Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
45 commits
Select commit Hold shift + click to select a range
699c507
Fix for shouldValidateUploadTimeStamp failure due to NPE @line 468 wh…
patelila Sep 18, 2025
5ad04b3
use for beftaFwVersion - '9.2.5_CCD-6184'
patelila Sep 18, 2025
f542338
F-111 - Clean up role assignment
patelila Sep 19, 2025
ad4ff48
Merge branch 'master' into CCD-6184_Add_role_assignment_cleanup_api_c…
patelila Sep 19, 2025
4bfaa9e
revert change
patelila Sep 19, 2025
e7818c9
F-105 - Clean up role assignment made above
patelila Sep 22, 2025
fee8fb2
F-109 - Clean up role assignment made above
patelila Sep 22, 2025
1447bae
F-103.1 - Clean up role assignment made above
patelila Sep 22, 2025
646c9fa
F-103 - Clean up role assignment made above
patelila Sep 23, 2025
e832673
Removed files not used
patelila Sep 23, 2025
163f2d1
fix actualResponse.body.data contains a bad value: Must be non-null: …
patelila Sep 23, 2025
cf947c1
fix ignored FT
patelila Sep 23, 2025
c850453
fix ignored FT
patelila Sep 23, 2025
65bf35d
fix ignored FT
patelila Sep 23, 2025
ca7b191
F-101 - Clean up role assignment made above
patelila Sep 24, 2025
d957142
F-045 - Clean up role assignment made above
patelila Sep 24, 2025
2ba54fe
F-047 - Clean up role assignment made above
patelila Sep 24, 2025
58dd5a1
F-053 & F-054 - Clean up role assignment made above
patelila Sep 25, 2025
66a80d0
Merge branch 'master' into CCD-6184_Add_role_assignment_cleanup_api_c…
patelila Sep 25, 2025
d8016ab
F-053 & F-054 - Clean up role assignment made above
patelila Sep 25, 2025
3a4259f
F-053 & F-054 - Clean up role assignment made above
patelila Sep 25, 2025
85a85fb
F-055 & F-056 - Clean up role assignment made above
patelila Sep 26, 2025
78a49e6
F-107 - Clean up role assignment made above
patelila Sep 26, 2025
303fc0d
F-130 - Clean up role assignment made above
patelila Sep 26, 2025
434ddd8
F-1015 - Clean up role assignment made above
patelila Sep 26, 2025
e851d54
Merge branch 'master' into CCD-6184_Add_role_assignment_cleanup_api_c…
patelila Oct 3, 2025
5777677
F-1016 - Clean up role assignment made above
patelila Oct 3, 2025
9987e87
F-1017/F-1018 - Clean up role assignment made above
patelila Oct 6, 2025
b310c90
F-1018 - Clean up role assignment made above
patelila Oct 7, 2025
e798686
F-1019 - Clean up role assignment made above
patelila Oct 7, 2025
db7e670
F-1023 - Clean up role assignment made above
patelila Oct 8, 2025
cf835cb
F-108 - Clean up role assignment made above
patelila Oct 8, 2025
cef9c8a
F-1004 - Clean up role assignment
patelila Oct 9, 2025
d464f8e
F-1016/F1018/F-1024/F-1025 - Clean up role assignment
patelila Oct 10, 2025
9c8b6af
F-053/F-056 - Clean up role assignment
patelila Oct 10, 2025
791b1cb
empty commit to trigger build
patelila Oct 13, 2025
4330fa9
remove .mirrord
patelila Oct 14, 2025
a803939
Merge branch 'master' into CCD-6184_Add_role_assignment_cleanup_api_c…
patelila Oct 14, 2025
ad9ae32
Merge branch 'master' into CCD-6184_Add_role_assignment_cleanup_api_c…
patelila Oct 28, 2025
2a46ca6
Merge branch 'master' into CCD-6184_Add_role_assignment_cleanup_api_c…
patelila Nov 11, 2025
ccfacd3
Merge branch 'master' into CCD-6184_Add_role_assignment_cleanup_api_c…
patelila Nov 14, 2025
e0796f1
Merge branch 'master' into CCD-6184_Add_role_assignment_cleanup_api_c…
patelila Nov 17, 2025
90644d5
Merge branch 'master' into CCD-6184_Add_role_assignment_cleanup_api_c…
patelila Nov 25, 2025
c35ef7b
Merge branch 'master' into CCD-6184_Add_role_assignment_cleanup_api_c…
patelila Nov 26, 2025
e02e266
Merge branch 'master' into CCD-6184_Add_role_assignment_cleanup_api_c…
patelila Dec 2, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -23,6 +23,8 @@ Scenario: must return 201 if the grant is successful for a user to a valid case
And the response [has the 201 return code],
And the response has all other details as expected,
And a call [to verify testUser has been granted a case role for the case] will get the expected response as in [F-045_Verify_Granted_Case_Role_for_Case].
# Clean up role assignment made above
And a successful call [is made to remove Case Role] as in [F-045_S-151_Remove_Case_Assigned_User_role_for_Case].

