From 4c09165600ccccdcbda01453909b35dd2523e6d9 Mon Sep 17 00:00:00 2001 From: patelila Date: Mon, 26 Jan 2026 15:06:12 +0000 Subject: [PATCH 01/13] use 7.26.0-SNAPSHOT-CCD-7049 --- build.gradle | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/build.gradle b/build.gradle index b2ef56d834..27d1c7e555 100644 --- a/build.gradle +++ b/build.gradle @@ -41,7 +41,7 @@ ext { testContainersVersion = '1.20.4' cucumber = '6.11.0' beftaFwVersion = '9.2.4' - ccdTestDefinitionVersion = '7.25.4' + ccdTestDefinitionVersion = '7.26.0-SNAPSHOT-CCD-7049' limits = [ 'instruction': 90, 'branch' : 85, @@ -184,7 +184,7 @@ dependencies { // start::CVE Vulnerability dependency overrides // MAIN PARENT DEPENDEDNCY - implementation group: 'com.auth0', name: 'java-jwt', version: '4.5.0' + implementation group: 'com.auth0', name: 'java-jwt', version: '4.5.0' implementation group: 'com.google.code.gson', name: 'gson', version: '2.13.2' // java-property-to-json implementation group: 'com.google.guava', name: 'guava', version: '33.5.0-jre' // java-property-to-json implementation group: 'com.jayway.jsonpath', name: 'json-path', version: '2.10.0' // spring-hateoas @@ -210,7 +210,7 @@ dependencies { testImplementation group: 'org.assertj', name: 'assertj-core', version: '3.27.6' // spring-cloud-starter-contract-stub-runner testImplementation group: 'org.mockito', name: 'mockito-core', version: mockito // spring-cloud-starter-contract-stub-runner testImplementation group: 'org.mockito', name: 'mockito-junit-jupiter', version: mockito // spring-boot-starter-test - + // end::CVE Vulnerability dependency overrides // Lombok @@ -270,7 +270,7 @@ dependencies { implementation group: 'org.jooq', name: 'jool-java-8', version: '0.9.15' implementation group: 'org.mapstruct', name: 'mapstruct', version: '1.6.3' implementation group: 'pl.jalokim.propertiestojson', name: 'java-properties-to-json', version: '5.3.0' - + annotationProcessor group: 'org.mapstruct', name: 'mapstruct-processor', version: '1.6.3' testAnnotationProcessor group: 'org.mapstruct', name: 'mapstruct-processor', version: '1.6.3' runtimeOnly group: 'org.postgresql', name: 'postgresql', version: '42.7.9' From 8e5f1c9c8a17ebecbb1c40abe07b23495aec89bb Mon Sep 17 00:00:00 2001 From: patelila Date: Thu, 29 Jan 2026 16:24:30 +0000 Subject: [PATCH 02/13] FT tests FT-1026 --- .../F-1026.feature | 255 ++++++++++++++++++ ...6_CreateCasePreRequisiteCaseworker.td.json | 111 ++++++++ ...1026_CreateCasePreRequisiteCitizen.td.json | 118 ++++++++ .../F-1026_Test_Data_Base.td.json | 41 +++ .../F-1026_Test_Data_Base_V2.td.json | 23 ++ .../F-1026_Test_Data_Citizen_Base.td.json | 41 +++ .../F-1026_Test_Data_Event_Caseworker.td.json | 39 +++ .../F-1026_Test_Data_Event_Citizen.td.json | 18 ++ .../S-1026-GetUpdateEventToken.td.json | 30 +++ .../S-1026.1.td.json | 118 ++++++++ .../S-1026.10.td.json | 114 ++++++++ .../S-1026.11.td.json | 117 ++++++++ .../S-1026.12.td.json | 132 +++++++++ .../S-1026.13.td.json | 80 ++++++ .../S-1026.14.td.json | 90 +++++++ .../S-1026.15.td.json | 113 ++++++++ .../S-1026.16.td.json | 130 +++++++++ .../S-1026.17.td.json | 133 +++++++++ .../S-1026.18.td.json | 122 +++++++++ .../S-1026.2.td.json | 133 +++++++++ .../S-1026.3.td.json | 81 ++++++ .../S-1026.4.td.json | 91 +++++++ .../S-1026.5.td.json | 114 ++++++++ .../S-1026.6.td.json | 118 ++++++++ .../S-1026.7.td.json | 133 +++++++++ .../S-1026.8.td.json | 81 ++++++ .../S-1026.9.td.json | 91 +++++++ .../S-1026_GetCitizenCreateToken.td.json | 33 +++ .../S-1026_GetCreateToken.td.json | 28 ++ .../S-1026_GetEventTokenBase.td.json | 32 +++ .../S-1026_GetUpdateTokenCaseworker.td.json | 16 ++ .../S-1026_GetUpdateTokenCitizen.td.json | 17 ++ 32 files changed, 2793 insertions(+) create mode 100644 src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026.feature create mode 100644 src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_CreateCasePreRequisiteCaseworker.td.json create mode 100644 src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_CreateCasePreRequisiteCitizen.td.json create mode 100644 src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_Test_Data_Base.td.json create mode 100644 src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_Test_Data_Base_V2.td.json create mode 100644 src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_Test_Data_Citizen_Base.td.json create mode 100644 src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_Test_Data_Event_Caseworker.td.json create mode 100644 src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_Test_Data_Event_Citizen.td.json create mode 100644 src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026-GetUpdateEventToken.td.json create mode 100644 src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.1.td.json create mode 100644 src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.10.td.json create mode 100644 src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.11.td.json create mode 100644 src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.12.td.json create mode 100644 src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.13.td.json create mode 100644 src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.14.td.json create mode 100644 src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.15.td.json create mode 100644 src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.16.td.json create mode 100644 src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.17.td.json create mode 100644 src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.18.td.json create mode 100644 src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.2.td.json create mode 100644 src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.3.td.json create mode 100644 src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.4.td.json create mode 100644 src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.5.td.json create mode 100644 src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.6.td.json create mode 100644 src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.7.td.json create mode 100644 src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.8.td.json create mode 100644 src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.9.td.json create mode 100644 src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026_GetCitizenCreateToken.td.json create mode 100644 src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026_GetCreateToken.td.json create mode 100644 src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026_GetEventTokenBase.td.json create mode 100644 src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026_GetUpdateTokenCaseworker.td.json create mode 100644 src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026_GetUpdateTokenCitizen.td.json diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026.feature b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026.feature new file mode 100644 index 0000000000..9adf545638 --- /dev/null +++ b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026.feature @@ -0,0 +1,255 @@ +@F-1026 +Feature: F-1026: Submit Case Creation Handle CaseAccessGroups + + Background: Load test data for the scenario + Given an appropriate test context as detailed in the test