Skip to content

Commit

Permalink
fixed tests for contracts
Browse files Browse the repository at this point in the history
  • Loading branch information
Celiant committed Jan 20, 2025
1 parent d5da708 commit 3c4638e
Show file tree
Hide file tree
Showing 6 changed files with 42 additions and 14 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -11,12 +11,8 @@ context('Policies', { tags: ['policies', 'secondPool', 'all'] }, () => {
cy.request({
method: METHOD.POST,
url: API.ApiServer + API.PolicisImportMsg,
body: {
messageId: (Cypress.env('policy_with_artifacts')),
metadata: {
"tools": {}
}
},
body: {
"messageId": "1707126227.976010003" },
headers: {
authorization,
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -11,8 +11,12 @@ context("Policies", { tags: ['policies', 'secondPool', 'all'] }, () => {
cy.request({
method: METHOD.POST,
url: API.ApiServer + API.PolicisImportMsgPush,
body: {
"messageId": "1707126227.976010003" },
body: {
messageId: (Cypress.env('policy_with_artifacts')),
metadata: {
"tools": {}
}
},
headers: {
authorization,
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -493,17 +493,35 @@ context("Contracts", { tags: ['contracts', 'firstPool', 'all'] }, () => {
});

it("Verify roles(wipe)", () => {
cy.wait(300000)
cy.wait(60000)
Authorization.getAccessToken(SR2Username).then((authorization) => {
cy.request({
method: METHOD.GET,
url: API.ApiServer + API.ListOfContracts + idW2 + "/" + API.ContractPermissions,
url: API.ApiServer + "accounts/session",
headers: {
authorization
},
}).then((response) => {
expect(response.status).eql(STATUS_CODE.OK);
expect(response.body).eql(0);
cy.request({
method: METHOD.GET,
url: API.ApiServer + "notifications/progresses",
headers: {
authorization
},
}).then((response) => {
expect(response.status).eql(STATUS_CODE.OK);
cy.request({
method: METHOD.GET,
url: API.ApiServer + API.ListOfContracts + idW2 + "/" + API.ContractPermissions,
headers: {
authorization
},
}).then((response) => {
expect(response.status).eql(STATUS_CODE.OK);
expect(response.body).eql(0);
});
})
});
})
});
Expand All @@ -518,7 +536,16 @@ context("Contracts", { tags: ['contracts', 'firstPool', 'all'] }, () => {
},
}).then((response) => {
expect(response.status).eql(STATUS_CODE.OK);
expect(response.body).eql(0);
cy.request({
method: METHOD.GET,
url: API.ApiServer + API.ListOfContracts + idR2 + "/" + API.ContractPermissions,
headers: {
authorization
},
}).then((response) => {
expect(response.status).eql(STATUS_CODE.OK);
expect(response.body).eql(0);
});
});
})
});
Expand Down
2 changes: 1 addition & 1 deletion e2e-tests/cypress/fixtures/StandardRegistryData.json
Original file line number Diff line number Diff line change