#-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
@S-152
Expand Down Expand Up @@ -117,5 +119,7 @@ Scenario: must grant without removing other case roles
And the response [has the 201 return code],
And the response has all other details as expected,
And a call [to verify testUser has been granted multiple case roles for the case] will get the expected response as in [F-045_Verify_Granted_Multiple_Case_Roles_for_Case].
# Clean up role assignment made above
And a successful call [is made to remove Case Role] as in [F-045_Remove_Case_Assigned_User_role_for_Case].

#-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Original file line number Diff line number Diff line change
@@ -0,0 +1,40 @@
{
"title": "Must successfully remove a user and case role for a specific case by a user calling through/from an authorised application",

"_guid_": "F-045_Remove_Case_Assigned_User_role_for_Case",
"_extends_": "F-111_Remove_Case_Assigned_User_Roles_Base",

"specs": [
"is made to remove Case Role"
],

"users": {
"invokingUser": {
"_extends_": "BeftaCaseworkerCaa"
}
},

"request": {
"headers": {
"Authorization": "Bearer ${[scenarioContext][testData][users][invokingUser][accessToken]}"
},
"body": {
"case_users": [
{
"case_id": "${[scenarioContext][siblingContexts][F-045_Befta_Jurisdiction2_Full_Case_Creation_Data][testData][actualResponse][body][id]}",
"user_id": "${[scenarioContext][parentContext][testData][users][testUser][id]}",
"case_role": "[CREATOR]"
}, {
"case_id": "${[scenarioContext][siblingContexts][F-045_Befta_Jurisdiction2_Full_Case_Creation_Data][testData][actualResponse][body][id]}",
"user_id": "${[scenarioContext][parentContext][testData][users][testUser][id]}",
"case_role": "[DEFENDANT]"
}

]
}
},

"expectedResponse": {
"_extends_": "F-111_Remove_Case_Assigned_User_Roles_200_response"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
{
"title": "Must successfully remove a user and case role for a specific case by a user calling through/from an authorised application",

"_guid_": "F-045_S-151_Remove_Case_Assigned_User_role_for_Case",
"_extends_": "F-111_Remove_Case_Assigned_User_Roles_Base",

"specs": [
"is made to remove Case Role"
],

"users": {
"invokingUser": {
"_extends_": "BeftaCaseworker1"
}
},

"request": {
"headers": {
"Authorization": "Bearer ${[scenarioContext][testData][users][invokingUser][accessToken]}"
},
"body": {
"case_users": [
{
"case_id": "${}${[scenarioContext][siblingContexts][Standard_Full_Case_Creation_Data][testData][actualResponse][body][id]}",
"user_id": "${[scenarioContext][parentContext][testData][users][testUser][id]}",
"case_role": "[CREATOR]"
}
]
}
},

"expectedResponse": {
"_extends_": "F-111_Remove_Case_Assigned_User_Roles_200_response"
}
}
2 changes: 2 additions & 0 deletions src/aat/resources/features/F-047 - Get Case IDs/F-047.feature
Original file line number Diff line number Diff line change
Expand Up @@ -21,6 +21,8 @@ Scenario: must return 200 and a list of case ids a user has access to
Then a positive response is received,
And the response [contains a list of case ids, along with an HTTP-200 OK],
And the response has all other details as expected.
# Clean up role assignment made above
And a successful call [is made to remove Case Role] as in [F-047_Remove_Case_Assigned_User_role_for_Case].