data source + + + #======================================= + # Submit Case Creation Event: v1_external#/case-details-endpoint/saveCaseDetailsForCaseWorkerUsingPOST + #======================================= + + @S-1026.1 #AC-1 + Scenario: Invoke saveCaseDetailsForCaseWorkerUsingPOST and caseAccessGroupId created + Given a user with [an active profile in CCD] + When a request is prepared with appropriate values + And the request [contains correctly configured values] + And the request [contains some OrganisationPolicy fields with all correct values] + And the request [is of caseType where case_data has caseAccessGroupType of CCD:all-cases-access] + And it is submitted to call the [Submit case creation as Case worker] operation of [CCD Data Store] + Then a positive response is received + And the response has all other details as expected + And the response [contains updated values for case_data and data_classification] + + @S-1026.2 #AC-2 #AC-02 of CCD-5324 + Scenario: Invoke saveCaseDetailsForCaseWorkerUsingPOST and caseAccessGroupId not created when caseGroupType != CCD:all-cases-access + Given a user with [an active profile in CCD] + When a request is prepared with appropriate values + And the request [contains correctly configured values] + And the request [contains some OrganisationPolicy fields with all correct values] + And the request [is of caseType where caseAccessGroupType is not CCD:all-cases-access] + And it is submitted to call the [Submit case creation as Case worker] operation of [CCD Data Store] + Then a positive response is received + And the response has all other details as expected + And the response [contains updated values for case_data and data_classification] + + @S-1026.3 #AC-3 #AC-03 of CCD-5324 + Scenario: Invoke saveCaseDetailsForCaseWorkerUsingPOST when OrganisationID is empty + Given a user with [an active profile in CCD] + When a request is prepared with appropriate values + And the request [contains correctly configured values] + And the request [contains some OrganisationPolicy fields with all correct values] + And the request [is of caseType where caseAccessGroupType = CCD:all-cases-access], + And the request [caseData Organisation.OrganisationID value is empty value], + And it is submitted to call the [Submit case creation as Case worker] operation of [CCD Data Store] + Then a positive response is received + And the response has all other details as expected + And the response [contains updated values for case_data and data_classification] + + @S-1026.4 #AC-4 #AC-10 of CCD-5324 + Scenario: CaseAccessGroups field contains valid caseAccessGroupType value but case data invalid and Submit Case Creation Event is invoked on v1_external#/case-details-endpoint/saveCaseDetailsForCaseWorkerUsingPOST + Given a user with [an active profile in CCD] + When a request is prepared with appropriate values + And the request [contains correctly configured values] + And the request [is of caseType where caseAccessGroupType = CCD:all-cases-access and -OrganisationPolicyField- CaseAssignedRoleField field exists in caseData and case data has Organisation.OrganisationID value not set to empty value but accessType does not have GroupRoleName] + And it is submitted to call the [Submit case creation as Case worker] operation of [CCD Data Store] + Then a positive response is received + And the response has all other details as expected + And the response [contains updated values for case_data and data_classification] + + @S-1026.5 #Testing Blank value + Scenario: Invoke saveCaseDetailsForCaseWorkerUsingPOST and caseAccessGroups field contains blank value + Given a user with [an active profile in CCD] + When a request is prepared with appropriate values + And the request [contains some OrganisationPolicy fields with all correct values] + And it is submitted to call the [Submit case creation as Case worker] operation of [CCD Data Store] + Then a positive response is received + And the response has all other details as expected + And the response [contains updated values for case_data and data_classification] + + + #======================================= + # Submit Case Creation Event: v1_external#/case-details-endpoint/saveCaseDetailsForCitizenUsingPOST + #======================================= + + @S-1026.6 #AC-6 #AC-01 of CCD-5324 + Scenario: Invoke saveCaseDetailsForCitizenUsingPOST and caseAccessGroupId created + Given a user with [an active profile in CCD] + When a request is prepared with appropriate values + And the request [contains correctly configured values] + And the request [contains some OrganisationPolicy fields with all correct values] + And the request [is of caseType where case_data has caseAccessGroupType of CCD:all-cases-access] + And it is submitted to call the [Submit case creation as Citizen] operation of [CCD Data Store] + Then a positive response is received + And the response has all other details as expected + And the response [contains updated values for case_data and data_classification] + + @S-1026.7 #AC-7 #AC-08 of CCD-5324 + Scenario: Invoke saveCaseDetailsForCitizenUsingPOST and caseAccessGroupId not created when caseGroupType != CCD:all-cases-access + Given a user with [an active profile in CCD] + When a request is prepared with appropriate values + And the request [contains correctly configured values] + And the request [contains some OrganisationPolicy fields with all correct values] + And the request [is of caseType where caseAccessGroupType is not CCD:all-cases-access] + And it is submitted to call the [Submit case creation as Citizen] operation of [CCD Data Store] + Then a positive response is received + And the response has all other details as expected + And the response [contains updated values for case_data and data_classification] + + @S-1026.8 #AC-8 #AC-09 of CCD-5324 + Scenario: CaseAccessGroups field contains Invalid caseAccessGroupType value and Submit Case Creation Event is invoked on v1_external#/case-details-endpoint/saveCaseDetailsForCitizenUsingPOST + Given a user with [an active profile in CCD] + When a request is prepared with appropriate values + And the request [contains correctly configured values] + And the request [contains some OrganisationPolicy fields with all correct values] + And the request [is of caseType where caseAccessGroupType = CCD:all-cases-access], + And the request [caseData Organisation.OrganisationID value is empty value], + And it is submitted to call the [Submit case creation as Citizen] operation of [CCD Data Store] + Then a positive response is received + And the response has all other details as expected + And the response [contains updated values for case_data and data_classification] + + @S-1026.9 #AC-9 #AC-10 of CCD-5324 + Scenario: CaseAccessGroups field contains valid caseAccessGroupType value but case data invalid and Submit Case Creation Event is invoked on v1_external#/case-details-endpoint/saveCaseDetailsForCitizenUsingPOST + Given a user with [an active profile in CCD] + When a request is prepared with appropriate values + And the request [contains correctly configured values] + And the request [is of caseType where caseAccessGroupType = CCD:all-cases-access and -OrganisationPolicyField- CaseAssignedRoleField