@@ -1 +1 @@
{"username":"SR","role":"STANDARD_REGISTRY","permissionsGroup":[{"uuid":"f55dfa95-cad3-42b8-ba8f-54d43f5571f9","roleId":"6788f3f1652f2c73885374b3","roleName":"Default policy user","owner":null}],"permissions":["ACCOUNTS_STANDARD_REGISTRY_READ","DEMO_KEY_CREATE","IPFS_FILE_READ","IPFS_FILE_CREATE","PROFILES_USER_READ","PROFILES_USER_UPDATE","PROFILES_BALANCE_READ","ACCOUNTS_ACCOUNT_READ","ANALYTIC_POLICY_READ","ANALYTIC_MODULE_READ","ANALYTIC_TOOL_READ","ANALYTIC_SCHEMA_READ","ANALYTIC_DOCUMENT_READ","ARTIFACTS_FILE_READ","ARTIFACTS_FILE_CREATE","ARTIFACTS_FILE_DELETE","BRANDING_CONFIG_UPDATE","CONTRACTS_CONTRACT_READ","CONTRACTS_CONTRACT_CREATE","CONTRACTS_CONTRACT_DELETE","CONTRACTS_CONTRACT_MANAGE","CONTRACTS_WIPE_REQUEST_READ","CONTRACTS_WIPE_REQUEST_UPDATE","CONTRACTS_WIPE_REQUEST_DELETE","CONTRACTS_WIPE_REQUEST_REVIEW","CONTRACTS_WIPE_ADMIN_CREATE","CONTRACTS_WIPE_ADMIN_DELETE","CONTRACTS_WIPE_MANAGER_CREATE","CONTRACTS_WIPE_MANAGER_DELETE","CONTRACTS_WIPER_CREATE","CONTRACTS_WIPER_DELETE","CONTRACTS_POOL_READ","CONTRACTS_POOL_UPDATE","CONTRACTS_POOL_DELETE","CONTRACTS_RETIRE_REQUEST_READ","CONTRACTS_RETIRE_REQUEST_CREATE","CONTRACTS_RETIRE_REQUEST_DELETE","CONTRACTS_RETIRE_REQUEST_REVIEW","CONTRACTS_RETIRE_ADMIN_CREATE","CONTRACTS_RETIRE_ADMIN_DELETE","CONTRACTS_PERMISSIONS_READ","CONTRACTS_DOCUMENT_READ","LOG_LOG_READ","MODULES_MODULE_READ","MODULES_MODULE_CREATE","MODULES_MODULE_UPDATE","MODULES_MODULE_DELETE","MODULES_MODULE_REVIEW","POLICIES_POLICY_READ","POLICIES_POLICY_CREATE","POLICIES_POLICY_UPDATE","POLICIES_POLICY_DELETE","POLICIES_POLICY_REVIEW","POLICIES_POLICY_EXECUTE","POLICIES_POLICY_MANAGE","POLICIES_MIGRATION_CREATE","POLICIES_RECORD_ALL","SCHEMAS_SCHEMA_READ","SCHEMAS_SCHEMA_CREATE","SCHEMAS_SCHEMA_UPDATE","SCHEMAS_SCHEMA_DELETE","SCHEMAS_SCHEMA_REVIEW","SCHEMAS_SYSTEM_SCHEMA_READ","SCHEMAS_SYSTEM_SCHEMA_CREATE","SCHEMAS_SYSTEM_SCHEMA_UPDATE","SCHEMAS_SYSTEM_SCHEMA_DELETE","SCHEMAS_SYSTEM_SCHEMA_REVIEW","TOOLS_TOOL_READ","TOOLS_TOOL_CREATE","TOOLS_TOOL_UPDATE","TOOLS_TOOL_DELETE","TOOLS_TOOL_REVIEW","TOOL_MIGRATION_CREATE","TOKENS_TOKEN_READ","TOKENS_TOKEN_CREATE","TOKENS_TOKEN_UPDATE","TOKENS_TOKEN_DELETE","TOKENS_TOKEN_MANAGE","TAGS_TAG_READ","TAGS_TAG_CREATE","PROFILES_RESTORE_ALL","SUGGESTIONS_SUGGESTIONS_READ","SUGGESTIONS_SUGGESTIONS_UPDATE","SETTINGS_SETTINGS_READ","SETTINGS_SETTINGS_UPDATE","SETTINGS_THEME_READ","SETTINGS_THEME_CREATE","SETTINGS_THEME_UPDATE","SETTINGS_THEME_DELETE","PERMISSIONS_ROLE_READ","PERMISSIONS_ROLE_CREATE","PERMISSIONS_ROLE_UPDATE","PERMISSIONS_ROLE_DELETE","PERMISSIONS_ROLE_MANAGE","ACCESS_POLICY_ALL","SCHEMAS_RULE_CREATE","SCHEMAS_RULE_READ","SCHEMAS_RULE_EXECUTE"],"did":