTestCaseName()); + + if (testCaseDTO.getTestCaseName().contains("_Pos")) { + writeAutoGeneratedId(testCaseDTO.getTestCaseName(), "UIN", uin); + writeAutoGeneratedId(testCaseDTO.getTestCaseName(), "RID", genRid); + writeAutoGeneratedId(testCaseDTO.getTestCaseName(), "EMAIL", + testCaseDTO.getTestCaseName() + "@mosip.net"); + writeAutoGeneratedId(testCaseDTO.getTestCaseName(), "PHONE", phoneNumber); + } + if (!phoneNumber.isEmpty()) + writeAutoGeneratedId(testCaseDTO.getTestCaseName(), "PHONE", phoneNumber); + } Map> ouputValid = OutputValidationUtil.doJsonOutputValidation( response.asString(), getJsonFromTemplate(testCaseDTO.getOutput(), testCaseDTO.getOutputTemplate()), @@ -135,14 +182,7 @@ public void test(TestCaseDTO testCaseDTO) throws AuthenticationTestException, Ad if (!OutputValidationUtil.publishOutputResult(ouputValid)) throw new AdminTestException("Failed at output validation"); - if (testCaseDTO.getTestCaseName().contains("_Pos")) { - writeAutoGeneratedId(testCaseDTO.getTestCaseName(), "UIN", uin); - writeAutoGeneratedId(testCaseDTO.getTestCaseName(), "RID", genRid); - writeAutoGeneratedId(testCaseDTO.getTestCaseName(), "EMAIL", testCaseDTO.getTestCaseName() + "@mosip.net"); - writeAutoGeneratedId(testCaseDTO.getTestCaseName(), "PHONE", phoneNumber); - } - if (!phoneNumber.isEmpty()) - writeAutoGeneratedId(testCaseDTO.getTestCaseName(), "PHONE", phoneNumber); + } /** @@ -169,9 +209,11 @@ public void setResultTestName(ITestResult result) { public void waittime() { try { - logger.info( - "waiting for " + properties.getProperty("Delaytime") + " mili secs after UIN Generation In IDREPO"); - Thread.sleep(Long.parseLong(properties.getProperty("Delaytime"))); + if (isWaitRequired == true) { + logger.info("waiting for " + properties.getProperty("Delaytime") + + " mili secs after UIN Generation In IDREPO"); + Thread.sleep(Long.parseLong(properties.getProperty("Delaytime"))); + } } catch (Exception e) { logger.error("Exception : " + e.getMessage()); diff --git a/api-test/src/main/java/io/mosip/testrig/apirig/injicertify/testscripts/DeleteWithParam.java b/api-test/src/main/java/io/mosip/testrig/apirig/injicertify/testscripts/DeleteWithParam.java new file mode 100644 index 00000000..e3c44cc2 --- /dev/null +++ b/api-test/src/main/java/io/mosip/testrig/apirig/injicertify/testscripts/DeleteWithParam.java @@ -0,0 +1,166 @@ +package io.mosip.testrig.apirig.injicertify.testscripts; + +import java.lang.reflect.Field; +import java.util.ArrayList; +import java.util.List; +import java.util.Map; + +import org.apache.log4j.Level; +import org.apache.log4j.Logger; +import org.json.JSONObject; +import org.testng.ITest; +import org.testng.ITestContext; +import org.testng.ITestResult; +import org.testng.Reporter; +import org.testng.SkipException; +import org.testng.annotations.AfterMethod; +import org.testng.annotations.BeforeClass; +import org.testng.annotations.DataProvider; +import org.testng.annotations.Test; +import org.testng.internal.BaseTestMethod; +import org.testng.internal.TestResult; + +import io.mosip.testrig.apirig.dto.OutputValidationDto; +import io.mosip.testrig.apirig.dto.TestCaseDTO; +import io.mosip.testrig.apirig.injicertify.utils.InjiCertifyConfigManager; +import io.mosip.testrig.apirig.injicertify.utils.InjiCertifyUtil; +import io.mosip.testrig.apirig.testrunner.HealthChecker; +import io.mosip.testrig.apirig.utils.AdminTestException; +import io.mosip.testrig.apirig.utils.AdminTestUtil; +import io.mosip.testrig.apirig.utils.AuthenticationTestException; +import io.mosip.testrig.apirig.utils.GlobalConstants; +import io.mosip.testrig.apirig.utils.OutputValidationUtil; +import io.mosip.testrig.apirig.utils.ReportUtil; +import io.restassured.response.Response; + +public class DeleteWithParam extends AdminTestUtil implements ITest { + private static final Logger logger = Logger.getLogger(DeleteWithParam.class); + protected String testCaseName = ""; + public Response response = null; + + @BeforeClass + public static void setLogLevel() { + if (InjiCertifyConfigManager.IsDebugEnabled()) + logger.setLevel(Level.ALL); + else + logger.setLevel(Level.ERROR); + } + + /** + * get current testcaseName + */ + @Override + public String getTestName() { + return testCaseName; + } + + /** + * Data provider class provides test case list + * + * @return object of data provider + */ + @DataProvider(name = "testcaselist") + public Object[] getTestCaseList(ITestContext context) { + String ymlFile = context.getCurrentXmlTest().getLocalParameters().get("ymlFile"); + logger.info("Started executing yml: " + ymlFile); + return getYmlTestData(ymlFile); + } + + /** + * Test method for OTP Generation execution + * + * @param objTestParameters + * @param testScenario + * @param testcaseName + * @throws AuthenticationTestException + * @throws AdminTestException + */ + @Test(dataProvider = "testcaselist") + public void test(TestCaseDTO testCaseDTO) throws AuthenticationTestException, AdminTestException { + testCaseName = testCaseDTO.getTestCaseName(); + testCaseName = InjiCertifyUtil.isTestCaseValidForExecution(testCaseDTO); + if (HealthChecker.signalTerminateExecution) { + throw new SkipException( + GlobalConstants.TARGET_ENV_HEALTH_CHECK_FAILED + HealthChecker.healthCheckFailureMapS); + } + String[] templateFields = testCaseDTO.getTemplateFields(); + + if (testCaseDTO.getTemplateFields() != null && templateFields.length > 0) { + ArrayList inputtestCases = AdminTestUtil.getInputTestCase(testCaseDTO); + ArrayList outputtestcase = AdminTestUtil.getOutputTestCase(testCaseDTO); + + for (int i = 0; i < languageList.size(); i++) { + response = deleteWithPathParamAndCookie(ApplnURI + testCaseDTO.getEndPoint(), + getJsonFromTemplate(inputtestCases.get(i).toString(), testCaseDTO.getInputTemplate()), + COOKIENAME, testCaseDTO.getRole(), testCaseDTO.getTestCaseName()); + + Map> ouputValid = OutputValidationUtil.doJsonOutputValidation( + response.asString(), + getJsonFromTemplate(outputtestcase.get(i).toString(), testCaseDTO.getOutputTemplate()), + testCaseDTO, response.getStatusCode()); + Reporter.log(ReportUtil.getOutputValidationReport(ouputValid)); + + if (!OutputValidationUtil.publishOutputResult(ouputValid)) + throw new AdminTestException("Failed at output validation"); + } + } + + else { + + if (testCaseName.contains("ESignet_")) { + if (InjiCertifyConfigManager.isInServiceNotDeployedList(GlobalConstants.ESIGNET)) { + throw new SkipException("esignet is not deployed hence skipping the testcase"); + } + + String tempUrl = ApplnURI; + + if (testCaseDTO.getEndPoint().startsWith("$SUNBIRDBASEURL$") && testCaseName.contains("SunBirdR")) { + + if (InjiCertifyConfigManager.isInServiceNotDeployedList("sunbirdrc")) + throw new SkipException(GlobalConstants.SERVICE_NOT_DEPLOYED_MESSAGE); + + if (InjiCertifyConfigManager.getSunBirdBaseURL() != null && !InjiCertifyConfigManager.getSunBirdBaseURL().isBlank()) + tempUrl = InjiCertifyConfigManager.getSunBirdBaseURL(); + //Once sunbird registry is pointing to specific env, remove the above line and uncomment below line + //tempUrl = ApplnURI.replace(GlobalConstants.API_INTERNAL, MimotoConfigManager.getSunBirdBaseURL()); + testCaseDTO.setEndPoint(testCaseDTO.getEndPoint().replace("$SUNBIRDBASEURL$", "")); + } + + response = deleteWithPathParamAndCookie(tempUrl + testCaseDTO.getEndPoint(), + getJsonFromTemplate(testCaseDTO.getInput(), testCaseDTO.getInputTemplate()), COOKIENAME, + testCaseDTO.getRole(), testCaseDTO.getTestCaseName()); + + } else { + response = deleteWithPathParamAndCookie(ApplnURI + testCaseDTO.getEndPoint(), + getJsonFromTemplate(testCaseDTO.getInput(), testCaseDTO.getInputTemplate()), COOKIENAME, + testCaseDTO.getRole(), testCaseDTO.getTestCaseName()); + } + Map> ouputValid = OutputValidationUtil.doJsonOutputValidation( + response.asString(), getJsonFromTemplate(testCaseDTO.getOutput(), testCaseDTO.getOutputTemplate()), + testCaseDTO, response.getStatusCode()); + Reporter.log(ReportUtil.getOutputValidationReport(ouputValid)); + if (!OutputValidationUtil.publishOutputResult(ouputValid)) + throw new AdminTestException("Failed at output validation"); + } + } + + /** + * The method ser current test name to result + * + * @param result + */ + @AfterMethod(alwaysRun = true) + public void setResultTestName(ITestResult result) { + try { + Field method = TestResult.class.getDeclaredField("m_method"); + method.setAccessible(true); + method.set(result, result.getMethod().clone()); + BaseTestMethod baseTestMethod = (BaseTestMethod) result.getMethod(); + Field f = baseTestMethod.getClass().getSuperclass().getDeclaredField("m_methodName"); + f.setAccessible(true); + f.set(baseTestMethod, testCaseName); + } catch (Exception e) { + Reporter.log("Exception : " + e.getMessage()); + } + } +} \ No newline at end of file diff --git a/api-test/src/main/java/io/mosip/testrig/apirig/injicertify/testscripts/GetWithParam.java b/api-test/src/main/java/io/mosip/testrig/apirig/injicertify/testscripts/GetWithParam.java new file mode 100644 index 00000000..3ed9327a --- /dev/null +++ b/api-test/src/main/java/io/mosip/testrig/apirig/injicertify/testscripts/GetWithParam.java @@ -0,0 +1,203 @@ +package io.mosip.testrig.apirig.injicertify.testscripts; + +import java.lang.reflect.Field; +import java.util.ArrayList; +import java.util.HashMap; +import java.util.List; +import java.util.Map; + +import org.apache.log4j.Level; +import org.apache.log4j.Logger; +import org.json.JSONObject; +import org.testng.ITest; +import org.testng.ITestContext; +import org.testng.ITestResult; +import org.testng.Reporter; +import org.testng.SkipException; +import org.testng.annotations.AfterMethod; +import org.testng.annotations.BeforeClass; +import org.testng.annotations.DataProvider; +import org.testng.annotations.Test; +import org.testng.internal.BaseTestMethod; +import org.testng.internal.TestResult; + +import io.mosip.testrig.apirig.dto.OutputValidationDto; +import io.mosip.testrig.apirig.dto.TestCaseDTO; +import io.mosip.testrig.apirig.injicertify.utils.InjiCertifyConfigManager; +import io.mosip.testrig.apirig.injicertify.utils.InjiCertifyUtil; +import io.mosip.testrig.apirig.testrunner.BaseTestCase; +import io.mosip.testrig.apirig.testrunner.HealthChecker; +import io.mosip.testrig.apirig.utils.AdminTestException; +import io.mosip.testrig.apirig.utils.AdminTestUtil; +import io.mosip.testrig.apirig.utils.AuthenticationTestException; +import io.mosip.testrig.apirig.utils.GlobalConstants; +import io.mosip.testrig.apirig.utils.OutputValidationUtil; +import io.mosip.testrig.apirig.utils.ReportUtil; +import io.restassured.response.Response; + +public class GetWithParam extends AdminTestUtil implements ITest { + private static final Logger logger = Logger.getLogger(GetWithParam.class); + protected String testCaseName = ""; + public Response response = null; + public boolean sendEsignetToken = false; + public boolean auditLogCheck = false; + + @BeforeClass + public static void setLogLevel() { + if (InjiCertifyConfigManager.IsDebugEnabled()) + logger.setLevel(Level.ALL); + else + logger.setLevel(Level.ERROR); + } + + /** + * get current testcaseName + */ + @Override + public String getTestName() { + return testCaseName; + } + + /** + * Data provider class provides test case list + * + * @return object of data provider + */ + @DataProvider(name = "testcaselist") + public Object[] getTestCaseList(ITestContext context) { + String ymlFile = context.getCurrentXmlTest().getLocalParameters().get("ymlFile"); + sendEsignetToken = context.getCurrentXmlTest().getLocalParameters().containsKey("sendEsignetToken"); + logger.info("Started executing yml: " + ymlFile); + return getYmlTestData(ymlFile); + } + + /** + * Test method for OTP Generation execution + * + * @param objTestParameters + * @param testScenario + * @param testcaseName + * @throws