field exists in caseData and case data has Organisation.OrganisationID value not set to empty value but accessType does not have GroupRoleName] + And it is submitted to call the [Submit case creation as Citizen] operation of [CCD Data Store] + Then a positive response is received + And the response has all other details as expected + And the response [contains updated values for case_data and data_classification] + + @S-1026.10 #Testing Blank value + Scenario: Invoke saveCaseDetailsForCitizenUsingPOST and caseAccessGroups field contains blank value + Given a user with [an active profile in CCD] + When a request is prepared with appropriate values + And the request [contains some OrganisationPolicy fields with all correct values] + And it is submitted to call the [Submit case creation as Citizen] operation of [CCD Data Store] + Then a positive response is received + And the response has all other details as expected + And the response [contains updated values for case_data and data_classification] + + #======================================= + # Submit Event Creation: v2_external#/case-controller/createCaseUsingPOST + #======================================= + + @S-1026.11 #AC-11 #AC-04 of CCD-5324 + Scenario: Invoke v2_external#/case-controller/createCaseUsingPOST and caseAccessGroupId created + Given a user with [an active profile in CCD] + When a request is prepared with appropriate values + And the request [contains correctly configured values] + And the request [contains some OrganisationPolicy fields with all correct values] + And the request [is of caseType where case_data has caseAccessGroupType of CCD:all-cases-access] + And it is submitted to call the [Submit case creation as Case worker (V2)] operation of [CCD Data Store] + Then a positive response is received + And the response has all other details as expected + And the response [contains updated values for data and data_classification] + + @S-1026.12 #AC-12 + Scenario: Invoke v2_external#/case-controller/createCaseUsingPOST and caseAccessGroupId not created when caseGroupType != CCD:all-cases-access + Given a user with [an active profile in CCD] + When a request is prepared with appropriate values + And the request [contains correctly configured values] + And the request [contains some OrganisationPolicy fields with all correct values] + And the request [is of caseType where caseAccessGroupType is not CCD:all-cases-access] + And it is submitted to call the [Submit case creation as Case worker (V2)] operation of [CCD Data Store] + Then a positive response is received + And the response has all other details as expected + And the response [contains updated values for data and data_classification] + + @S-1026.13 #AC-13 + Scenario: CaseAccessGroups field contains Invalid caseAccessGroupType value and Submit Case Creation Event is invoked on v2_external#/case-controller/createCaseUsingPOST + Given a user with [an active profile in CCD] + When a request is prepared with appropriate values + And the request [contains correctly configured values] + And the request [contains some OrganisationPolicy fields with all correct values] + And the request [is of caseType where caseAccessGroupType = CCD:all-cases-access], + And the request [caseData Organisation.OrganisationID value is empty value], + And it is submitted to call the [Submit case creation as Case worker (V2)] operation of [CCD Data Store] + Then a positive response is received + And the response has all other details as expected + And the response [contains updated values for data and data_classification] + + @S-1026.14 #AC-14 + Scenario: CaseAccessGroups field contains valid caseAccessGroupType value but case data invalid and Submit Case Creation Event is invoked on v2_external#/case-controller/createCaseUsingPOST + Given a user with [an active profile in CCD] + When a request is prepared with appropriate values + And the request [contains correctly configured values] + And the request [is of caseType where caseAccessGroupType = CCD:all-cases-access and -OrganisationPolicyField- CaseAssignedRoleField field exists in caseData and case data has Organisation.OrganisationID value not set to empty value but accessType does not have GroupRoleName] + And it is submitted to call the [Submit case creation as Case worker (V2)] operation of [CCD Data Store] + Then a positive response is received + And the response has all other details as expected + And the response [contains updated values for data and data_classification] + + @S-1026.15 #Testing Blank value + Scenario: Invoke v2_external#/case-controller/createCaseUsingPOST and caseAccessGroups field contains blank value + Given a user with [an active profile in CCD] + When a request is prepared with appropriate values + And the request [contains some OrganisationPolicy fields with all correct values] + And it is submitted to call the [Submit case creation as Case worker (V2)] operation of [CCD Data Store] + Then a positive response is received + And the response has all other details as expected + And the response [contains updated values for data and data_classification] + +#------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- +# v1_external#/case-details-endpoint/createCaseEventForCaseWorkerUsingPOST +#------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- + + @S-1026.16 #AC-16 #AC-05 of CCD-5324 + Scenario: Submit Event is invoked on v1_external#/case-details-endpoint/createCaseEventForCaseWorkerUsingPOST and caseAccessGroupId + Given a user with [an active profile in CCD] + And a successful call [to create a case] as in [F-1026_CreateCasePreRequisiteCaseworker] + And a successful call [to get an event token for the case just created] as in [S-1026-GetUpdateEventToken] + When a request is prepared with appropriate values + And the request [contains a case Id that has just been created as in F-1026_CreateCasePreRequisiteCaseworker] + And the request [contains an event token for the case just created above] + And the request [contains some OrganisationPolicy fields with all correct values] + And the request [is of caseType where case_data has caseAccessGroupType of CCD:all-cases-access] + And the request [specifying the case to be updated, as created in F-1026_CreateCasePreRequisiteCaseworker] + And it is submitted to call the [Submit event creation as Case worker] operation of [CCD Data Store] + Then a positive response is received + And the response has all other details as expected + +#------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- +# v1_external#/case-details-endpoint/createCaseEventForCitizenUsingPOST +#------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- + + @S-1026.17 #AC-17 #AC-06 of CCD-5324 + Scenario: Submit Event is invoked on v1_external#/case-details-endpoint/createCaseEventForCitizenUsingPOST and caseAccessGroupId + Given a user with [an active profile in CCD] + And a successful call [to create a case] as in [F-1026_CreateCasePreRequisiteCitizen] + + When a request is prepared with appropriate values + And the request [contains a case Id that has just been created as in F-1026_CreateCasePreRequisiteCitizen] + And the request [contains an event token for the case just created