Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Automation api tests #4572

Merged
merged 41 commits into from
Jan 23, 2025
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
41 commits
Select commit Hold shift + click to select a range
5c0e4d0
added tests for wipe and retire requests(negative also)
Celiant Apr 5, 2024
fb60f14
added tests for import, permissions, remove for contracts
Celiant Apr 10, 2024
8057390
Merge branch 'develop' into automation-api-tests
Celiant Apr 10, 2024
2392301
added tests for contracts permissions, pools, requests
Celiant Apr 19, 2024
7d6f6c7
added tests for operations with retire tokens
Celiant Apr 22, 2024
dd1b377
added tests for get random hedera creds and get registered users
Celiant Apr 23, 2024
dc8c0cc
added tests for ipfs and logs endpoints
Celiant Apr 26, 2024
d96f537
small refactoring
Celiant Apr 26, 2024
6c0f0f1
added tests for policies
Celiant May 29, 2024
8c66e15
fix configs
Celiant May 29, 2024
363bd0f
Merge branch 'develop' of https://github.com/hashgraph/guardian into …
simvalery May 30, 2024
6eb5a5b
Pull changes from develop to branch automation-api-tests (#3787)
Celiant Jun 13, 2024
e39bafc
git add smoke tagging and small fixes
Celiant Jun 19, 2024
4ec65c3
added tags with pools and implemented running by tag
Celiant Jul 4, 2024
f3b175d
small fixes for runs by tag
Celiant Jul 4, 2024
7c2b411
update .yml file
Celiant Jul 4, 2024
63a15d2
finally update .yml file
Celiant Jul 4, 2024
a61ef1d
resolve conflicts
Celiant Jul 9, 2024
5d5b83c
fixes after merge
Celiant Jul 9, 2024
cabb6b9
last fix after merge
Celiant Jul 9, 2024
fd8030f
Merge branch 'develop' into automation-api-tests
Celiant Jul 15, 2024
20dbf1b
Merge remote-tracking branch 'origin/develop' into automation-api-tests
Celiant Jul 15, 2024
13f0464
[skip ci] Add swagger.yaml
envision-ci-agent Jul 15, 2024
f72e12e
some fixes for tests and pipeline running
Celiant Jul 15, 2024
adbe53f
Merge branch 'automation-api-tests' of https://github.com/hashgraph/g…
Celiant Jul 15, 2024
c22480c
update pipeline with cypress docker image
Celiant Jul 15, 2024
138a1fa
update pipeline with cypress docker image
Celiant Jul 15, 2024
463bfcd
update pipeline with cypress docker image
Celiant Jul 15, 2024
cc326a1
update pipeline with cypress docker image
Celiant Jul 15, 2024
3367914
update pipeline with cypress docker image
Celiant Jul 15, 2024
1c155ba
fixes for LSM and custom case types
Celiant Jul 16, 2024
3d66af0
update pipeline for E2E tests with provide ELECTRON_RUN_AS_NODE
Celiant Jul 16, 2024
31844b2
update package-lock
Celiant Jul 16, 2024
a2d7e53
install Xvfb and libnss3
Celiant Jul 16, 2024
3102cea
install Xvfb and libnss3
Celiant Jul 16, 2024
5b52c06