"did:hedera:testnet:5LrvtGLToW4GxUKGbGBsV4W1VoM1pKmL8gtCB8YiDYwf_0.0.5396026","hederaAccountId":"0.0.5396025","confirmed":true,"failed":false,"topicId":"0.0.5396026","parentTopicId":"0.0.1960","didDocument":{"createDate":"2025-01-16T12:03:26.984Z","updateDate":"2025-01-16T12:03:37.860Z","did":"did:hedera:testnet:5LrvtGLToW4GxUKGbGBsV4W1VoM1pKmL8gtCB8YiDYwf_0.0.5396026","document":{"id":"did:hedera:testnet:5LrvtGLToW4GxUKGbGBsV4W1VoM1pKmL8gtCB8YiDYwf_0.0.5396026","@context":"https://www.w3.org/ns/did/v1","verificationMethod":[{"id":"did:hedera:testnet:5LrvtGLToW4GxUKGbGBsV4W1VoM1pKmL8gtCB8YiDYwf_0.0.5396026#did-root-key","type":"Ed25519VerificationKey2018","controller":"did:hedera:testnet:5LrvtGLToW4GxUKGbGBsV4W1VoM1pKmL8gtCB8YiDYwf_0.0.5396026","publicKeyBase58":"DFEobD7YScC46atSBj5YYfD32tPcJKr8uAP5yZqsVAAy"},{"id":"did:hedera:testnet:5LrvtGLToW4GxUKGbGBsV4W1VoM1pKmL8gtCB8YiDYwf_0.0.5396026#did-root-key-bbs","type":"Bls12381G2Key2020","controller":"did:hedera:testnet:5LrvtGLToW4GxUKGbGBsV4W1VoM1pKmL8gtCB8YiDYwf_0.0.5396026","publicKeyBase58":"tKeMosBwT3zkVUNoSLsCvb2vst4WHBwWfnmguPFN9CiWepZj9pgqQHhDmfryhS49e9CUwhmBtxzxNw5jUSDffvayXwNZ5DZwZBg5eARTdn482EJ6vqintthsVAQHtNs6CUk"}],"authentication":["did:hedera:testnet:5LrvtGLToW4GxUKGbGBsV4W1VoM1pKmL8gtCB8YiDYwf_0.0.5396026#did-root-key"],"assertionMethod":["#did-root-key","#did-root-key-bbs"]},"status":"CREATE","messageId":"1737029014.000896000","topicId":"0.0.5396026","verificationMethods":{"Ed25519VerificationKey2018":"did:hedera:testnet:5LrvtGLToW4GxUKGbGBsV4W1VoM1pKmL8gtCB8YiDYwf_0.0.5396026#did-root-key","Bls12381G2Key2020":"did:hedera:testnet:5LrvtGLToW4GxUKGbGBsV4W1VoM1pKmL8gtCB8YiDYwf_0.0.5396026#did-root-key-bbs"},"_id":"6788f58e56ee87d7485ca3b4","id":"6788f58e56ee87d7485ca3b4"},"vcDocument":{"createDate":"2025-01-16T12:04:08.681Z","updateDate":"2025-01-16T12:04:17.232Z","owner":"did:hedera:testnet:5LrvtGLToW4GxUKGbGBsV4W1VoM1pKmL8gtCB8YiDYwf_0.0.5396026","hash":"14Tm5V4Q3z53pgAr7GjkPQuicw2tMW52GXk3znhvw7fB","document":{"id":"urn:uuid:c0c886c5-ca5c-4d02-a3ba-2dbc95a77b3e","type":["VerifiableCredential"],"issuer":"did:hedera:testnet:5LrvtGLToW4GxUKGbGBsV4W1VoM1pKmL8gtCB8YiDYwf_0.0.5396026","issuanceDate":"2025-01-16T12:04:08.574Z","@context":["https://www.w3.org/2018/credentials/v1","ipfs://bafkreihj7gclc4qgem27tre5je6a3t7tpdrk4li6oamdl6bnflwnoyfs5i"],"credentialSubject":[{"geography":"testGeography","law":"testLaw","tags":"testTags","@context":["ipfs://bafkreihj7gclc4qgem27tre5je6a3t7tpdrk4li6oamdl6bnflwnoyfs5i"],"id":"did:hedera:testnet:5LrvtGLToW4GxUKGbGBsV4W1VoM1pKmL8gtCB8YiDYwf_0.0.5396026","type":"StandardRegistry"}],"proof":{"type":"Ed25519Signature2018","created":"2025-01-16T12:04