above] + And the request [contains some OrganisationPolicy fields with all correct values] + And the request [is of caseType where case_data has caseAccessGroupType of CCD:all-cases-access] + And the request [specifying the case to be updated, as created in F-1026_CreateCasePreRequisiteCitizen] + And it is submitted to call the [submit event creation as citizen] operation of [CCD Data Store] + + Then a positive response is received + And the response has all other details as expected + +#------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- +# v2_external#/case-controller/createEventUsingPOST +#------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- + + @S-1026.18 #AC-18 #AC-07 of CCD-5324 + Scenario: Submit Event is invoked on v2_external#/case-controller/createEventUsingPOST and caseAccessGroupId + Given a user with [an active profile in CCD] + And a successful call [to create a case] as in [F-1026_CreateCasePreRequisiteCaseworker] + + When a request is prepared with appropriate values + And the request [contains a case Id that has just been created as in F-1026_CreateCasePreRequisiteCaseworker] + And the request [contains an event token for the case just created above] + And the request [contains some OrganisationPolicy fields with all correct values] + And the request [is of caseType where case_data has caseAccessGroupType of CCD:all-cases-access] + And the request [specifying the case to be updated, as created in F-1026_CreateCasePreRequisiteCaseworker] + And it is submitted to call the [Submit event creation (v2_ext)] operation of [CCD Data Store] + + Then a positive response is received + And the response has all other details as expected + + + diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_CreateCasePreRequisiteCaseworker.td.json b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_CreateCasePreRequisiteCaseworker.td.json new file mode 100644 index 0000000000..286bef6401 --- /dev/null +++ b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_CreateCasePreRequisiteCaseworker.td.json @@ -0,0 +1,111 @@ +{ + "_guid_": "F-1026_CreateCasePreRequisiteCaseworker", + "_extends_": "Case_Creation_Data_Base", + "specs": [ + "to create a case", + "As a prerequisite" + ], + + "prerequisites" : [ { + "Token_Creation": "S-1026_GetCreateToken" + } + ], + + "users": { + "invokingUser": { + "_extends_": "BeftaMasterCaseworker" + } + }, + "request": { + "pathVariables": { + "jid": "BEFTA_MASTER", + "ctid": "FT_CaseAccessGroups_Align_Befta" + }, + "body": { + "data": { + "OrganisationPolicyField": { + "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyReference": "ref", + "Organisation": { + "OrganisationID": "orgID1", + "OrganisationName": "orgName1" + } + }, + "CaseAccessGroups": [] + }, + "event": { + "id": "createCase", + "summary": "", + "description": "" + }, + "event_token": "${[scenarioContext][childContexts][Token_Creation][testData][actualResponse][body][token]}" + } + }, + + "expectedResponse": { + "body": { + "id": "[[ANYTHING_PRESENT]]", + "jurisdiction": "BEFTA_MASTER", + "state" : "CaseCreated", + "case_type_id": "FT_CaseAccessGroups_Align_Befta", + "supplementary_data" : null, + "created_date": "[[ANYTHING_PRESENT]]", + "last_modified": "[[ANYTHING_PRESENT]]", + "last_state_modified_date": "[[ANYTHING_PRESENT]]", + "security_classification": "PUBLIC", + "case_data": { + "CaseAccessGroups": [ + { + "__ordering__": "ordered" + }, + { + "id": "[[ANY_STRING_NOT_NULLABLE]]", + "value": { + "caseAccessGroupType": "CCD:all-cases-access", + "caseAccessGroupId": "BEFTA_MASTER:orgID1" + } + }, + { + "id": "[[ANY_STRING_NOT_NULLABLE]]", + "value": { + "caseAccessGroupType": "CCD:all-cases-access", + "caseAccessGroupId": "BEFTA_MASTER:orgID1" + } + } + ], + "OrganisationPolicyField": { + "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyReference": "ref", + "Organisation": { + "OrganisationID": "orgID1", + "OrganisationName": "orgName1" + } + } + }, + "data_classification": { + "CaseAccessGroups" : { + "classification" : "PUBLIC", + "value" : [ + { + "__ordering__": "ordered" + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "PUBLIC", + "caseAccessGroupId" : "PUBLIC" + } + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "PUBLIC", + "caseAccessGroupId" : "PUBLIC" + } + } + ] + } + } + } + } +} diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_CreateCasePreRequisiteCitizen.td.json b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_CreateCasePreRequisiteCitizen.td.json new file mode 100644 index 0000000000..dce4fd6f79 --- /dev/null +++ b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_CreateCasePreRequisiteCitizen.td.json @@ -0,0 +1,118 @@ +{ + "_guid_": "F-1026_CreateCasePreRequisiteCitizen", + "_extends_": "Citizen_Case_Creation_Data_Base", + "specs": [ + "to create a case", + "As a prerequisite" + ], + + "prerequisites" : [ { + "Token_Creation": "S-1026_GetCitizenCreateToken" + } + ], + + "users": { + "invokingUser": { + "_extends_": "BeftaCitizen2" + } + }, + "request": { + "pathVariables": { + "uid": "[[DEFAULT_AUTO_VALUE]]", + "ctid": "FT_CaseAccessGroups_Align_Befta", + "jid": "BEFTA_MASTER" + }, + "body": { + "data": { + "OrganisationPolicyField": { + "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyReference": "ref", + "Organisation": { + "OrganisationID": "orgID1", + "OrganisationName": "orgName1" + } + }, + "CaseAccessGroups": [] + }, + "event": { + "id": "createCase", + "summary": "", + "description": "" + }, + "event_token": "${[scenarioContext][childContexts][Token_Creation][testData][actualResponse][body][token]}" + } + }, + + "expectedResponse": { + "body": { + "id": "[[ANYTHING_PRESENT]]", + "jurisdiction": "BEFTA_MASTER", + "state" : "CaseCreated", + "case_type_id": "FT_CaseAccessGroups_Align_Befta", + "version" : 0, + "created_date": "[[ANYTHING_PRESENT]]", + "last_modified": "[[ANYTHING_PRESENT]]", + "last_state_modified_date": "[[ANYTHING_PRESENT]]", + "security_classification": "PUBLIC", + "supplementary_data" : null, + "after_submit_callback_response" : null, + "callback_response_status_code" : null, + "callback_response_status" : null, + "delete_draft_response_status_code" : null, + "delete_draft_response_status" : null, + "case_data": { + "CaseAccessGroups": [ + { + "__ordering__": "ordered" + }, + { + "id": "[[ANY_STRING_NOT_NULLABLE]]", + "value": { + "caseAccessGroupType": "CCD:all-cases-access", + "caseAccessGroupId": "BEFTA_MASTER:orgID1" + } + }, + { + "id": "[[ANY_STRING_NOT_NULLABLE]]", + "value": { + "caseAccessGroupType": "CCD:all-cases-access", + "caseAccessGroupId": "BEFTA_MASTER:orgID1" + } + } + ], + "OrganisationPolicyField": { + "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyReference": "ref", + "Organisation": { + "OrganisationID": "orgID1", + "OrganisationName": "orgName1" + } + } + }, + "data_classification": { + "CaseAccessGroups" : { + "classification" : "PUBLIC", + "value" : [ + { + "__ordering__": "ordered" + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "PUBLIC", + "caseAccessGroupId" : "PUBLIC" + } + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "PUBLIC", + "caseAccessGroupId" : "PUBLIC" + } + } + ] + } + } + } + } +} diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_Test_Data_Base.td.json