install Xvfb and libnss3
Celiant Jul 17, 2024
8b72254
install Xvfb and libnss3
Celiant Jul 17, 2024
eb0b67e
merge current develop
Celiant Jan 23, 2025
6ce5125
fix tests for Installer
Celiant Jan 23, 2025
e4d960c
fix non-smoke pull test run
Celiant Jan 23, 2025
d6d69f0
update api manual workflow
Celiant Jan 23, 2025
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion .github/workflows/api-manual.yml
Original file line number Diff line number Diff line change
Expand Up @@ -151,4 +151,4 @@ jobs:
uses: EnricoMi/publish-unit-test-result-action@170bf24d20d201b842d7a52403b73ed297e6645b # v2.18.0
if: always()
with:
files: e2e-tests/cypress/test_results/**/*.xml
files: e2e-tests/cypress/test_results/**/*.xml
Original file line number Diff line number Diff line change
Expand Up @@ -456,7 +456,7 @@ context("Contracts", { tags: ['contracts', 'firstPool', 'all'] }, () => {

describe("Approve retire request", () => {

before("Get retire request id", () => {
it("Approve retire request without auth token - Negative", () => {
Authorization.getAccessToken(SRUsername).then((authorization) => {
cy.request({
method: METHOD.GET,
Expand All @@ -472,9 +472,6 @@ context("Contracts", { tags: ['contracts', 'firstPool', 'all'] }, () => {
retireRequestId = response.body.at(0).id;
})
})
});

it("Approve retire request without auth token - Negative", () => {
cy.request({
method: METHOD.POST,
url: API.ApiServer + API.RetireRequests + retireRequestId + "/" + API.Approve,
Expand Down
2 changes: 1 addition & 1 deletion e2e-tests/cypress/fixtures/StandardRegistryData.json
Original file line number Diff line number Diff line change
@@ -1 +1 @@
{"username":"SR","role":"STANDARD_REGISTRY","permissionsGroup":[{"uuid":"97ad4eea-3a9b-4705-bae7-3bd44149eb58","roleId":"6790dd3a5434a601766f6a64","roleName":"Default policy user","owner":null}],"permissions":["ACCOUNTS_STANDARD_REGISTRY_READ","DEMO_KEY_CREATE","IPFS_FILE_READ","IPFS_FILE_CREATE","PROFILES_USER_READ","PROFILES_USER_UPDATE","PROFILES_BALANCE_READ","ACCOUNTS_ACCOUNT_READ","ANALYTIC_POLICY_READ","ANALYTIC_MODULE_READ","ANALYTIC_TOOL_READ","ANALYTIC_SCHEMA_READ","ANALYTIC_DOCUMENT_READ","ARTIFACTS_FILE_READ","ARTIFACTS_FILE_CREATE","ARTIFACTS_FILE_DELETE","BRANDING_CONFIG_UPDATE","CONTRACTS_CONTRACT_READ","CONTRACTS_CONTRACT_CREATE","CONTRACTS_CONTRACT_DELETE","CONTRACTS_CONTRACT_MANAGE","CONTRACTS_WIPE_REQUEST_READ","CONTRACTS_WIPE_REQUEST_UPDATE","CONTRACTS_WIPE_REQUEST_DELETE","CONTRACTS_WIPE_REQUEST_REVIEW","CONTRACTS_WIPE_ADMIN_CREATE","CONTRACTS_WIPE_ADMIN_DELETE","CONTRACTS_WIPE_MANAGER_CREATE","CONTRACTS_WIPE_MANAGER_DELETE","CONTRACTS_WIPER_CREATE","CONTRACTS_WIPER_DELETE","CONTRACTS_POOL_READ","CONTRACTS_POOL_UPDATE","CONTRACTS_POOL_DELETE","CONTRACTS_RETIRE_REQUEST_READ","CONTRACTS_RETIRE_REQUEST_CREATE","CONTRACTS_RETIRE_REQUEST_DELETE","CONTRACTS_RETIRE_REQUEST_REVIEW","CONTRACTS_RETIRE_ADMIN_CREATE","CONTRACTS_RETIRE_ADMIN_DELETE","CONTRACTS_PERMISSIONS_READ","CONTRACTS_DOCUMENT_READ","LOG_LOG_READ","MODULES_MODULE_READ","MODULES_MODULE_CREATE","MODULES_MODULE_UPDATE","MODULES_MODULE_DELETE","MODULES_MODULE_REVIEW","POLICIES_POLICY_READ","POLICIES_POLICY_CREATE","POLICIES_POLICY_UPDATE","POLICIES_POLICY_DELETE","POLICIES_POLICY_REVIEW","POLICIES_POLICY_EXECUTE","POLICIES_POLICY_MANAGE","POLICIES_MIGRATION_CREATE","POLICIES_RECORD_ALL","SCHEMAS_SCHEMA_READ","SCHEMAS_SCHEMA_CREATE","SCHEMAS_SCHEMA_UPDATE","SCHEMAS_SCHEMA_DELETE","SCHEMAS_SCHEMA_REVIEW","SCHEMAS_SYSTEM_SCHEMA_READ","SCHEMAS_SYSTEM_SCHEMA_CREATE","SCHEMAS_SYSTEM_SCHEMA_UPDATE","SCHEMAS_SYSTEM_SCHEMA_DELETE","SCHEMAS_SYSTEM_SCHEMA_REVIEW","TOOLS_TOOL_READ","TOOLS_TOOL_CREATE","TOOLS_TOOL_UPDATE","TOOLS_TOOL_DELETE","TOOLS_TOOL_REVIEW","TOOL_MIGRATION_CREATE","TOKENS_TOKEN_READ","TOKENS_TOKEN_CREATE","TOKENS_TOKEN_UPDATE","TOKENS_TOKEN_DELETE","TOKENS_TOKEN_MANAGE","TAGS_TAG_READ","TAGS_TAG_CREATE","PROFILES_RESTORE_ALL","SUGGESTIONS_SUGGESTIONS_READ","SUGGESTIONS_SUGGESTIONS_UPDATE","SETTINGS_SETTINGS_READ","SETTINGS_SETTINGS_UPDATE","SETTINGS_THEME_READ","SETTINGS_THEME_CREATE","SETTINGS_THEME_UPDATE","SETTINGS_THEME_DELETE","PERMISSIONS_ROLE_READ","PERMISSIONS_ROLE_CREATE","PERMISSIONS_ROLE_UPDATE","PERMISSIONS_ROLE_DELETE","PERMISSIONS_ROLE_MANAGE","ACCESS_POLICY_ALL","SCHEMAS_RULE_CREATE","SCHEMAS_RULE_READ","SCHEMAS_RULE_EXECUTE"],"did":"did:hedera:testnet:A9TFUo6Sm6uLCLmrr9az9h3sjxcAC1nAKE4X7chw2dPp_0.0.5416536","hederaAccountId":"0.0.5416534","confirmed":true,"failed":false,"topicId":"0.0.5416536","parentTopicId":"0.0.1960","didDocument":{"createDate":"2025-01-22T12:05:31.259Z","updateDate":"2025-01-22T12:05:43.700Z","did":"did:hedera:testnet:A9TFUo6Sm6uLCLmrr9az9h3sjxcAC1nAKE4X7chw2dPp_0.0.5416536","document":{"id":"did:hedera:testnet:A9TFUo6Sm6uLCLmrr9az9h3sjxcAC1nAKE4X7chw2dPp_0.0.5416536","@context":"https://www.w3.org/ns/did/v1","verificationMethod":[{"id":"did:hedera:testnet:A9TFUo6Sm6uLCLmrr9az9h3sjxcAC1nAKE4X7chw2dPp_0.0.5416536#did-root-key","type":"Ed25519VerificationKey2018","controller":"did:hedera:testnet:A9TFUo6Sm6uLCLmrr9az9h3sjxcAC1nAKE4X7chw2dPp_0.0.5416536","publicKeyBase58":"BkbEk6uGyZSYX6KeaTjsae3JJpq4wtRKZ3bErbHowBoQ"},{"id":"did:hedera:testnet:A9TFUo6Sm6uLCLmrr9az9h3sjxcAC1nAKE4X7chw2dPp_0.0.5416536#did-root-key-bbs","type":"Bls12381G2Key2020","controller":"did:hedera:testnet:A9TFUo6Sm6uLCLmrr9az9h3sjxcAC1nAKE4X7chw2dPp_0.0.5416536","publicKeyBase58":"24