:08Z","verificationMethod":"did:hedera:testnet:5LrvtGLToW4GxUKGbGBsV4W1VoM1pKmL8gtCB8YiDYwf_0.0.5396026#did-root-key","proofPurpose":"assertionMethod","jws":"eyJhbGciOiJFZERTQSIsImI2NCI6ZmFsc2UsImNyaXQiOlsiYjY0Il19..7gmrAJdyadBMbAh51QQnfYJ2SdMiSg4ed7lNYizGuxQFLoMFmFLeu0ePkCjRi_Qh-j7ZUi58SB6axwKmkcGtDw"}},"documentFileId":"6788f5c156ee87d7485ca3f5","hederaStatus":"ISSUE","signature":0,"type":"STANDARD_REGISTRY","option":{"status":"NEW"},"messageId":"1737029055.246791000","topicId":"0.0.5396026","_id":"6788f5b856ee87d7485ca3ee","id":"6788f5b856ee87d7485ca3ee"},"accessToken":"Bearer eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VybmFtZSI6IlNSIiwiZGlkIjoiZGlkOmhlZGVyYTp0ZXN0bmV0OjVMcnZ0R0xUb1c0R3hVS0diR0JzVjRXMVZvTTFwS21MOGd0Q0I4WWlEWXdmXzAuMC41Mzk2MDI2Iiwicm9sZSI6IlNUQU5EQVJEX1JFR0lTVFJZIiwiZXhwaXJlQXQiOjE3MzcwMjk1MTQ3MDksImlhdCI6MTczNzAyOTQ1NH0.gIuqSDhoSKkQUx3P6inyzrvrt_7fPtL0eAJXMPhuADc86WrgXHSV6dC6yQcvsmMx3e-embQqhLNWV9BrCdtiHl6Au-MXaKbsSHvG___TbXCtVxTgeSSGVBcLU38PR07rVCeEMs4i-Kcg0j2BoTnA2JAOoJnxUmU6x4cvBBmw0T0"}
{"username":"SR","role":"STANDARD_REGISTRY","permissionsGroup":[{"uuid":"04478292-2a7e-498e-a0ac-fbd543b7279c","roleId":"678e283856c4a8964c48601f","roleName":"Default policy user","owner":null}],"permissions":["ACCOUNTS_STANDARD_REGISTRY_READ","DEMO_KEY_CREATE","IPFS_FILE_READ","IPFS_FILE_CREATE","PROFILES_USER_READ","PROFILES_USER_UPDATE","PROFILES_BALANCE_READ","ACCOUNTS_ACCOUNT_READ","ANALYTIC_POLICY_READ","ANALYTIC_MODULE_READ","ANALYTIC_TOOL_READ","ANALYTIC_SCHEMA_READ","ANALYTIC_DOCUMENT_READ","ARTIFACTS_FILE_READ","ARTIFACTS_FILE_CREATE","ARTIFACTS_FILE_DELETE","BRANDING_CONFIG_UPDATE","CONTRACTS_CONTRACT_READ","CONTRACTS_CONTRACT_CREATE","CONTRACTS_CONTRACT_DELETE","CONTRACTS_CONTRACT_MANAGE","CONTRACTS_WIPE_REQUEST_READ","CONTRACTS_WIPE_REQUEST_UPDATE","CONTRACTS_WIPE_REQUEST_DELETE","CONTRACTS_WIPE_REQUEST_REVIEW","CONTRACTS_WIPE_ADMIN_CREATE","CONTRACTS_WIPE_ADMIN_DELETE","CONTRACTS_WIPE_MANAGER_CREATE","CONTRACTS_WIPE_MANAGER_DELETE","CONTRACTS_WIPER_CREATE","CONTRACTS_WIPER_DELETE","CONTRACTS_POOL_READ","CONTRACTS_POOL_UPDATE","CONTRACTS_POOL_DELETE","CONTRACTS_RETIRE_REQUEST_READ","CONTRACTS_RETIRE_REQUEST_CREATE","CONTRACTS_RETIRE_REQUEST_DELETE","CONTRACTS_RETIRE_REQUEST_REVIEW","CONTRACTS_RETIRE_ADMIN_CREATE","CONTRACTS_RETIRE_ADMIN_DELETE","CONTRACTS_PERMISSIONS_READ","CONTRACTS_DOCUMENT_READ","LOG_LOG_READ","MODULES_MODULE_READ","MODULES_MODULE_CREATE","MODULES_MODULE_UPDATE","MODULES_MODULE_DELETE","MODULES_MODULE_REVIEW","POLICIES_POLICY_READ","POLICIES_POLICY_CREATE","POLICIES_POLICY_UPDATE","POLICIES_POLICY_DELETE","POLICIES_POLICY_REVIEW","POLICIES_POLICY_EXECUTE","POLICIES_POLICY_MANAGE","POLICIES_MIGRATION_CREATE","POLICIES_RECORD_ALL","SCHEMAS_SCHEMA_READ","SCHEMAS_SCHEMA_CREATE","SCHEMAS_SCHEMA_UPDATE","SCHEMAS_SCHEMA_DELETE","SCHEMAS_SCHEMA_REVIEW","SCHEMAS_SYSTEM_SCHEMA_READ","SCHEMAS_SYSTEM_SCHEMA_CREATE","SCHEMAS_SYSTEM_SCHEMA_UPDATE","SCHEMAS_SYSTEM_SCHEMA_DELETE","SCHEMAS_SYSTEM_SCHEMA_REVIEW","TOOLS_TOOL_READ","TOOLS_TOOL_CREATE","TOOLS_TOOL_UPDATE","TOOLS_TOOL_DELETE","TOOLS_TOOL_REVIEW","TOOL_MIGRATION_CREATE","TOKENS_TOKEN_READ","TOKENS_TOKEN_CREATE","TOKENS_TOKEN_UPDATE","TOKENS_TOKEN_DELETE","TOKENS_TOKEN_MANAGE","TAGS_TAG_READ","TAGS_TAG_CREATE","PROFILES_RESTORE_ALL","SUGGESTIONS_SUGGESTIONS_READ","SUGGESTIONS_SUGGESTIONS_UPDATE","SETTINGS_SETTINGS_READ","SETTINGS_SETTINGS_UPDATE","SETTINGS_THEME_READ","SETTINGS_THEME_CREATE","SETTINGS_THEME_UPDATE","SETTINGS_THEME_DELETE","PERMISSIONS_ROLE_READ","PERMISSIONS_ROLE_CREATE","PERMISSIONS_ROLE_UPDATE","PERMISSIONS_ROLE_DELETE","PERMISSIONS_ROLE_MANAGE","ACCESS_POLICY_ALL","SCHEMAS_RULE_CREATE","SCHEMAS_RULE_READ","SCHEMAS_RULE_EXECUTE"],"did":"did:hedera:testnet:FeVTowWsQhL3xTgELuunkRH9zsDuLkVtWkPWfo1m98gt_0.0.5407951","hederaAccountId":"0.0.5407950","confirmed":true,"failed":false,"topicId":"0.0.5407951","parentTopicId":"0.0.1960","didDocument":{"createDate":"2025-01-20T10:59:22.093Z","updateDate":"2025-01-20T10:59:30.790Z","did":"did:hedera:testnet:FeVTowWsQhL3xTgELuunkRH9zsDuLkVtWkPWfo1m98gt_0.0.5407951","document":{"id":"did:hedera:testnet:FeVTowWsQhL3xTgELuunkRH9zsDuLkVtWkPWfo1m98gt_0.0.5407951","@context":"https://www.w3.org/ns/did/v1","verificationMethod":[{"id":"did:hedera:testnet:FeVTowWsQhL3xTgELuunkRH9zsDuLkVtWkPWfo1m98gt_0.0.5407951#did-root-key","type":"Ed25519VerificationKey2018","controller":"did:hedera:testnet:FeVTowWsQhL3xTgELuunkRH9zsDuLkVtWkPWfo1m98gt_0.0.5407951","publicKeyBase58":"3gzND5cpRqEydJjEm3bE76HRTh43pQ4GU97M9wZo9AsH"},{"id":"did:hedera:testnet:FeVTowWsQhL3xTgELuunkRH9zsDuLkVtWkPWfo1m98gt_0.0.5407951#did-root-key-bbs","type":"Bls12381G2Key2020","controller":"did:hedera:testnet:FeVTowWsQhL3xTgELuunkRH9zsDuLkVtWkPWfo1m98gt_0.0.5407951","publicKeyBase58":"o8tMRjoB6YG3AJSJwfSyXDhbUvhxTN9P7h41B63YMnLKViK1ZWH5arxhYA9wB4HTV7QLnaDDwLTRYQW7exi2qHQ5Bsmkwa1j2QcabN8gudt1xyRHWQjNXW1VPMv59e8bpe3"}],"authentication":["did:hedera:testnet:FeVTowWsQhL3xTgELuunkRH9zsDuLkVtWkPWfo1m98gt_0.0.5407951#did-root-key"],"assertionMethod":["#did-root-key","#did-root-key-bbs"]},"status":"CREATE","messageId":"1737370768.538030199","topicId":"0.0.5407951","verificationMethods":{"Ed25519VerificationKey2018":"did:hedera:testnet:FeVTowWsQhL3xTgELuunkRH9zsDuLkVtWkPWfo1m98gt_0.0.5407951#did-root-key","Bls12381G2Key2020":"did:hedera:testnet:FeVTowWsQhL3xTgELuunkRH9zsDuLkVtWkPWfo1m98gt