AuthenticationTestException + * @throws AdminTestException + */ + @Test(dataProvider = "testcaselist") + public void test(TestCaseDTO testCaseDTO) throws AuthenticationTestException, AdminTestException { + testCaseName = testCaseDTO.getTestCaseName(); + testCaseName = InjiCertifyUtil.isTestCaseValidForExecution(testCaseDTO); + if (HealthChecker.signalTerminateExecution) { + throw new SkipException( + GlobalConstants.TARGET_ENV_HEALTH_CHECK_FAILED + HealthChecker.healthCheckFailureMapS); + } + + if (testCaseDTO.getTestCaseName().contains("VID") || testCaseDTO.getTestCaseName().contains("Vid")) { + if (!BaseTestCase.getSupportedIdTypesValueFromActuator().contains("VID") + && !BaseTestCase.getSupportedIdTypesValueFromActuator().contains("vid")) { + throw new SkipException(GlobalConstants.VID_FEATURE_NOT_SUPPORTED); + } + } + auditLogCheck = testCaseDTO.isAuditLogCheck(); + String[] templateFields = testCaseDTO.getTemplateFields(); + + if (testCaseDTO.getInputTemplate().contains(GlobalConstants.$PRIMARYLANG$)) + testCaseDTO.setInputTemplate(testCaseDTO.getInputTemplate().replace(GlobalConstants.$PRIMARYLANG$, + BaseTestCase.languageList.get(0))); + if (testCaseDTO.getOutputTemplate().contains(GlobalConstants.$PRIMARYLANG$)) + testCaseDTO.setOutputTemplate(testCaseDTO.getOutputTemplate().replace(GlobalConstants.$PRIMARYLANG$, + BaseTestCase.languageList.get(0))); + if (testCaseDTO.getInput().contains(GlobalConstants.$PRIMARYLANG$)) + testCaseDTO.setInput( + testCaseDTO.getInput().replace(GlobalConstants.$PRIMARYLANG$, BaseTestCase.languageList.get(0))); + if (testCaseDTO.getOutput().contains(GlobalConstants.$PRIMARYLANG$)) + testCaseDTO.setOutput( + testCaseDTO.getOutput().replace(GlobalConstants.$PRIMARYLANG$, BaseTestCase.languageList.get(0))); + + if (testCaseDTO.getTemplateFields() != null && templateFields.length > 0) { + ArrayList inputtestCases = AdminTestUtil.getInputTestCase(testCaseDTO); + ArrayList outputtestcase = AdminTestUtil.getOutputTestCase(testCaseDTO); + for (int i = 0; i < languageList.size(); i++) { + response = getWithPathParamAndCookie(ApplnURI + testCaseDTO.getEndPoint(), + getJsonFromTemplate(inputtestCases.get(i).toString(), testCaseDTO.getInputTemplate()), + COOKIENAME, testCaseDTO.getRole(), testCaseDTO.getTestCaseName()); + + Map> ouputValid = OutputValidationUtil.doJsonOutputValidation( + response.asString(), + getJsonFromTemplate(outputtestcase.get(i).toString(), testCaseDTO.getOutputTemplate()), + testCaseDTO, response.getStatusCode()); + Reporter.log(ReportUtil.getOutputValidationReport(ouputValid)); + + if (!OutputValidationUtil.publishOutputResult(ouputValid)) + throw new AdminTestException("Failed at output validation"); + } + } + + else { + + if (testCaseName.contains("ESignet_")) { + if (InjiCertifyConfigManager.isInServiceNotDeployedList(GlobalConstants.ESIGNET)) { + throw new SkipException("esignet is not deployed hence skipping the testcase"); + } + + String tempUrl = ApplnURI; + + if (testCaseDTO.getEndPoint().startsWith("$SUNBIRDBASEURL$") && testCaseName.contains("SunBirdR")) { + + if (InjiCertifyConfigManager.isInServiceNotDeployedList("sunbirdrc")) + throw new SkipException(GlobalConstants.SERVICE_NOT_DEPLOYED_MESSAGE); + + if (InjiCertifyConfigManager.getSunBirdBaseURL() != null && !InjiCertifyConfigManager.getSunBirdBaseURL().isBlank()) + tempUrl = InjiCertifyConfigManager.getSunBirdBaseURL(); + //Once sunbird registry is pointing to specific env, remove the above line and uncomment below line + //tempUrl = ApplnURI.replace(GlobalConstants.API_INTERNAL, MimotoConfigManager.getSunBirdBaseURL()); + testCaseDTO.setEndPoint(testCaseDTO.getEndPoint().replace("$SUNBIRDBASEURL$", "")); + } + + response = getWithPathParamAndCookie(tempUrl + testCaseDTO.getEndPoint(), + getJsonFromTemplate(testCaseDTO.getInput(), testCaseDTO.getInputTemplate()), auditLogCheck, + COOKIENAME, testCaseDTO.getRole(), testCaseDTO.getTestCaseName(), sendEsignetToken); + + } else { + response = getWithPathParamAndCookie(ApplnURI + testCaseDTO.getEndPoint(), + getJsonFromTemplate(testCaseDTO.getInput(), testCaseDTO.getInputTemplate()), auditLogCheck, + COOKIENAME, testCaseDTO.getRole(), testCaseDTO.getTestCaseName(), sendEsignetToken); + } + + Map> ouputValid = null; + if (testCaseName.contains("_StatusCode")) { + + OutputValidationDto customResponse = customStatusCodeResponse(String.valueOf(response.getStatusCode()), + testCaseDTO.getOutput()); + + ouputValid = new HashMap<>(); + ouputValid.put(GlobalConstants.EXPECTED_VS_ACTUAL, List.of(customResponse)); + } else { + ouputValid = OutputValidationUtil.doJsonOutputValidation(response.asString(), + getJsonFromTemplate(testCaseDTO.getOutput(), testCaseDTO.getOutputTemplate()), testCaseDTO, + response.getStatusCode()); + } + + Reporter.log(ReportUtil.getOutputValidationReport(ouputValid)); + if (!OutputValidationUtil.publishOutputResult(ouputValid)) + throw new AdminTestException("Failed at output validation"); + } + } + + /** + * The method ser current test name to result + * + * @param result + */ + @AfterMethod(alwaysRun = true) + public void setResultTestName(ITestResult result) { + try { + Field method = TestResult.class.getDeclaredField("m_method"); + method.setAccessible(true); + method.set(result, result.getMethod().clone()); + BaseTestMethod baseTestMethod = (BaseTestMethod) result.getMethod(); + Field f = baseTestMethod.getClass().getSuperclass().getDeclaredField("m_methodName"); + f.setAccessible(true); + f.set(baseTestMethod, testCaseName); + } catch (Exception e) { + Reporter.log("Exception : " + e.getMessage()); + } + } +} diff --git a/api-test/src/main/java/io/mosip/testrig/apirig/injicertify/utils/InjiCertifyUtil.java b/api-test/src/main/java/io/mosip/testrig/apirig/injicertify/utils/InjiCertifyUtil.java index c588235c..af095136 100644 --- a/api-test/src/main/java/io/mosip/testrig/apirig/injicertify/utils/InjiCertifyUtil.java +++ b/api-test/src/main/java/io/mosip/testrig/apirig/injicertify/utils/InjiCertifyUtil.java @@ -211,6 +211,9 @@ public static String getTempURL(TestCaseDTO testCaseDTO, String endPoint) { } else if (testCaseDTO.getEndPoint().startsWith("$INJICERTIFYMOCKIDABASEURL$") && testCaseName.contains("_GetCredentialForMockIDA")) { return ApplnURI.replace("api-internal", "injicertify-mock"); + } else if (testCaseDTO.getEndPoint().startsWith("$SUNBIRDBASEURL$") + && testCaseName.contains("Policy_")) { + return InjiCertifyConfigManager.getSunBirdBaseURL(); } @@ -232,10 +235,21 @@ public static String getKeyWordFromEndPoint(String endPoint) { return "$INJICERTIFYMOSIPIDBASEURL$"; if (endPoint.startsWith("$INJICERTIFYMOCKIDABASEURL$")) return "$INJICERTIFYMOCKIDABASEURL$"; + if (endPoint.startsWith("$SUNBIRDBASEURL$")) + return "$SUNBIRDBASEURL$"; return ""; } + public static String inputstringKeyWordHandeler(String jsonString, String testCaseName) { + if (jsonString.contains(GlobalConstants.TIMESTAMP)) + jsonString = replaceKeywordValue(jsonString, GlobalConstants.TIMESTAMP, generateCurrentUTCTimeStamp()); + + + return jsonString; + + } + public static String isTestCaseValidForExecution(TestCaseDTO testCaseDTO) { String testCaseName = testCaseDTO.getTestCaseName(); diff --git a/api-test/src/main/resources/config/application.properties b/api-test/src/main/resources/config/application.properties index 0714a0e5..aa554683 100644 --- a/api-test/src/main/resources/config/application.properties +++ b/api-test/src/main/resources/config/application.properties @@ -100,7 +100,7 @@ passwordToReset=12341234_AaB XSRFTOKEN=7d01b2a8-b89d-41ad-9361-d7f6294021d1 codeChallenge=E9Melhoa2OwvFrEMTJguCHaoeK1t8URWbuGJSstw-cM codeVerifier=dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk -policyNumberForSunBirdRC=948108765 +policyNumberForSunBirdRC=325698741 challengeValueForSunBirdRC=eyJmdWxsTmFtZSI6IlNhbmNoaSBTaW5naCIsImRvYiI6IjE5OTgtMDEtMjQifQ== -fullNameForSunBirdRC=Baldev -dobForSunBirdRC=1988-12-21 \ No newline at end of file +fullNameForSunBirdRC=johncena +dobForSunBirdRC=1982-12-12 \ No newline at end of file diff --git a/api-test/src/main/resources/config/injiCertify.properties b/api-test/src/main/resources/config/injiCertify.properties index 31c9196d..a09f51b1 100644 --- a/api-test/src/main/resources/config/injiCertify.properties +++ b/api-test/src/main/resources/config/injiCertify.properties @@ -12,4 +12,5 @@ esignetWellKnownEndPoint=/v1/esignet/oidc/.well-known/openid-configuration signupSettingsEndPoint=/v1/signup/settings actuatorMimotoEndpoint=/residentmobileapp/actuator/env esignetActuatorPropertySection=esignet-default.properties -injiCertifyWellKnownEndPoint=/v1/certify/issuance/.well-known/openid-credential-issuer \ No newline at end of file +injiCertifyWellKnownEndPoint=/v1/certify/issuance/.well-known/openid-credential-issuer +sunBirdBaseURL=https://registry.dev1.mosip.net \ No newline at end of file diff --git a/api-test/src/main/resources/injicertify/AddIdentityMock/AddIdentity.hbs b/api-test/src/main/resources/injicertify/AddIdentityMock/AddIdentity.hbs new file mode 100644 index 00000000..cc39a3b0 --- /dev/null +++ b/api-test/src/main/resources/injicertify/AddIdentityMock/AddIdentity.hbs @@ -0,0 +1,101 @@ +{ + "requestTime": "{{requesttime}}", + "request": { + "individualId": "{{individualId}}", + "pin": "{{pin}}", + "email": "{{email}}", + "phone": "{{phone}}", + "fullName": [ + { + "language": "fra", + "value": "Siddharth K Mansour" + }, + { + "language": "ara", + "value": "تتگلدكنسَزقهِقِفل دسييسيكدكنوڤو" + }, + { + "language": "eng", + "value": "Siddharth K Mansour" + } + ], + "gender": [ + { + "language": "eng", + "value": "Male" + }, + { + "language": "fra", + "value": "Mâle" + }, + { + "language": "ara", + "value": "ذكر" + } + ], + "dateOfBirth": "1987/11/25", + "streetAddress": [ + { + "language": "fra", + "value": "yuān⥍" + }, + { + "language": "ara", + "value": "$لُنگᆑ" + }, + { + "language": "eng", + "value": "Slung" + } + ], + "locality": [ + { + "language": "fra", + "value": "yuān 2" + }, + { + "language": "ara", + "value": "يَُانꉛ⥍" + }, + { + "language": "eng", + "value": "yuan wee" + } + ], + "region": [ + { + "language": "fra", + "value": "yuān 3" + }, + { + "language": "ara", + "value": "$لُنگᆑ" + }, + { + "language": "eng", + "value": "yuan wee 3" + } + ], + "postalCode": "45009", + "country": [ + { + "language": "fra", + "value": "CMâttye" + }, + { + "language": "ara", + "value": "دسييسيكدك" + }, + { + "language": "eng", + "value": "Cmattey" + } + ], + "encodedPhoto": "data:image/jpeg;base64,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", + "individualBiometrics": { + "format": "cbeff", + "version": 1, + "value": "individualBiometrics_bio_CBEFF" + } + } +} \ No newline at end of file diff --git a/api-test/src/main/resources/injicertify/AddIdentityMock/AddIdentity.yml b/api-test/src/main/resources/injicertify/AddIdentityMock/AddIdentity.yml new file mode 100644 index 00000000..6642fcb9 --- /dev/null +++ b/api-test/src/main/resources/injicertify/AddIdentityMock/AddIdentity.yml @@ -0,0 +1,19 @@ +AddIdentity: + InjiCertify_AddIdentity_For_Mock_Valid_smoke_Pos: + endPoint: /v1/mock-identity-system/identity + description: Add identity for mock scenario + role: idrepo + restMethod: post + inputTemplate: injicertify/AddIdentityMock/AddIdentity + outputTemplate: injicertify/AddIdentityMock/addIdentityResult + input: '{ + "requesttime": "$TIMESTAMP$", + "individualId": "$RANDOMINDIVIDUALIDFORMOCKIDENTITY$", + "pin": "545411", + "email": "$EMAILIDFORMOCKIDENTITY$", + "password": "$PASSWORDFORMOCKIDENTITY$", + "phone": "$PHONEFORMOCKIDENTITY$" +}' + output: '{ + "status":"mock identity data created successfully" +}' \ No newline at end of file diff --git a/api-test/src/main/resources/injicertify/AddIdentityMock/addIdentityResult.hbs b/api-test/src/main/resources/injicertify/AddIdentityMock/addIdentityResult.hbs