jvieHrAnP7n3V2YUZoTb4LMANs81JQkGJBxK944KnybnXAVn3C6GKEJQRBTyEB3GqMSBA92p3rwYHXQHVWDN7eixEZd5jXz6xSznYGPas1KANgpryFni9di1gGRgWUL2R5"}],"authentication":["did:hedera:testnet:A9TFUo6Sm6uLCLmrr9az9h3sjxcAC1nAKE4X7chw2dPp_0.0.5416536#did-root-key"],"assertionMethod":["#did-root-key","#did-root-key-bbs"]},"status":"CREATE","messageId":"1737547539.992272110","topicId":"0.0.5416536","verificationMethods":{"Ed25519VerificationKey2018":"did:hedera:testnet:A9TFUo6Sm6uLCLmrr9az9h3sjxcAC1nAKE4X7chw2dPp_0.0.5416536#did-root-key","Bls12381G2Key2020":"did:hedera:testnet:A9TFUo6Sm6uLCLmrr9az9h3sjxcAC1nAKE4X7chw2dPp_0.0.5416536#did-root-key-bbs"},"_id":"6790df0b5973c2293f1c82d2","id":"6790df0b5973c2293f1c82d2"},"vcDocument":{"createDate":"2025-01-22T12:06:18.095Z","updateDate":"2025-01-22T12:06:31.233Z","owner":"did:hedera:testnet:A9TFUo6Sm6uLCLmrr9az9h3sjxcAC1nAKE4X7chw2dPp_0.0.5416536","hash":"GwfFcjba8KLmdHFuH31ByUiz8V6CRZ3PpYUaap9P62e1","document":{"id":"urn:uuid:64c8cc5f-f678-4db8-b673-e477f9269a8b","type":["VerifiableCredential"],"issuer":"did:hedera:testnet:A9TFUo6Sm6uLCLmrr9az9h3sjxcAC1nAKE4X7chw2dPp_0.0.5416536","issuanceDate":"2025-01-22T12:06:17.990Z","@context":["https://www.w3.org/2018/credentials/v1","ipfs://bafkreihj7gclc4qgem27tre5je6a3t7tpdrk4li6oamdl6bnflwnoyfs5i"],"credentialSubject":[{"geography":"testGeography","law":"testLaw","tags":"testTags","@context":["ipfs://bafkreihj7gclc4qgem27tre5je6a3t7tpdrk4li6oamdl6bnflwnoyfs5i"],"id":"did:hedera:testnet:A9TFUo6Sm6uLCLmrr9az9h3sjxcAC1nAKE4X7chw2dPp_0.0.5416536","type":"StandardRegistry"}],"proof":{"type":"Ed25519Signature2018","created":"2025-01-22T12:06:18Z","verificationMethod":"did:hedera:testnet:A9TFUo6Sm6uLCLmrr9az9h3sjxcAC1nAKE4X7chw2dPp_0.0.5416536#did-root-key","proofPurpose":"assertionMethod","jws":"eyJhbGciOiJFZERTQSIsImI2NCI6ZmFsc2UsImNyaXQiOlsiYjY0Il19..nP5RrGr3czkUesAmV77cxhuk68A_PQtY0ILwNlkQ9q3aCheiOQtybcHHJ2rP2OeD8ub4ehLrcoUwre3_c-KtBA"}},"documentFileId":"6790df475973c2293f1c8313","hederaStatus":"ISSUE","signature":0,"type":"STANDARD_REGISTRY","option":{"status":"NEW"},"messageId":"1737547587.432120056","topicId":"0.0.5416536","_id":"6790df3a5973c2293f1c830c","id":"6790df3a5973c2293f1c830c"},"accessToken":"Bearer eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VybmFtZSI6IlNSIiwiZGlkIjoiZGlkOmhlZGVyYTp0ZXN0bmV0OkE5VEZVbzZTbTZ1TENMbXJyOWF6OWgzc2p4Y0FDMW5BS0U0WDdjaHcyZFBwXzAuMC41NDE2NTM2Iiwicm9sZSI6IlNUQU5EQVJEX1JFR0lTVFJZIiwiZXhwaXJlQXQiOjE3Mzc1NDg2Mzc3ODIsImlhdCI6MTczNzU0ODAzN30.APCC9CFPWgwDN2MqIowra1UB3OlJriTexBNH29Xxi3x9GeQ2qp6e4ZokHgTgyeIrdgHTaqVy3TP7jeXG6uB1fpnEBiGgKML_IN4pYtv8NNnjL_qVbt7DLrGhLHlmJtSlZ7LZ7U4WSwZKNTBEu1cgwFOM4ajpuUTaDcuusGLJeW8"}