_0.0.5407951#did-root-key-bbs"},"_id":"678e2c8a3ce7cf8bc25c3b33","id":"678e2c8a3ce7cf8bc25c3b33"},"vcDocument":{"createDate":"2025-01-20T11:00:02.216Z","updateDate":"2025-01-20T11:00:10.334Z","owner":"did:hedera:testnet:FeVTowWsQhL3xTgELuunkRH9zsDuLkVtWkPWfo1m98gt_0.0.5407951","hash":"GRmbHGpKzWdciXinPNz8jzgZuE9TC5spdLNm2h9pbegM","document":{"id":"urn:uuid:0b69bb43-10ff-44f5-bf0b-a7f500ed8457","type":["VerifiableCredential"],"issuer":"did:hedera:testnet:FeVTowWsQhL3xTgELuunkRH9zsDuLkVtWkPWfo1m98gt_0.0.5407951","issuanceDate":"2025-01-20T11:00:02.116Z","@context":["https://www.w3.org/2018/credentials/v1","ipfs://bafkreihj7gclc4qgem27tre5je6a3t7tpdrk4li6oamdl6bnflwnoyfs5i"],"credentialSubject":[{"geography":"testGeography","law":"testLaw","tags":"testTags","@context":["ipfs://bafkreihj7gclc4qgem27tre5je6a3t7tpdrk4li6oamdl6bnflwnoyfs5i"],"id":"did:hedera:testnet:FeVTowWsQhL3xTgELuunkRH9zsDuLkVtWkPWfo1m98gt_0.0.5407951","type":"StandardRegistry"}],"proof":{"type":"Ed25519Signature2018","created":"2025-01-20T11:00:02Z","verificationMethod":"did:hedera:testnet:FeVTowWsQhL3xTgELuunkRH9zsDuLkVtWkPWfo1m98gt_0.0.5407951#did-root-key","proofPurpose":"assertionMethod","jws":"eyJhbGciOiJFZERTQSIsImI2NCI6ZmFsc2UsImNyaXQiOlsiYjY0Il19..AibSP5nf1lAdwzg5bJCIjyz4z-XXKXop-eXFRI87L2ml_Ho4x3LYXoyF9bwm-iWkgA90h2C_fNTaPaZFUDEdCg"}},"documentFileId":"678e2cba3ce7cf8bc25c3b74","hederaStatus":"ISSUE","signature":0,"type":"STANDARD_REGISTRY","option":{"status":"NEW"},"messageId":"1737370807.726122291","topicId":"0.0.5407951","_id":"678e2cb23ce7cf8bc25c3b6d","id":"678e2cb23ce7cf8bc25c3b6d"},"accessToken":"Bearer eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VybmFtZSI6IlNSIiwiZGlkIjoiZGlkOmhlZGVyYTp0ZXN0bmV0OkZlVlRvd1dzUWhMM3hUZ0VMdXVua1JIOXpzRHVMa1Z0V2tQV2ZvMW05OGd0XzAuMC41NDA3OTUxIiwicm9sZSI6IlNUQU5EQVJEX1JFR0lTVFJZIiwiZXhwaXJlQXQiOjE3MzczNzE3OTQwMDcsImlhdCI6MTczNzM3MTE5NH0.Bo7QLKg-eOqRDnF9adAHcYxPYbKtGYB_wOxGFGiBizxBZWvOTRpo5UcDkHaDHsibi8QBGdv90tq0o6iiQU4D54IWRy-5GaLWWUBZuUfkUBkvy76Q5EU72pMVp3O6koNINhecnCEOuh_1sgXlqcoriDgd8_aVFzYh2X5Gg8H_nD0"}
Binary file modified e2e-tests/cypress/fixtures/exportedPolicy.policy
Binary file not shown.
3 changes: 2 additions & 1 deletion e2e-tests/package.json
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,8 @@
"test": "npx cypress run",
"e2e": "cypress run",
"ui-only": "cypress run --headed --env grepTags=@ui,grepFilterSpecs=true",
"test-tag": "./run-test-by-tag.sh"
"test-tag": "./run-test-by-tag.sh",
"api-tests": "npx cypress run --env, grepTags=all, grepFilterSpecs=true --spec cypress/e2e/api-tests/**/*.cy.js --browser chrome"
},
"keywords": [
"qa",
Expand Down

0 comments on commit 3c4638e

Please sign in to comment.