new file mode 100644 index 00000000..ca45b742 --- /dev/null +++ b/api-test/src/main/resources/injicertify/AddIdentityMock/addIdentityResult.hbs @@ -0,0 +1,5 @@ +{ + "response": { + "status": "{{status}}" + } +} \ No newline at end of file diff --git a/api-test/src/main/resources/injicertify/SunBirdCNegative/AuthenticateUserSunBirdCNeg/AuthenticateUserSunBirdCNeg.yml b/api-test/src/main/resources/injicertify/SunBirdCNegative/AuthenticateUserSunBirdCNeg/AuthenticateUserSunBirdCNeg.yml index d1c2d476..1d285cd4 100644 --- a/api-test/src/main/resources/injicertify/SunBirdCNegative/AuthenticateUserSunBirdCNeg/AuthenticateUserSunBirdCNeg.yml +++ b/api-test/src/main/resources/injicertify/SunBirdCNegative/AuthenticateUserSunBirdCNeg/AuthenticateUserSunBirdCNeg.yml @@ -10,9 +10,9 @@ AuthenticateUserSunBirdCNeg: inputTemplate: injicertify/SunBirdCNegative/AuthenticateUserSunBirdCNeg/AuthenticateUserSunBirdCNeg outputTemplate: injicertify/SunBirdCNegative/AuthenticateUserSunBirdCNeg/AuthenticateUserSunBirdCResultNeg input: '{ - "encodedHash": "$ID:ESignet_OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid_encodedResp$", + "encodedHash": "$ID:ESignet_OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid_Neg_encodedResp$", "requestTime": "$TIMESTAMP$", - "transactionId": "$ID:ESignet_OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid_transactionId$", + "transactionId": "$ID:ESignet_OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid_Neg_transactionId$", "individualId": "$POLICYNUMBERFORSUNBIRDRC$", "authFactorType" : "KBA", "challenge" : "$CHALLENGEVALUEFORSUNBIRDC$", diff --git a/api-test/src/main/resources/injicertify/SunBirdCNegative/AuthorizationCodeSunBirdCNeg/AuthorizationCodeSunBirdCNeg.yml b/api-test/src/main/resources/injicertify/SunBirdCNegative/AuthorizationCodeSunBirdCNeg/AuthorizationCodeSunBirdCNeg.yml index 094dade4..3233ba62 100644 --- a/api-test/src/main/resources/injicertify/SunBirdCNegative/AuthorizationCodeSunBirdCNeg/AuthorizationCodeSunBirdCNeg.yml +++ b/api-test/src/main/resources/injicertify/SunBirdCNegative/AuthorizationCodeSunBirdCNeg/AuthorizationCodeSunBirdCNeg.yml @@ -10,9 +10,9 @@ AuthorizationCodeSunBirdCNeg: inputTemplate: injicertify/SunBirdCNegative/AuthorizationCodeSunBirdCNeg/AuthorizationCodeSunBirdCNeg outputTemplate: injicertify/SunBirdCNegative/AuthorizationCodeSunBirdCNeg/AuthorizationCodeSunBirdCResultNeg input: '{ - "encodedHash": "$ID:ESignet_OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid_encodedResp$", + "encodedHash": "$ID:ESignet_OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid_Neg_encodedResp$", "requestTime": "$TIMESTAMP$", - "transactionId": "$ID:ESignet_OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid_transactionId$", + "transactionId": "$ID:ESignet_OAuthDetailsRequest_SunBirdC_all_Valid_Smoke_sid_Neg_transactionId$", "permittedAuthorizeScopes": [{scope: "sunbird_rc_insurance_vc_ldp"}] }' output: '{ diff --git a/api-test/src/main/resources/injicertify/SunBirdCNegative/GenerateTokenSunBirdCNeg/GenerateTokenSunBirdCNeg.yml b/api-test/src/main/resources/injicertify/SunBirdCNegative/GenerateTokenSunBirdCNeg/GenerateTokenSunBirdCNeg.yml index bdee6961..31b35cea 100644 --- a/api-test/src/main/resources/injicertify/SunBirdCNegative/GenerateTokenSunBirdCNeg/GenerateTokenSunBirdCNeg.yml +++ b/api-test/src/main/resources/injicertify/SunBirdCNegative/GenerateTokenSunBirdCNeg/GenerateTokenSunBirdCNeg.yml @@ -10,7 +10,7 @@ GenerateTokenSunBirdCNeg: outputTemplate: injicertify/SunBirdCNegative/GenerateTokenSunBirdCNeg/GenerateTokenSunBirdCResultNeg input: '{ "grant_type": "authorization_code", - "code": "$ID:ESignet_AuthorizationCode_SunBirdC_All_Valid_Smoke_sid_code$", + "code": "$ID:ESignet_AuthorizationCode_SunBirdC_All_Valid_Smoke_sid_Neg_code$", "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer", "client_assertion": "$CLIENT_ASSERTION_USER4_JWK$", diff --git a/api-test/src/main/resources/injicertify/SunBirdCNegative/GetCredentialSunBirdCNeg/GetCredentialSunBirdCNeg.yml b/api-test/src/main/resources/injicertify/SunBirdCNegative/GetCredentialSunBirdCNeg/GetCredentialSunBirdCNeg.yml index f302b5d8..ebf89f9c 100644 --- a/api-test/src/main/resources/injicertify/SunBirdCNegative/GetCredentialSunBirdCNeg/GetCredentialSunBirdCNeg.yml +++ b/api-test/src/main/resources/injicertify/SunBirdCNegative/GetCredentialSunBirdCNeg/GetCredentialSunBirdCNeg.yml @@ -11,7 +11,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "abcdef", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], @@ -33,7 +33,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], "proof_type": "jwt", @@ -54,7 +54,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "jwt_vc_json", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], @@ -76,7 +76,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "ldp_vc, jwt_vc_json-ld", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], @@ -98,7 +98,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], @@ -120,7 +120,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "ldp_vc", "type": [{types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], @@ -142,7 +142,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "ldp_vc", "type": [{types: "abcdefghij"}], "@context": [{context: "$VCICONTEXTURL$"}], @@ -164,7 +164,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}] @@ -184,7 +184,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], @@ -205,7 +205,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], @@ -227,7 +227,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], @@ -249,7 +249,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], @@ -271,7 +271,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], @@ -293,7 +293,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], @@ -314,7 +314,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], @@ -336,7 +336,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], @@ -358,7 +358,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], @@ -380,7 +380,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], @@ -402,7 +402,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], @@ -424,7 +424,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], @@ -446,7 +446,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], @@ -468,7 +468,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], @@ -490,7 +490,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], @@ -512,7 +512,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], @@ -534,7 +534,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], @@ -556,7 +556,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], @@ -578,7 +578,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], @@ -600,7 +600,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], @@ -622,7 +622,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], @@ -644,7 +644,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], @@ -666,7 +666,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], @@ -688,7 +688,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"}], "@context": [{context: "$VCICONTEXTURL$"}], @@ -710,7 +710,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"},{types: "abcdef"}], "@context": [{context: "$VCICONTEXTURL$"}], @@ -732,7 +732,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"}], "@context": "", @@ -754,7 +754,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"}], "proof_type": "jwt", @@ -775,7 +775,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"}], "@context": [], @@ -796,7 +796,7 @@ GetCredentialSunBirdCNeg: outputTemplate: injicertify/error2 input: '{ "client_id": "$ID:ESignet_CreateOIDCClientV2SunBirdC_all_Valid_Smoke_sid_clientId$", - "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_access_token$", + "idpAccessToken": "$ID:ESignet_GenerateTokenSunBirdC_Valid_Smoke_sid_Neg_access_token$", "format": "ldp_vc", "type": [{types: "VerifiableCredential"}, {types: "InsuranceCredential"}], "@context": ["abcdefghgf"], diff --git a/api-test/src/main/resources/injicertify/SunBirdR/CreatePolicySunBirdR/CreatePolicySunBirdR.hbs b/api-test/src/main/resources/injicertify/SunBirdR/CreatePolicySunBirdR/CreatePolicySunBirdR.hbs new file mode 100644 index 00000000..fedc127d --- /dev/null +++ b/api-test/src/main/resources/injicertify/SunBirdR/CreatePolicySunBirdR/CreatePolicySunBirdR.hbs @@ -0,0 +1,16 @@ +{ + "policyNumber": "{{policyNumber}}", + "policyName": "{{policyName}}", + "policyExpiresOn": "{{policyExpiresOn}}", + "policyIssuedOn": "{{policyIssuedOn}}", + "fullName": "{{fullName}}", + "dob": "{{dob}}", + "benefits": [ + {{#each benefits}} + "{{benefits}}"{{#unless @last}},{{/unless}} + {{/each}} + ], + "gender": "{{gender}}", + "mobile": "{{mobile}}", + "email": "{{email}}" +} \ No newline at end of file diff --git a/api-test/src/main/resources/injicertify/SunBirdR/CreatePolicySunBirdR/CreatePolicySunBirdR.yml b/api-test/src/main/resources/injicertify/SunBirdR/CreatePolicySunBirdR/CreatePolicySunBirdR.yml new file mode 100644 index 00000000..14d03d01 --- /dev/null +++ b/api-test/src/main/resources/injicertify/SunBirdR/CreatePolicySunBirdR/CreatePolicySunBirdR.yml @@ -0,0 +1,25 @@ +CreatePolicySunBirdR: + InjiCertify_ESignet_SunBirdR_CreatePolicy_NOAUTH_Valid_Smoke_Sid: + endPoint: $SUNBIRDBASEURL$/api/v1/Insurance + description: Creating new sunbird policy with valid parameters + role: resident + restMethod: post + checkErrorsOnlyInResponse: true + validityCheckRequired: true + inputTemplate: injicertify/SunBirdR/CreatePolicySunBirdR/CreatePolicySunBirdR + outputTemplate: injicertify/SunBirdR/CreatePolicySunBirdR/CreatePolicySunBirdRResult + input: '{ + "policyNumber": "$POLICYNUMBERFORSUNBIRDRC$", + "policyName": "Start Insurance Gold Premium", + "policyExpiresOn": "2033-04-20T20:48:17.684Z", + "policyIssuedOn": "$TIMESTAMP$", + "fullName" : "$FULLNAMEFORSUNBIRDRC$", + "dob" : "$DOBFORSUNBIRDRC$", + "benefits": [{"benefits": "Critical Surgery"}, {"benefits": "Full body checkup"}], + "gender": "Male", + "mobile": "0123456789", + "email": "abhishek@gmail.com" + }' + output: '{ + "status": "SUCCESSFUL" +}' \ No newline at end of file diff --git a/api-test/src/main/resources/injicertify/SunBirdR/CreatePolicySunBirdR/CreatePolicySunBirdRResult.hbs b/api-test/src/main/resources/injicertify/SunBirdR/CreatePolicySunBirdR/CreatePolicySunBirdRResult.hbs new file mode 100644 index 00000000..8efaf79f --- /dev/null +++ b/api-test/src/main/resources/injicertify/SunBirdR/CreatePolicySunBirdR/CreatePolicySunBirdRResult.hbs @@ -0,0 +1,5 @@ +{ + "params": { + "status": "{{status}}" + } +} \ No newline at end of file diff --git a/api-test/src/main/resources/injicertify/SunBirdR/DeletePolicySunBirdR/DeletePolicySunBirdR.hbs b/api-test/src/main/resources/injicertify/SunBirdR/DeletePolicySunBirdR/DeletePolicySunBirdR.hbs new file mode 100644 index 00000000..4f7673ad --- /dev/null +++ b/api-test/src/main/resources/injicertify/SunBirdR/DeletePolicySunBirdR/DeletePolicySunBirdR.hbs @@ -0,0 +1,3 @@ +{ + "insuranceid": "{{insuranceid}}" +} \ No newline at end of file diff --git a/api-test/src/main/resources/injicertify/SunBirdR/DeletePolicySunBirdR/DeletePolicySunBirdR.yml b/api-test/src/main/resources/injicertify/SunBirdR/DeletePolicySunBirdR/DeletePolicySunBirdR.yml new file mode 100644 index 00000000..f1a463e0 --- /dev/null +++ b/api-test/src/main/resources/injicertify/SunBirdR/DeletePolicySunBirdR/DeletePolicySunBirdR.yml @@ -0,0 +1,16 @@ +DeletePolicySunBirdR: + InjiCertify_ESignet_SunBirdR_DeletePolicy_NOAUTH_Valid_Smoke: + endPoint: $SUNBIRDBASEURL$/api/v1/Insurance/{insuranceid} + description: Deleting Sunbird policy with valid parameters + role: resident + restMethod: delete + checkErrorsOnlyInResponse: true + validityCheckRequired: true + inputTemplate: injicertify/SunBirdR/DeletePolicySunBirdR/DeletePolicySunBirdR + outputTemplate: injicertify/SunBirdR/DeletePolicySunBirdR/DeletePolicySunBirdRResult + input: '{ + "insuranceid": "$ID:ESignet_SunBirdR_CreatePolicy_NOAUTH_Valid_Smoke_Sid_osid$" + }' + output: '{ + "status": "SUCCESSFUL" +}' \ No newline at end of file diff --git a/api-test/src/main/resources/injicertify/SunBirdR/DeletePolicySunBirdR/DeletePolicySunBirdRResult.hbs b/api-test/src/main/resources/injicertify/SunBirdR/DeletePolicySunBirdR/DeletePolicySunBirdRResult.hbs new file mode 100644 index 00000000..8efaf79f --- /dev/null +++ b/api-test/src/main/resources/injicertify/SunBirdR/DeletePolicySunBirdR/DeletePolicySunBirdRResult.hbs @@ -0,0 +1,5 @@ +{ + "params": { + "status": "{{status}}" + } +} \ No newline at end of file diff --git a/api-test/src/main/resources/injicertify/SunBirdR/GetPolicySunBirdR/GetPolicySunBirdR.hbs b/api-test/src/main/resources/injicertify/SunBirdR/GetPolicySunBirdR/GetPolicySunBirdR.hbs new file mode 100644 index 00000000..4f7673ad --- /dev/null +++ b/api-test/src/main/resources/injicertify/SunBirdR/GetPolicySunBirdR/GetPolicySunBirdR.hbs @@ -0,0 +1,3 @@ +{ + "insuranceid": "{{insuranceid}}" +} \ No newline at end of file diff --git a/api-test/src/main/resources/injicertify/SunBirdR/GetPolicySunBirdR/GetPolicySunBirdR.yml b/api-test/src/main/resources/injicertify/SunBirdR/GetPolicySunBirdR/GetPolicySunBirdR.yml new file mode 100644 index 00000000..b51fd650 --- /dev/null +++ b/api-test/src/main/resources/injicertify/SunBirdR/GetPolicySunBirdR/GetPolicySunBirdR.yml @@ -0,0 +1,16 @@ +GetPolicySunBirdR: + InjiCertify_ESignet_SunBirdR_GetPolicy_NOAUTH_Valid_Smoke: + endPoint: $SUNBIRDBASEURL$/api/v1/Insurance/{insuranceid} + description: Getting sunbird policy with valid parameters + role: resident + restMethod: get + checkErrorsOnlyInResponse: true + validityCheckRequired: true + inputTemplate: injicertify/SunBirdR/GetPolicySunBirdR/GetPolicySunBirdR + outputTemplate: injicertify/SunBirdR/GetPolicySunBirdR/GetPolicySunBirdRResult + input: '{ + "insuranceid": "$ID:ESignet_SunBirdR_CreatePolicy_NOAUTH_Valid_Smoke_Sid_osid$" + }' + output: '{ + "policyNumber": "325698741" +}' \ No newline at end of file diff --git a/api-test/src/main/resources/injicertify/SunBirdR/GetPolicySunBirdR/GetPolicySunBirdRResult.hbs b/api-test/src/main/resources/injicertify/SunBirdR/GetPolicySunBirdR/GetPolicySunBirdRResult.hbs new file mode 100644 index 00000000..d1a64cf3 --- /dev/null +++ b/api-test/src/main/resources/injicertify/SunBirdR/GetPolicySunBirdR/GetPolicySunBirdRResult.hbs @@ -0,0 +1,3 @@ +{ + "policyNumber": {{policyNumber}} +} \ No newline at end of file diff --git a/api-test/src/main/resources/injicertify/SunBirdR/SearchPolicySunBirdR/SearchPolicySunBirdR.hbs b/api-test/src/main/resources/injicertify/SunBirdR/SearchPolicySunBirdR/SearchPolicySunBirdR.hbs new file mode 100644 index 00000000..38866c7a --- /dev/null +++ b/api-test/src/main/resources/injicertify/SunBirdR/SearchPolicySunBirdR/SearchPolicySunBirdR.hbs @@ -0,0 +1,21 @@ +{ + "offset": {{offset}}, + "limit": {{limit}}, + "filters": { + {{#if fullName}} + "fullName": { + "eq": "{{fullName}}" + }, + {{/if}} + {{#if dob}} + "dob": { + "eq": "{{dob}}" + }, + {{/if}} + {{#if policyNumber}} + "policyNumber": { + "eq": "{{policyNumber}}" + } + {{/if}} + } +} diff --git a/api-test/src/main/resources/injicertify/SunBirdR/SearchPolicySunBirdR/SearchPolicySunBirdR.yml b/api-test/src/main/resources/injicertify/SunBirdR/SearchPolicySunBirdR/SearchPolicySunBirdR.yml new file mode 100644 index 00000000..6db3fbf4 --- /dev/null +++ b/api-test/src/main/resources/injicertify/SunBirdR/SearchPolicySunBirdR/SearchPolicySunBirdR.yml @@ -0,0 +1,19 @@ +SearchPolicySunBirdR: + InjiCertify_ESignet_SunBirdR_SearchPolicy_NOAUTH_Valid_Smoke: + endPoint: $SUNBIRDBASEURL$/api/v1/Insurance/search + description: Searching sunbird policy with valid parameters + role: resident + restMethod: post + checkErrorsOnlyInResponse: true + validityCheckRequired: true + inputTemplate: injicertify/SunBirdR/SearchPolicySunBirdR/SearchPolicySunBirdR + outputTemplate: injicertify/SunBirdR/SearchPolicySunBirdR/SearchPolicySunBirdRResult + input: '{ + "offset": "0", + "limit": "5", + "fullName": "$FULLNAMEFORSUNBIRDRC$", + "dob": "$DOBFORSUNBIRDRC$", + "policyNumber": "$POLICYNUMBERFORSUNBIRDRC$" + }' + output: '{ +}' \ No newline at end of file diff --git a/api-test/src/main/resources/injicertify/SunBirdR/SearchPolicySunBirdR/SearchPolicySunBirdRResult.hbs b/api-test/src/main/resources/injicertify/SunBirdR/SearchPolicySunBirdR/SearchPolicySunBirdRResult.hbs new file mode 100644 index 00000000..9e26dfee --- /dev/null +++ b/api-test/src/main/resources/injicertify/SunBirdR/SearchPolicySunBirdR/SearchPolicySunBirdRResult.hbs @@ -0,0 +1 @@ +{} \ No newline at end of file diff --git a/api-test/src/main/resources/injicertify/VCIMockIDA/AuthenticateUserForMockIDA/AuthenticateUserForMockIDA.yml b/api-test/src/main/resources/injicertify/VCIMockIDA/AuthenticateUserForMockIDA/AuthenticateUserForMockIDA.yml index 0f37848d..740f4b3c 100644 --- a/api-test/src/main/resources/injicertify/VCIMockIDA/AuthenticateUserForMockIDA/AuthenticateUserForMockIDA.yml +++ b/api-test/src/main/resources/injicertify/VCIMockIDA/AuthenticateUserForMockIDA/AuthenticateUserForMockIDA.yml @@ -11,7 +11,7 @@ AuthenticateUserVCIForMockIDA: "encodedHash": "$ID:ESignet_OAuthDetailsRequest_ForMockIDA_uin_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_ForMockIDA_uin_all_Valid_Smoke_sid_transactionId$", - "individualId": "6553455", + "individualId": "$ID:AddIdentity_For_Mock_Valid_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "111111", "format": "alpha-numeric", @@ -19,7 +19,7 @@ AuthenticateUserVCIForMockIDA: "encodedHash": "$ID:ESignet_OAuthDetailsRequest_ForMockIDA_uin_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_ForMockIDA_uin_all_Valid_Smoke_sid_transactionId$", - "individualId": "6553455", + "individualId": "$ID:AddIdentity_For_Mock_Valid_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "injicertify/SendOtp/SendOtp", "sendOtpEndPoint": "$ESIGNETMOCKIDABASEURL$/v1/esignet/authorization/send-otp" diff --git a/api-test/src/main/resources/injicertify/VCIMockIDAForVd11/AuthenticateUserForMockIDA/AuthenticateUserForMockIDA.yml b/api-test/src/main/resources/injicertify/VCIMockIDAForVd11/AuthenticateUserForMockIDA/AuthenticateUserForMockIDA.yml index 30ad550d..4e677146 100644 --- a/api-test/src/main/resources/injicertify/VCIMockIDAForVd11/AuthenticateUserForMockIDA/AuthenticateUserForMockIDA.yml +++ b/api-test/src/main/resources/injicertify/VCIMockIDAForVd11/AuthenticateUserForMockIDA/AuthenticateUserForMockIDA.yml @@ -11,7 +11,7 @@ AuthenticateUserVCIForMockIDA: "encodedHash": "$ID:ESignet_OAuthDetailsRequest_ForMockIDA_Vd11_uin_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_ForMockIDA_Vd11_uin_all_Valid_Smoke_sid_transactionId$", - "individualId": "6553455", + "individualId": "$ID:AddIdentity_For_Mock_Valid_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "111111", "format": "alpha-numeric", @@ -19,7 +19,7 @@ AuthenticateUserVCIForMockIDA: "encodedHash": "$ID:ESignet_OAuthDetailsRequest_ForMockIDA_Vd11_uin_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_ForMockIDA_Vd11_uin_all_Valid_Smoke_sid_transactionId$", - "individualId": "6553455", + "individualId": "$ID:AddIdentity_For_Mock_Valid_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "injicertify/SendOtp/SendOtp", "sendOtpEndPoint": "$ESIGNETMOCKIDABASEURL$/v1/esignet/authorization/send-otp" diff --git a/api-test/src/main/resources/injicertify/VCIMockIDAForVd12/AuthenticateUserForMockIDA/AuthenticateUserForMockIDA.yml b/api-test/src/main/resources/injicertify/VCIMockIDAForVd12/AuthenticateUserForMockIDA/AuthenticateUserForMockIDA.yml index d91fc985..c65ea254 100644 --- a/api-test/src/main/resources/injicertify/VCIMockIDAForVd12/AuthenticateUserForMockIDA/AuthenticateUserForMockIDA.yml +++ b/api-test/src/main/resources/injicertify/VCIMockIDAForVd12/AuthenticateUserForMockIDA/AuthenticateUserForMockIDA.yml @@ -11,7 +11,7 @@ AuthenticateUserVCIForMockIDA: "encodedHash": "$ID:ESignet_OAuthDetailsRequest_ForMockIDA_Vd12_uin_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_ForMockIDA_Vd12_uin_all_Valid_Smoke_sid_transactionId$", - "individualId": "6553455", + "individualId": "$ID:AddIdentity_For_Mock_Valid_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "111111", "format": "alpha-numeric", @@ -19,7 +19,7 @@ AuthenticateUserVCIForMockIDA: "encodedHash": "$ID:ESignet_OAuthDetailsRequest_ForMockIDA_Vd12_uin_all_Valid_Smoke_sid_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_ForMockIDA_Vd12_uin_all_Valid_Smoke_sid_transactionId$", - "individualId": "6553455", + "individualId": "$ID:AddIdentity_For_Mock_Valid_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "injicertify/SendOtp/SendOtp", "sendOtpEndPoint": "$ESIGNETMOCKIDABASEURL$/v1/esignet/authorization/send-otp" diff --git a/api-test/src/main/resources/injicertify/VCIMockIDANegTC/AuthenticateUserForMockIDANegTC/AuthenticateUserForMockIDANegTC.yml b/api-test/src/main/resources/injicertify/VCIMockIDANegTC/AuthenticateUserForMockIDANegTC/AuthenticateUserForMockIDANegTC.yml index 3431404c..5699d7c8 100644 --- a/api-test/src/main/resources/injicertify/VCIMockIDANegTC/AuthenticateUserForMockIDANegTC/AuthenticateUserForMockIDANegTC.yml +++ b/api-test/src/main/resources/injicertify/VCIMockIDANegTC/AuthenticateUserForMockIDANegTC/AuthenticateUserForMockIDANegTC.yml @@ -11,7 +11,7 @@ AuthenticateUserForMockIDANegTC: "encodedHash": "$ID:ESignet_OAuthDetailsRequest_ForMockIDA_uin_all_Valid_Smoke_sid_For_Neg_Flow_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_ForMockIDA_uin_all_Valid_Smoke_sid_For_Neg_Flow_transactionId$", - "individualId": "6553455", + "individualId": "$ID:AddIdentity_For_Mock_Valid_smoke_Pos_UIN$", "authFactorType" : "OTP", "challenge" : "111111", "format": "alpha-numeric", @@ -19,7 +19,7 @@ AuthenticateUserForMockIDANegTC: "encodedHash": "$ID:ESignet_OAuthDetailsRequest_ForMockIDA_uin_all_Valid_Smoke_sid_For_Neg_Flow_encodedResp$", "requestTime": "$TIMESTAMP$", "transactionId": "$ID:ESignet_OAuthDetailsRequest_ForMockIDA_uin_all_Valid_Smoke_sid_For_Neg_Flow_transactionId$", - "individualId": "6553455", + "individualId": "$ID:AddIdentity_For_Mock_Valid_smoke_Pos_UIN$", "otpChannels": [{channel: "email"},{channel: "phone"}], "sendOtpReqTemplate": "injicertify/SendOtp/SendOtp", "sendOtpEndPoint": "$ESIGNETMOCKIDABASEURL$/v1/esignet/authorization/send-otp" diff --git a/api-test/testNgXmlFiles/injicertifyPrerequisiteSuite.xml b/api-test/testNgXmlFiles/injicertifyPrerequisiteSuite.xml index 72a6f53b..3b58c2b1 100644 --- a/api-test/testNgXmlFiles/injicertifyPrerequisiteSuite.xml +++ b/api-test/testNgXmlFiles/injicertifyPrerequisiteSuite.xml @@ -9,7 +9,17 @@ - + + + + + + + + diff --git a/api-test/testNgXmlFiles/injicertifySuite.xml b/api-test/testNgXmlFiles/injicertifySuite.xml index 1375509f..88ba827b 100644 --- a/api-test/testNgXmlFiles/injicertifySuite.xml +++ b/api-test/testNgXmlFiles/injicertifySuite.xml @@ -8,160 +8,239 @@ + + + + + + + + + + + + + + + + + + + + + + - + - + - + - + - + - + - + - + - + - + - + - + - + - + - + - + - + - + - + - + - + - + - + - + - + - + - + - + - + - + - + - + - + - + - + - + - + - + - + - + - + - + - + + + + + + + + + @@ -173,332 +252,419 @@ - + - + - + - + - + - + - + - + - + - + - + - + - + - + - + - + - - + + - + - + - + - - + + - + - - + + - + - + - + - - + + - + - + - + - - + + - + - - + + - + - + - + - - + + - + - + - + - - + + - + - - + + - + - + - + - + - + - + - + - + - + - - + + - + - - + + - + - + - + - + - + - + - + - - + + - + - - + + - + - + - + - + - + - + - + - - + + - + - - + + - + - + - + - + - + - + - + - + - - + + - + - - + + - + - + - + - + \ No newline at end of file