{"username":"SR","role":"STANDARD_REGISTRY","permissionsGroup":[{"uuid":"97ad4eea-3a9b-4705-bae7-3bd44149eb58","roleId":"6790dd3a5434a601766f6a64","roleName":"Default policy user","owner":null}],"permissions":["ACCOUNTS_STANDARD_REGISTRY_READ","DEMO_KEY_CREATE","IPFS_FILE_READ","IPFS_FILE_CREATE","PROFILES_USER_READ","PROFILES_USER_UPDATE","PROFILES_BALANCE_READ","ACCOUNTS_ACCOUNT_READ","ANALYTIC_POLICY_READ","ANALYTIC_MODULE_READ","ANALYTIC_TOOL_READ","ANALYTIC_SCHEMA_READ","ANALYTIC_DOCUMENT_READ","ARTIFACTS_FILE_READ","ARTIFACTS_FILE_CREATE","ARTIFACTS_FILE_DELETE","BRANDING_CONFIG_UPDATE","CONTRACTS_CONTRACT_READ","CONTRACTS_CONTRACT_CREATE","CONTRACTS_CONTRACT_DELETE","CONTRACTS_CONTRACT_MANAGE","CONTRACTS_WIPE_REQUEST_READ","CONTRACTS_WIPE_REQUEST_UPDATE","CONTRACTS_WIPE_REQUEST_DELETE","CONTRACTS_WIPE_REQUEST_REVIEW","CONTRACTS_WIPE_ADMIN_CREATE","CONTRACTS_WIPE_ADMIN_DELETE","CONTRACTS_WIPE_MANAGER_CREATE","CONTRACTS_WIPE_MANAGER_DELETE","CONTRACTS_WIPER_CREATE","CONTRACTS_WIPER_DELETE","CONTRACTS_POOL_READ","CONTRACTS_POOL_UPDATE","CONTRACTS_POOL_DELETE","CONTRACTS_RETIRE_REQUEST_READ","CONTRACTS_RETIRE_REQUEST_CREATE","CONTRACTS_RETIRE_REQUEST_DELETE","CONTRACTS_RETIRE_REQUEST_REVIEW","CONTRACTS_RETIRE_ADMIN_CREATE","CONTRACTS_RETIRE_ADMIN_DELETE","CONTRACTS_PERMISSIONS_READ","CONTRACTS_DOCUMENT_READ","LOG_LOG_READ","MODULES_MODULE_READ","MODULES_MODULE_CREATE","MODULES_MODULE_UPDATE","MODULES_MODULE_DELETE","MODULES_MODULE_REVIEW","POLICIES_POLICY_READ","POLICIES_POLICY_CREATE","POLICIES_POLICY_UPDATE","POLICIES_POLICY_DELETE","POLICIES_POLICY_REVIEW","POLICIES_POLICY_EXECUTE","POLICIES_POLICY_MANAGE","POLICIES_MIGRATION_CREATE","POLICIES_RECORD_ALL","SCHEMAS_SCHEMA_READ","SCHEMAS_SCHEMA_CREATE","SCHEMAS_SCHEMA_UPDATE","SCHEMAS_SCHEMA_DELETE","SCHEMAS_SCHEMA_REVIEW","SCHEMAS_SYSTEM_SCHEMA_READ","SCHEMAS_SYSTEM_SCHEMA_CREATE","SCHEMAS_SYSTEM_SCHEMA_UPDATE","SCHEMAS_SYSTEM_SCHEMA_DELETE","SCHEMAS_SYSTEM_SCHEMA_REVIEW","TOOLS_TOOL_READ","TOOLS_TOOL_CREATE","TOOLS_TOOL_UPDATE","TOOLS_TOOL_DELETE","TOOLS_TOOL_REVIEW","TOOL_MIGRATION_CREATE","TOKENS_TOKEN_READ","TOKENS_TOKEN_CREATE","TOKENS_TOKEN_UPDATE","TOKENS_TOKEN_DELETE","TOKENS_TOKEN_MANAGE","TAGS_TAG_READ","TAGS_TAG_CREATE","PROFILES_RESTORE_ALL","SUGGESTIONS_SUGGESTIONS_READ","SUGGESTIONS_SUGGESTIONS_UPDATE","SETTINGS_SETTINGS_READ","SETTINGS_SETTINGS_UPDATE","SETTINGS_THEME_READ","SETTINGS_THEME_CREATE","SETTINGS_THEME_UPDATE","SETTINGS_THEME_DELETE","PERMISSIONS_ROLE_READ","PERMISSIONS_ROLE_CREATE","PERMISSIONS_ROLE_UPDATE","PERMISSIONS_ROLE_DELETE","PERMISSIONS_ROLE_MANAGE","ACCESS_POLICY_ALL","SCHEMAS_RULE_CREATE","SCHEMAS_RULE_READ","SCHEMAS_RULE_EXECUTE"],"did":"did:hedera:testnet:A9TFUo6Sm6uLCLmrr