#-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
@S-098
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
{
"title": "Must successfully remove a user and case role for a specific case by a user calling through/from an authorised application",

"_guid_": "F-047_Remove_Case_Assigned_User_role_for_Case",
"_extends_": "F-111_Remove_Case_Assigned_User_Roles_Base",

"specs": [
"is made to remove Case Role"
],

"users": {
"invokingUser": {
"_extends_": "BeftaCaseworker1"
}
},

"request": {
"headers": {
"Authorization": "Bearer ${[scenarioContext][testData][users][invokingUser][accessToken]}"
},
"body": {
"case_users": [
{
"case_id": "${}${[scenarioContext][siblingContexts][Standard_Full_Case_Creation_Data][testData][actualResponse][body][id]}",
"user_id": "${[scenarioContext][parentContext][testData][users][testUser][id]}",
"case_role": "[CREATOR]"
}
]
}
},

"expectedResponse": {
"_extends_": "F-111_Remove_Case_Assigned_User_Roles_200_response"
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,9 @@ Scenario: must create case successfully and return positive response HTTP-201 f

Then a positive response is received,
And the response [code is HTTP-201],
And the response has all other details as expected.
And the response has all other details as expected,
# Clean up role assignment made above
And a successful call [is made to remove Case Role] as in [F-053_Remove_Case_Assigned_User_role_for_Case].

#-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
@S-270 @Ignore # wrong scenario in Excel
Expand Down Expand Up @@ -173,5 +175,7 @@ Scenario: must create and update successfully the respective fields with ACL per
And the response has all other details as expected,
And another successful call [to get an update event token for the case just created] as in [S-578-Prerequisite_Citizen_Token_For_Update_Case],
And a call [to update the DocumentField4 of same case by Citizen who doesn't have privilege to update DocumentField4] will get the expected response as in [S-578_Later_Case_Update_By_Citizen].
# Clean up role assignment made above
And a successful call [is made to remove Case Role] as in [F-053_578_Remove_Case_Assigned_User_role_for_Case].

#-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
{
"title": "Must successfully remove a user and case role for a specific case by a user calling through/from an authorised application",

"_guid_": "F-053_578_Remove_Case_Assigned_User_role_for_Case",
"_extends_": "F-111_Remove_Case_Assigned_User_Roles_Base",

"specs": [
"is made to remove Case Role"
],

"users": {
"invokingUser": {
"_extends_": "BeftaCaseworker2Solicitor2"
},
"testUser": {
"_extends_": "BeftaCitizen2"
}
},

"request": {
"headers": {
"Authorization": "Bearer ${[scenarioContext][testData][users][invokingUser][accessToken]}"
},
"body": {
"case_users": [
{
"case_id": "${[scenarioContext][parentContext][testData][actualResponse][body][id]}",
"user_id": "${[scenarioContext][testData][users][testUser][id]}",
"case_role": "[CREATOR]"
}
]
}
},

"expectedResponse": {
"_extends_": "F-111_Remove_Case_Assigned_User_Roles_200_response"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
{
"title": "Must successfully remove a user and case role for a specific case by a user calling through/from an authorised application",

"_guid_": "F-053_Remove_Case_Assigned_User_role_for_Case",
"_extends_": "F-111_Remove_Case_Assigned_User_Roles_Base",

"specs": [
"is made to remove Case Role"
],

"users": {
"invokingUser": {
"_extends_": "BeftaCaseworker2Solicitor2"
},
"testUser": {
"_extends_": "BeftaCitizen3"
}
},

"request": {
"headers": {
"Authorization": "Bearer ${[scenarioContext][testData][users][invokingUser][accessToken]}"
},
"body": {
"case_users": [
{
"case_id": "${[scenarioContext][parentContext][testData][actualResponse][body][id]}",
"user_id": "${[scenarioContext][testData][users][testUser][id]}",
"case_role": "[CREATOR]"
}
]
}
},

"expectedResponse": {
"_extends_": "F-111_Remove_Case_Assigned_User_Roles_200_response"
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,10 @@ Scenario: must return 200 and list of case data for the given case id

Then a positive response is received,
And the response [code is HTTP-200],
And the response has all other details as expected.
And the response has all other details as expected,
# Clean up role assignment made above
And a successful call [is made to remove Case Role] as in [F-054_Remove_Case_Assigned_User_role_for_Case].


#-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
@S-094 @Ignore # Response code mismatch, expected: 401, actual: 403 (defect RDM-6628)
Expand Down Expand Up @@ -114,6 +117,8 @@ Scenario: must return negative response HTTP-403 when request contains a non-ex
Then a negative response is received,
And the response [code is HTTP-403],
And the response has all other details as expected.
# Clean up role assignment made above
And a successful call [is made to remove Case Role] as in [F-054_Remove_Case_Assigned_User_role_for_Case].