9az9h3sjxcAC1nAKE4X7chw2dPp_0.0.5416536","hederaAccountId":"0.0.5416534","confirmed":true,"failed":false,"topicId":"0.0.5416536","parentTopicId":"0.0.1960","didDocument":{"createDate":"2025-01-22T12:05:31.259Z","updateDate":"2025-01-22T12:05:43.700Z","did":"did:hedera:testnet:A9TFUo6Sm6uLCLmrr9az9h3sjxcAC1nAKE4X7chw2dPp_0.0.5416536","document":{"id":"did:hedera:testnet:A9TFUo6Sm6uLCLmrr9az9h3sjxcAC1nAKE4X7chw2dPp_0.0.5416536","@context":"https://www.w3.org/ns/did/v1","verificationMethod":[{"id":"did:hedera:testnet:A9TFUo6Sm6uLCLmrr9az9h3sjxcAC1nAKE4X7chw2dPp_0.0.5416536#did-root-key","type":"Ed25519VerificationKey2018","controller":"did:hedera:testnet:A9TFUo6Sm6uLCLmrr9az9h3sjxcAC1nAKE4X7chw2dPp_0.0.5416536","publicKeyBase58":"BkbEk6uGyZSYX6KeaTjsae3JJpq4wtRKZ3bErbHowBoQ"},{"id":"did:hedera:testnet:A9TFUo6Sm6uLCLmrr9az9h3sjxcAC1nAKE4X7chw2dPp_0.0.5416536#did-root-key-bbs","type":"Bls12381G2Key2020","controller":"did:hedera:testnet:A9TFUo6Sm6uLCLmrr9az9h3sjxcAC1nAKE4X7chw2dPp_0.0.5416536","publicKeyBase58":"24jvieHrAnP7n3V2YUZoTb4LMANs81JQkGJBxK944KnybnXAVn3C6GKEJQRBTyEB3GqMSBA92p3rwYHXQHVWDN7eixEZd5jXz6xSznYGPas1KANgpryFni9di1gGRgWUL2R5"}],"authentication":["did:hedera:testnet:A9TFUo6Sm6uLCLmrr9az9h3sjxcAC1nAKE4X7chw2dPp_0.0.5416536#did-root-key"],"assertionMethod":["#did-root-key","#did-root-key-bbs"]},"status":"CREATE","messageId":"1737547539.992272110","topicId":"0.0.5416536","verificationMethods":{"Ed25519VerificationKey2018":"did:hedera:testnet:A9TFUo6Sm6uLCLmrr9az9h3sjxcAC1nAKE4X7chw2dPp_0.0.5416536#did-root-key","Bls12381G2Key2020":"did:hedera:testnet:A9TFUo6Sm6uLCLmrr9az9h3sjxcAC1nAKE4X7chw2dPp_0.0.5416536#did-root-key-bbs"},"_id":"6790df0b5973c2293f1c82d2","id":"6790df0b5973c2293f1c82d2"},"vcDocument":{"createDate":"2025-01-22T12:06:18.095Z","updateDate":"2025-01-22T12:06:31.233Z","owner":"did:hedera:testnet:A9TFUo6Sm6uLCLmrr9az9h3sjxcAC1nAKE4X7chw2dPp_0.0.5416536","hash":"GwfFcjba8KLmdHFuH31ByUiz8V6CRZ3PpYUaap9P62e1","document":{"id":"urn:uuid:64c8cc5f-f678-4db8-b673-e477f9269a8b","type":["VerifiableCredential"],"issuer":"did:hedera:testnet:A9TFUo6Sm6uLCLmrr9az9h3sjxcAC1nAKE4X7chw2dPp_0.0.5416536","issuanceDate":"2025-01-22T12:06:17.990Z","@context":["https://www.w3.org/2018/credentials/v1","ipfs://bafkreihj7gclc4qgem27tre5je6a3t7tpdrk4li6oamdl6bnflwnoyfs5i"],"credentialSubject":[{"geography":"testGeography","law":"testLaw","tags":"testTags","@context":["ipfs://bafkreihj7gclc4qgem27tre5je6a3t7tpdrk4li6oamdl6bnflwnoyfs5i"],"id":"did:hedera:testnet:A9TFUo6Sm6uLCLmrr9az9h3sjxcAC1nAKE4X7chw2dPp_0.0.5416536","type":"StandardRegistry"}],"proof":{"type":"Ed25519Signature2018","created":"2025-01-22T12:06:18Z","verificationMethod":"did:hedera:testnet:A9TFUo6Sm6uLCLmrr9az9h3sjxcAC1nAKE4X7chw2dPp_0.0.5416536#did-root-key","proofPurpose":"assertionMethod","jws":"eyJhbGciOiJFZERTQSIsImI2NCI6ZmFsc2UsImNyaXQiOlsiYjY0Il19..nP5RrGr3czkUesAmV77cxhuk68A_PQtY0ILwNlkQ9q3aCheiOQtybcHHJ2rP2OeD8ub4ehLrcoUwre3_c-KtBA"}},"documentFileId":"6790df475973c2293f1c8313","hederaStatus":"ISSUE","signature":0,"type":"STANDARD_REGISTRY","option":{"status":"NEW"},"messageId":"1737547587.432120056","topicId":"0.0.5416536","_id":"6790df3a5973c2293f1c830c","id":"6790df3a5973c2293f1c830c"},"accessToken":"Bearer eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VybmFtZSI6IlNSIiwiZGlkIjoiZGlkOmhlZGVyYTp0ZXN0bmV0OkE5VEZVbzZTbTZ1TENMbXJyOWF6OWgzc2p4Y0FDMW5BS0U0WDdjaHcyZFBwXzAuMC41NDE2NTM2Iiwicm9sZSI6IlNUQU5EQVJEX1JFR0lTVFJZIiwiZXhwaXJlQXQiOjE3Mzc1NDg2Mzc3ODIsImlhdCI6MTczNzU0ODAzN30.APCC9CFPWgwDN2MqIowra1UB3OlJriTexBNH29Xxi3x9GeQ2qp6e4ZokHgTgyeIrdgHTaqVy3TP7jeXG6uB1fpnEBiGgKML_IN4pYtv8NNnjL_qVbt7DLrGhLHlmJtSlZ7LZ7U4WSwZKNTBEu1cgwFOM4ajpuUTaDcuusGLJeW8"}
18 changes: 16 additions & 2 deletions e2e-tests/cypress/support/e2e.js
Original file line number Diff line number Diff line change
Expand Up @@ -30,6 +30,7 @@ import API from "./ApiUrls";
const registerCypressGrep = require('cypress-grep')
const SRUsername = Cypress.env('SRUser');
const SR2Username = Cypress.env('SR2User');
const SR3Username = Cypress.env('SR3User');
const userUsername = Cypress.env('User');
const password = Cypress.env('Password');
let SRDid;
Expand All @@ -41,7 +42,7 @@ registerCypressGrep()

//If neccessery users doesn't exist, creating them
before(() => {
let SRExist, SR2Exist, UserExist;
let SRExist, SR2Exist, UserExist, SR3Exist;
cy.request({
method: METHOD.GET,
url: API.ApiServer + API.RegUsers,
Expand All @@ -51,6 +52,8 @@ before(() => {
SRExist = true;
else if (element.username == SR2Username)
SR2Exist = true;
else if (element.username == SR3Username)
SR3Exist = true;
else if (element.username == userUsername)
UserExist = true;
})
Expand All @@ -76,6 +79,17 @@ before(() => {
role: 'STANDARD_REGISTRY'
}
})
if (!SR3Exist)
cy.request({
method: METHOD.POST,
url: API.ApiServer + API.AccountRegister,
body: {
username: SR3Username,
password: password,
password_confirmation: password,
role: 'STANDARD_REGISTRY'
}
})
if (!UserExist)
cy.request({
method: METHOD.POST,
Expand Down Expand Up @@ -105,7 +119,7 @@ before(() => {
method: METHOD.GET,
url: API.ApiServer + API.RandomKey,
headers: { authorization },
timeout:600000
timeout: 600000
}).then((response) => {
cy.wait(3000)
let hederaAccountId = response.body.id
Expand Down
9 changes: 8 additions & 1 deletion e2e-tests/package-lock.json

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Loading