#-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
@S-566 @Ignore # Response code mismatch, expected: 400, actual: 200 / RDM-7066
Expand Down Expand Up @@ -179,5 +184,7 @@ Scenario: must return negative response HTTP-403 when request contains a malfor
Then a negative response is received,
And the response [code is HTTP-403],
And the response has all other details as expected.
# Clean up role assignment made above
And a successful call [is made to remove Case Role] as in [F-054_Remove_Case_Assigned_User_role_for_Case].

#-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
{
"title": "Must successfully remove a user and case role for a specific case by a user calling through/from an authorised application",

"_guid_": "F-054_Remove_Case_Assigned_User_role_for_Case",
"_extends_": "F-111_Remove_Case_Assigned_User_Roles_Base",

"specs": [
"is made to remove Case Role"
],

"users": {
"invokingUser": {
"_extends_": "BeftaCaseworker2Solicitor3"
},
"testUser": {
"_extends_": "BeftaCitizen3"
}
},

"request": {
"headers": {
"Authorization": "Bearer ${[scenarioContext][testData][users][invokingUser][accessToken]}"
},
"body": {
"case_users": [
{
"case_id": "${[scenarioContext][siblingContexts][Citizen_Full_Case_Creation_Data][testData][actualResponse][body][id]}",
"user_id": "${[scenarioContext][testData][users][testUser][id]}",
"case_role": "[CREATOR]"
}
]
}
},

"expectedResponse": {
"_extends_": "F-111_Remove_Case_Assigned_User_Roles_200_response"
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -21,6 +21,8 @@ Scenario: must return 200 if start event trigger is successful for a case
Then a positive response is received,
And the response [contains an event token for the triggered event, along with a HTTP 200 OK],
And the response has all other details as expected.
# Clean up role assignment made above
And a successful call [is made to remove Case Role] as in [F-055_Remove_Case_Assigned_User_role_for_Case].

#-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
@S-252 @Ignore # expected 401 but got 403 (defect RDM-6628)
Expand Down Expand Up @@ -81,5 +83,7 @@ Scenario: must return 422 when start event trigger has failed
Then a negative response is received,
And the response [contains a HTTP 422 Unprocessable Entity],
And the response has all other details as expected.
# Clean up role assignment made above
And a successful call [is made to remove Case Role] as in [F-055_Remove_Case_Assigned_User_role_for_Case].

#-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
{
"title": "Must successfully remove a user and case role for a specific case by a user calling through/from an authorised application",

"_guid_": "F-055_Remove_Case_Assigned_User_role_for_Case",
"_extends_": "F-111_Remove_Case_Assigned_User_Roles_Base",

"specs": [
"is made to remove Case Role"
],

"users": {
"invokingUser": {
"_extends_": "BeftaCaseworker2Solicitor3"
},
"testUser": {
"_extends_": "BeftaCitizen3"
}
},

"request": {
"headers": {
"Authorization": "Bearer ${[scenarioContext][testData][users][invokingUser][accessToken]}"
},
"body": {
"case_users": [
{
"case_id": "${[scenarioContext][siblingContexts][Citizen_Full_Case_Creation_Data][testData][actualResponse][body][id]}",
"user_id": "${[scenarioContext][testData][users][testUser][id]}",
"case_role": "[CREATOR]"
}
]
}
},

"expectedResponse": {
"_extends_": "F-111_Remove_Case_Assigned_User_Roles_200_response"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
{
"title": "Must successfully remove a user and case role for a specific case by a user calling through/from an authorised application",

"_guid_": "F-053_584_Remove_Case_Assigned_User_role_for_Case",
"_extends_": "F-111_Remove_Case_Assigned_User_Roles_Base",

"specs": [
"is made to remove Case Role"
],

"users": {
"invokingUser": {
"_extends_": "BeftaCaseworker2Solicitor2"
},
"testUser": {
"_extends_": "BeftaCitizen2"
}
},

"request": {
"headers": {
"Authorization": "Bearer ${[scenarioContext][testData][users][invokingUser][accessToken]}"
},
"body": {
"case_users": [
{
"case_id": "${[scenarioContext][parentContext][testData][actualResponse][body][id]}",
"user_id": "${[scenarioContext][testData][users][testUser][id]}",
"case_role": "[CREATOR]"
}
]
}
},

"expectedResponse": {
"_extends_": "F-111_Remove_Case_Assigned_User_Roles_200_response"
}
}
Loading