b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_Test_Data_Base.td.json new file mode 100644 index 0000000000..af40645f59 --- /dev/null +++ b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_Test_Data_Base.td.json @@ -0,0 +1,41 @@ +{ + "_guid_": "F-1026_Test_Data_Base", + "_extends_": "Case_Creation_Base", + + "users": { + "invokingUser": { + "_extends_": "BeftaMasterCaseworker" + } + }, + + "request": { + "pathVariables": { + "jid": "BEFTA_MASTER", + "ctid": "FT_CaseAccessGroups_Align_Befta" + } + }, + + "expectedResponse": { + "_extends_": "Common_201_Response", + "headers": { + "_extends_": "Common_Response_Headers" + }, + "body" : { + "id" : "[[ANYTHING_PRESENT]]", + "jurisdiction" : "BEFTA_MASTER", + "state" : "CaseCreated", + "case_type_id" : "FT_CaseAccessGroups_Align_Befta", + "version" : 0, + "created_date" : "[[ANY_STRING_NOT_NULLABLE]]", + "last_modified" : "[[ANY_STRING_NOT_NULLABLE]]", + "last_state_modified_date" : "[[ANY_STRING_NOT_NULLABLE]]", + "security_classification" : "PUBLIC", + "supplementary_data" : null, + "after_submit_callback_response" : null, + "callback_response_status_code" : null, + "callback_response_status" : null, + "delete_draft_response_status_code" : null, + "delete_draft_response_status" : null + } + } +} diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_Test_Data_Base_V2.td.json b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_Test_Data_Base_V2.td.json new file mode 100644 index 0000000000..808ae8bfb1 --- /dev/null +++ b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_Test_Data_Base_V2.td.json @@ -0,0 +1,23 @@ +{ + "_guid_": "F-1026_Test_Data_Base_V2", + "_extends_": "Case_Creation_V2_Data_Base", + + "request": { + "headers": { + "Content-Type": "application/vnd.uk.gov.hmcts.ccd-data-store-api.create-event.v2+json", + "experimental": true + }, + "pathVariables": { + "CaseTypeID": "FT_CaseAccessGroups_Align_Befta" + } + }, + + "expectedResponse": { + "body" : { + "_links" : "[[ANYTHING_PRESENT]]", + "jurisdiction" : "BEFTA_MASTER", + "case_type" : "FT_CaseAccessGroups_Align_Befta", + "state" : "CaseCreated" + } + } +} diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_Test_Data_Citizen_Base.td.json b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_Test_Data_Citizen_Base.td.json new file mode 100644 index 0000000000..22c20eecc5 --- /dev/null +++ b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_Test_Data_Citizen_Base.td.json @@ -0,0 +1,41 @@ +{ + "_guid_": "F-1026_Test_Data_Citizen_Base", + "_extends_": "Citizen_Case_Creation_Data_Base", + + "users": { + "invokingUser": { + "_extends_": "BeftaCitizen2" + } + }, + + "request": { + "pathVariables": { + "jid": "BEFTA_MASTER", + "ctid": "FT_CaseAccessGroups_Align_Befta" + } + }, + + "expectedResponse": { + "_extends_": "Common_201_Response", + "headers": { + "_extends_": "Common_Response_Headers" + }, + "body" : { + "id" : "[[ANYTHING_PRESENT]]", + "jurisdiction" : "BEFTA_MASTER", + "state" : "CaseCreated", + "case_type_id" : "FT_CaseAccessGroups_Align_Befta", + "version" : 0, + "created_date" : "[[ANY_STRING_NOT_NULLABLE]]", + "last_modified" : "[[ANY_STRING_NOT_NULLABLE]]", + "last_state_modified_date" : "[[ANY_STRING_NOT_NULLABLE]]", + "security_classification" : "PUBLIC", + "supplementary_data" : null, + "after_submit_callback_response" : null, + "callback_response_status_code" : null, + "callback_response_status" : null, + "delete_draft_response_status_code" : null, + "delete_draft_response_status" : null + } + } +} diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_Test_Data_Event_Caseworker.td.json b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_Test_Data_Event_Caseworker.td.json new file mode 100644 index 0000000000..130429dfaa --- /dev/null +++ b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_Test_Data_Event_Caseworker.td.json @@ -0,0 +1,39 @@ +{ + "_guid_": "F-1026_Test_Data_Event_Caseworker", + "_extends_": "Event_Creation_Caseworker_Base", + + "users": { + "invokingUser": { + "_extends_": "BeftaMasterCaseworker" + } + }, + + "expectedResponse": { + "_extends_": "Common_201_Response", + "headers": { + "_extends_": "Common_Response_Headers" + }, + "body" : { + "id" : "OVERRIDE", + "jurisdiction" : "BEFTA_MASTER", + "case_type_id" : "FT_CaseAccessGroups_Align_Befta", + "state" : "CaseUpdated", + "version" : 1, + "created_date" : "[[ANY_STRING_NOT_NULLABLE]]", + "last_modified" : "[[ANY_STRING_NOT_NULLABLE]]", + "last_state_modified_date" : "[[ANY_STRING_NOT_NULLABLE]]", + "security_classification" : "PUBLIC", + "supplementary_data" : null, + "after_submit_callback_response" : null, + "callback_response_status_code" : null, + "callback_response_status" : null, + "delete_draft_response_status_code" : null, + "delete_draft_response_status" : null, + + "case_data" : { + }, + "data_classification": { + } + } + } +} diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_Test_Data_Event_Citizen.td.json b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_Test_Data_Event_Citizen.td.json new file mode 100644 index 0000000000..3d363ed9f7 --- /dev/null +++ b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_Test_Data_Event_Citizen.td.json @@ -0,0 +1,18 @@ +{ + "_guid_": "F-1026_Test_Data_Event_Citizen", + "_extends_": "Event_Creation_Citizen_Base", + + "users": { + "invokingUser": { + "_extends_": "BeftaCitizen2" + } + }, + + "request": { + "pathVariables": { + "jid": "BEFTA_MASTER", + "ctid": "FT_CaseAccessGroups_Align_Befta", + "cid": "${[scenarioContext][childContexts][F-1026_CreateCasePreRequisiteCitizen][testData][actualResponse][body][id]}" + } + } +} diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026-GetUpdateEventToken.td.json b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026-GetUpdateEventToken.td.json new file mode 100644 index 0000000000..d3ef765e77 --- /dev/null +++ b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026-GetUpdateEventToken.td.json @@ -0,0 +1,30 @@ +{ + "title": "should create an event token for correct inputs", + "_guid_": "S-1026-GetUpdateEventToken", + "_extends_": "Token_Creation_Data_For_Master_Caseworker_Case_Creation", + + "users": { + "invokingUser": { + "_extends_": "BeftaMasterCaseworker" + } + }, + + "request": { + "pathVariables": { + "cid": "${[scenarioContext][siblingContexts][F-1026_CreateCasePreRequisiteCaseworker][testData][actualResponse][body][id]}" + } + }, + + "expectedResponse": { + "_extends_": "Common_200_Response", + "headers": { + "Content-Encoding": "gzip", + "Content-Length": "[[ANYTHING_PRESENT]]" + }, + "body": { + "token": "[[ANYTHING_PRESENT]]", + "case_details": "[[ANYTHING_PRESENT]]", + "event_id": "updateCase" + } + } +} diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.1.td.json b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.1.td.json new file mode 100644 index 0000000000..2a3384b413 --- /dev/null +++ b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.1.td.json @@ -0,0 +1,118 @@ +{ + "_guid_": "S-1026.1", + "_extends_": "F-1026_Test_Data_Base", + "title": "Invoke saveCaseDetailsForCaseWorkerUsingPOST and caseAccessGroupId created", + + "prerequisites" : [ { + "Token_Creation": "S-1026_GetCreateToken" + } + ], + "specs": [ + "an active profile in CCD", + "contains some OrganisationPolicy fields with all correct values", + "is of caseType where case_data has caseAccessGroupType of CCD:all-cases-access", + "Submit case creation as Case worker", + "contains correctly configured values", + "contains updated values for case_data and data_classification" + ], + "request": { + "body": { + "data": { + "OrganisationPolicyField": { + "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyReference": "ref", + "Organisation": { + "OrganisationID": "orgID1", + "OrganisationName": "orgName1" + } + }, + "CaseAccessGroups" : [ { + "value" : { + "caseAccessGroupType" : "CCD:all-cases-access", + "caseAccessGroupId" : "test" + }, + "id" : null + } ] + }, + "event": { + "id": "createCase" + }, + "event_token": "${[scenarioContext][childContexts][Token_Creation][testData][actualResponse][body][token]}" + } + }, + "expectedResponse": { + "_extends_": "Common_201_Response", + "headers": { + "Content-Encoding": "gzip", + "vary": "accept-encoding", + "Content-Length": "[[ANYTHING_PRESENT]]" + }, + "body": { + "id": "[[ANYTHING_PRESENT]]", + "jurisdiction": "BEFTA_MASTER", + "case_type_id": "FT_CaseAccessGroups_Align_Befta", + "created_date": "[[ANYTHING_PRESENT]]", + "last_modified": "[[ANYTHING_PRESENT]]", + "last_state_modified_date": "[[ANYTHING_PRESENT]]", + "security_classification": "PUBLIC", + "case_data": { + "CaseAccessGroups": [ + { + "__ordering__": "ordered" + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "CCD:all-cases-access", + "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + } + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "CCD:all-cases-access", + "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + } + } + ], + "OrganisationPolicyField" : { + "OrgPolicyCaseAssignedRole" : "GroupRole1", + "OrgPolicyReference" : "ref", + "Organisation" : { + "OrganisationID" : "orgID1", + "OrganisationName" : "orgName1" + } + } + }, + "data_classification": { + "CaseAccessGroups": { + "classification": "PUBLIC", + "value": [ + { + "__ordering__": "ordered" + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "PUBLIC", + "caseAccessGroupId" : "PUBLIC" + } + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "PUBLIC", + "caseAccessGroupId" : "PUBLIC" + } + }] + } + }, + "supplementary_data": null, + "after_submit_callback_response": null, + "callback_response_status_code": null, + "callback_response_status": null, + "delete_draft_response_status_code": null, + "delete_draft_response_status": null + } + } +} diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.10.td.json b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.10.td.json new file mode 100644 index 0000000000..26a8811429 --- /dev/null +++ b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.10.td.json @@ -0,0 +1,114 @@ +{ + "_guid_": "S-1026.10", + "_extends_": "F-1026_Test_Data_Citizen_Base", + "title": "Invoke saveCaseDetailsForCaseWorkerUsingPOST and caseAccessGroups field contains blank value", + "prerequisites": [ + { + "Token_Creation": "S-1026_GetCitizenCreateToken" + } + ], + "specs": [ + "an active profile in CCD", + "contains some OrganisationPolicy fields with all correct values", + "Submit case creation as Citizen", + "contains updated values for case_data and data_classification" + ], + "request": { + "body": { + "data": { + "OrganisationPolicyField": { + "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyReference": "ref", + "Organisation": { + "OrganisationID": "orgID1", + "OrganisationName": "orgName1" + } + }, + "CaseAccessGroups": [] + }, + "event": { + "id": "createCase" + }, + "event_token": "${[scenarioContext][childContexts][Token_Creation][testData][actualResponse][body][token]}", + "event_data": { + "id": null + } + } + }, + "expectedResponse": { + "_extends_": "Common_201_Response", + "headers": { + "Content-Encoding": "gzip", + "vary": "accept-encoding", + "Content-Length": "[[ANYTHING_PRESENT]]" + }, + "body": { + "id": "[[ANYTHING_PRESENT]]", + "jurisdiction": "BEFTA_MASTER", + "case_type_id": "FT_CaseAccessGroups_Align_Befta", + "created_date": "[[ANYTHING_PRESENT]]", + "last_modified": "[[ANYTHING_PRESENT]]", + "last_state_modified_date": "[[ANYTHING_PRESENT]]", + "security_classification": "PUBLIC", + "case_data": { + "CaseAccessGroups": [ + { + "__ordering__": "ordered" + }, + { + "id": "[[ANY_STRING_NOT_NULLABLE]]", + "value": { + "caseAccessGroupType": "CCD:all-cases-access", + "caseAccessGroupId": "BEFTA_MASTER:orgID1" + } + }, + { + "id": "[[ANY_STRING_NOT_NULLABLE]]", + "value": { + "caseAccessGroupType": "CCD:all-cases-access", + "caseAccessGroupId": "BEFTA_MASTER:orgID1" + } + } + ], + "OrganisationPolicyField": { + "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyReference": "ref", + "Organisation": { + "OrganisationID": "orgID1", + "OrganisationName": "orgName1" + } + } + }, + "data_classification": { + "CaseAccessGroups" : { + "classification" : "PUBLIC", + "value" : [ + { + "__ordering__": "ordered" + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "PUBLIC", + "caseAccessGroupId" : "PUBLIC" + } + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "PUBLIC", + "caseAccessGroupId" : "PUBLIC" + } + } + ] + } + } + }, + "supplementary_data": null, + "after_submit_callback_response": null, + "callback_response_status_code": null, + "callback_response_status": null, + "delete_draft_response_status_code": null, + "delete_draft_response_status": null + } +} diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.11.td.json b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.11.td.json new file mode 100644 index 0000000000..ccd48900b0 --- /dev/null +++ b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.11.td.json @@ -0,0 +1,117 @@ +{ + "_guid_": "S-1026.11", + "_extends_": "F-1026_Test_Data_Base_V2", + "title": "Invoke v2_external#/case-controller/createCaseUsingPOST and caseAccessGroupId created", + + "prerequisites" : [ { + "Token_Creation": "S-1026_GetCreateToken" + } + ], + "specs": [ + "an active profile in CCD", + "contains some OrganisationPolicy fields with all correct values", + "is of caseType where case_data has caseAccessGroupType of CCD:all-cases-access", + "Submit case creation as Case worker (V2)", + "contains correctly configured values", + "contains updated values for data and data_classification" + ], + "request": { + "body": { + "data": { + "OrganisationPolicyField": { + "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyReference": "ref", + "Organisation": { + "OrganisationID": "orgID1", + "OrganisationName": "orgName1" + } + }, + "CaseAccessGroups" : [ { + "value" : { + "caseAccessGroupType" : "CCD:all-cases-access", + "caseAccessGroupId" : "test" + }, + "id" : null + } ] + }, + "event": { + "id": "createCase" + }, + "event_token": "${[scenarioContext][childContexts][Token_Creation][testData][actualResponse][body][token]}" + } + }, + "expectedResponse": { + "_extends_": "Common_201_Response", + "headers": { + "Content-Encoding": "gzip", + "vary": "accept-encoding", + "Content-Length": "[[ANYTHING_PRESENT]]" + }, + "body": { + "_links" : "[[ANYTHING_PRESENT]]", + "id": "[[ANYTHING_PRESENT]]", + "jurisdiction": "BEFTA_MASTER", + "created_on": "[[ANYTHING_PRESENT]]", + "last_modified_on": "[[ANYTHING_PRESENT]]", + "last_state_modified_on": "[[ANYTHING_PRESENT]]", + "security_classification": "PUBLIC", + "data": { + "CaseAccessGroups": [ + { + "__ordering__": "ordered" + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "CCD:all-cases-access", + "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + } + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "CCD:all-cases-access", + "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + } + } + ], + "OrganisationPolicyField" : { + "OrgPolicyCaseAssignedRole" : "GroupRole1", + "OrgPolicyReference" : "ref", + "Organisation" : { + "OrganisationID" : "orgID1", + "OrganisationName" : "orgName1" + } + } + }, + "data_classification": { + "CaseAccessGroups": { + "classification": "PUBLIC", + "value": [ + { + "__ordering__": "ordered" + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "PUBLIC", + "caseAccessGroupId" : "PUBLIC" + } + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "PUBLIC", + "caseAccessGroupId" : "PUBLIC" + } + }] + } + }, + "after_submit_callback_response": null, + "callback_response_status_code": null, + "callback_response_status": null, + "delete_draft_response_status_code": null, + "delete_draft_response_status": null + } + } +} diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.12.td.json b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.12.td.json new file mode 100644 index 0000000000..b546347aea --- /dev/null +++ b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.12.td.json @@ -0,0 +1,132 @@ +{ + "_guid_": "S-1026.12", + "_extends_": "F-1026_Test_Data_Base_V2", + "title": "Invoke v2_external#/case-controller/createCaseUsingPOST and caseAccessGroupId not created when caseGroupType != CCD:all-cases-access", + + "prerequisites" : [ { + "Token_Creation": "S-1026_GetCreateToken" + } + ], + "specs": [ + "an active profile in CCD", + "contains some OrganisationPolicy fields with all correct values", + "is of caseType where caseAccessGroupType is not CCD:all-cases-access", + "Submit case creation as Case worker (V2)", + "contains correctly configured values", + "contains updated values for data and data_classification" + + ], + "request": { + "body": { + "data": { + "OrganisationPolicyField": { + "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyReference": "ref", + "Organisation": { + "OrganisationID": "orgID1", + "OrganisationName": "orgName1" + } + }, + "CaseAccessGroups" : [ { + "value" : { + "caseAccessGroupType" : "some thing else", + "caseAccessGroupId" : "test" + }, + "id" : null + } ] + }, + "event": { + "id": "createCase" + }, + "event_token": "${[scenarioContext][childContexts][Token_Creation][testData][actualResponse][body][token]}" + } + }, + "expectedResponse": { + "_extends_": "Common_201_Response", + "headers": { + "Content-Encoding": "gzip", + "vary": "accept-encoding", + "Content-Length": "[[ANYTHING_PRESENT]]" + }, + "body": { + "_links" : "[[ANYTHING_PRESENT]]", + "id": "[[ANYTHING_PRESENT]]", + "jurisdiction": "BEFTA_MASTER", + "created_on": "[[ANYTHING_PRESENT]]", + "last_modified_on": "[[ANYTHING_PRESENT]]", + "last_state_modified_on": "[[ANYTHING_PRESENT]]", + "security_classification": "PUBLIC", + "data": { + "CaseAccessGroups": [ + { + "__ordering__": "ordered" + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "some thing else", + "caseAccessGroupId" : "test" + } + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "CCD:all-cases-access", + "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + } + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "CCD:all-cases-access", + "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + } + }], + "OrganisationPolicyField" : { + "OrgPolicyCaseAssignedRole" : "GroupRole1", + "OrgPolicyReference" : "ref", + "Organisation" : { + "OrganisationID" : "orgID1", + "OrganisationName" : "orgName1" + } + } + }, + "data_classification" : { + "CaseAccessGroups" : { + "classification" : "PUBLIC", + "value" : [ + { + "__ordering__": "ordered" + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "PUBLIC", + "caseAccessGroupId" : "PUBLIC" + } + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "PUBLIC", + "caseAccessGroupId" : "PUBLIC" + } + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "PUBLIC", + "caseAccessGroupId" : "PUBLIC" + } + } + ] + } + } + }, + "after_submit_callback_response": null, + "callback_response_status_code": null, + "callback_response_status": null, + "delete_draft_response_status_code": null, + "delete_draft_response_status": null + } +} diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.13.td.json b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.13.td.json new file mode 100644 index 0000000000..3d5a374d6a --- /dev/null +++ b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.13.td.json @@ -0,0 +1,80 @@ +{ + "_guid_": "S-1026.13", + "_extends_": "F-1026_Test_Data_Base_V2", + "title": "Invoke v2_external#/case-controller/createCaseUsingPOST and caseAccessGroupId created", + + "prerequisites" : [ { + "Token_Creation": "S-1026_GetCreateToken" + } + ], + "specs": [ + "an active profile in CCD", + "contains some OrganisationPolicy fields with all correct values", + "is of caseType where caseAccessGroupType = CCD:all-cases-access", + "caseData Organisation.OrganisationID value is empty value", + "Submit case creation as Case worker (V2)", + "contains correctly configured values", + "contains updated values for data and data_classification" + + ], + "request": { + "body": { + "data": { + "OrganisationPolicyField": { + "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyReference": "ref", + "Organisation": { + "OrganisationID": "", + "OrganisationName": "orgName1" + } + }, + "CaseAccessGroups": [ + { + "value": { + "caseAccessGroupId": "test", + "caseAccessGroupType": "CCD:all-cases-access" + }, + "id": null + } + ] + }, + "event": { + "id": "createCase" + }, + "event_token": "${[scenarioContext][childContexts][Token_Creation][testData][actualResponse][body][token]}" + } + }, + "expectedResponse": { + "_extends_": "Common_201_Response", + "headers": { + "Content-Encoding": "gzip", + "vary": "accept-encoding", + "Content-Length": "[[ANYTHING_PRESENT]]" + }, + "body": { + "_links" : "[[ANYTHING_PRESENT]]", + "id": "[[ANYTHING_PRESENT]]", + "jurisdiction": "BEFTA_MASTER", + "created_on": "[[ANYTHING_PRESENT]]", + "last_modified_on": "[[ANYTHING_PRESENT]]", + "last_state_modified_on": "[[ANYTHING_PRESENT]]", + "security_classification": "PUBLIC", + "data": { + "OrganisationPolicyField": { + "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyReference": "ref", + "Organisation": { + "OrganisationID": "", + "OrganisationName": "orgName1" + } + } + }, + "data_classification" : {} + }, + "after_submit_callback_response": null, + "callback_response_status_code": null, + "callback_response_status": null, + "delete_draft_response_status_code": null, + "delete_draft_response_status": null + } +} diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.14.td.json b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.14.td.json new file mode 100644 index 0000000000..ca2a040b3b --- /dev/null +++ b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.14.td.json @@ -0,0 +1,90 @@ +{ + "_guid_": "S-1026.14", + "_extends_": "F-1026_Test_Data_Base_V2", + "title": "Invoke v2_external#/case-controller/createCaseUsingPOST and caseAccessGroupId created", + + "prerequisites" : [ { + "Token_Creation": "S-1026_GetCreateToken" + } + ], + "specs": [ + "an active profile in CCD", + "contains some OrganisationPolicy fields with all correct values", + "is of caseType where caseAccessGroupType = CCD:all-cases-access and -OrganisationPolicyField- CaseAssignedRoleField field exists in caseData and case data has Organisation.OrganisationID value not set to empty value but accessType does not have GroupRoleName", + "Submit case creation as Case worker (V2)", + "contains correctly configured values", + "contains updated values for data and data_classification" + + ], + "request": { + "body": { + "data": { + "OrganisationPolicyField": { + "OrgPolicyCaseAssignedRole": "GroupRole2", + "OrgPolicyReference": "ref", + "Organisation": { + "OrganisationID": "orgID1", + "OrganisationName": "orgName1" + } + }, + "CaseAccessGroups": [ + { + "value": { + "caseAccessGroupId": "test", + "caseAccessGroupType": "CCD:all-cases-access" + }, + "id": null + } + ] + }, + "event": { + "id": "createCase" + }, + "event_token": "${[scenarioContext][childContexts][Token_Creation][testData][actualResponse][body][token]}", + "event_data": { + "CaseAccessGroups": [ + { + "value": { + "caseAccessGroupId": "test", + "caseAccessGroupType": "CCD:all-cases-access" + }, + "id": null + } + ] + } + } + }, + "expectedResponse": { + "_extends_": "Common_201_Response", + "headers": { + "Content-Encoding": "gzip", + "vary": "accept-encoding", + "Content-Length": "[[ANYTHING_PRESENT]]" + }, + "body": { + "_links" : "[[ANYTHING_PRESENT]]", + "id": "[[ANYTHING_PRESENT]]", + "jurisdiction": "BEFTA_MASTER", + "created_on": "[[ANYTHING_PRESENT]]", + "last_modified_on": "[[ANYTHING_PRESENT]]", + "last_state_modified_on": "[[ANYTHING_PRESENT]]", + "security_classification": "PUBLIC", + "data": { + "OrganisationPolicyField" : { + "OrgPolicyCaseAssignedRole" : "GroupRole2", + "OrgPolicyReference" : "ref", + "Organisation" : { + "OrganisationID" : "orgID1", + "OrganisationName" : "orgName1" + } + } + }, + "data_classification" : {} + }, + "after_submit_callback_response": null, + "callback_response_status_code": null, + "callback_response_status": null, + "delete_draft_response_status_code": null, + "delete_draft_response_status": null + } +} diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.15.td.json b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.15.td.json new file mode 100644 index 0000000000..b63e4e20c4 --- /dev/null +++ b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.15.td.json @@ -0,0 +1,113 @@ +{ + "_guid_": "S-1026.15", + "_extends_": "F-1026_Test_Data_Base_V2", + "title": "Invoke v2_external#/case-controller/createCaseUsingPOST and caseAccessGroups field contains blank value", + "prerequisites": [ + { + "Token_Creation": "S-1026_GetCreateToken" + } + ], + "specs": [ + "an active profile in CCD", + "contains some OrganisationPolicy fields with all correct values", + "Submit case creation as Case worker (V2)", + "contains updated values for data and data_classification" + ], + "request": { + "body": { + "data": { + "OrganisationPolicyField": { + "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyReference": "ref", + "Organisation": { + "OrganisationID": "orgID1", + "OrganisationName": "orgName1" + } + }, + "CaseAccessGroups": [] + }, + "event": { + "id": "createCase" + }, + "event_token": "${[scenarioContext][childContexts][Token_Creation][testData][actualResponse][body][token]}", + "event_data": { + "id": null + } + } + }, + "expectedResponse": { + "_extends_": "Common_201_Response", + "headers": { + "Content-Encoding": "gzip", + "vary": "accept-encoding", + "Content-Length": "[[ANYTHING_PRESENT]]" + }, + "body": { + "_links" : "[[ANYTHING_PRESENT]]", + "id": "[[ANYTHING_PRESENT]]", + "jurisdiction": "BEFTA_MASTER", + "created_on": "[[ANYTHING_PRESENT]]", + "last_modified_on": "[[ANYTHING_PRESENT]]", + "last_state_modified_on": "[[ANYTHING_PRESENT]]", + "security_classification": "PUBLIC", + "data": { + "CaseAccessGroups": [ + { + "__ordering__": "ordered" + }, + { + "id": "[[ANY_STRING_NOT_NULLABLE]]", + "value": { + "caseAccessGroupType": "CCD:all-cases-access", + "caseAccessGroupId": "BEFTA_MASTER:orgID1" + } + }, + { + "id": "[[ANY_STRING_NOT_NULLABLE]]", + "value": { + "caseAccessGroupType": "CCD:all-cases-access", + "caseAccessGroupId": "BEFTA_MASTER:orgID1" + } + } + ], + "OrganisationPolicyField": { + "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyReference": "ref", + "Organisation": { + "OrganisationID": "orgID1", + "OrganisationName": "orgName1" + } + } + }, + "data_classification": { + "CaseAccessGroups" : { + "classification" : "PUBLIC", + "value" : [ + { + "__ordering__": "ordered" + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "PUBLIC", + "caseAccessGroupId" : "PUBLIC" + } + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "PUBLIC", + "caseAccessGroupId" : "PUBLIC" + } + } + ] + } + } + }, + "after_submit_callback_response": null, + "callback_response_status_code": null, + "callback_response_status": null, + "delete_draft_response_status_code": null, + "delete_draft_response_status": null + } +} diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.16.td.json b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.16.td.json new file mode 100644 index 0000000000..9c90b0d2c7 --- /dev/null +++ b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.16.td.json @@ -0,0 +1,130 @@ +{ + "_guid_": "S-1026.16", + "_extends_": "F-1026_Test_Data_Event_Caseworker", + + "title": "CaseAccessGroups does not exist at present and caseAccessGroupId", + "prerequisites" : [ { + "Token_Creation": "S-1026_GetUpdateTokenCaseworker" + } + ], + + "specs": [ + "an active profile in CCD", + "contains a case Id that has just been created as in F-1026_CreateCasePreRequisiteCaseworker", + "contains an event token for the case just created above", + "contains some OrganisationPolicy fields with all correct values", + "is of caseType where case_data has caseAccessGroupType of CCD:all-cases-access", + "contains correctly configured CaseAccessGroups field in F-1026_CreateCasePreRequisiteCaseworker", + "specifying the case to be updated, as created in F-1026_CreateCasePreRequisiteCaseworker" + ], + + "request": { + "pathVariables": { + "ctid" : "FT_CaseAccessGroups_Align_Befta", + "cid": "${[scenarioContext][childContexts][F-1026_CreateCasePreRequisiteCaseworker][testData][actualResponse][body][id]}" + }, + "headers": { + "_extends_": "Common_Request_Headers" + }, + "body": { + "data": { + "OrganisationPolicyField": { + "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyReference": "ref", + "Organisation": { + "OrganisationID": "orgID1", + "OrganisationName": "orgName1" + } + }, + "CaseAccessGroups" : [ { + "value" : { + "caseAccessGroupType" : "CCD:all-cases-access", + "caseAccessGroupId" : "test" + }, + "id" : null + } ] + }, + "event": { + "id": "updateCase", + "summary": "", + "description": "" + }, + "security_classification": "PUBLIC", + "event_token" : "${[scenarioContext][childContexts][Token_Creation][testData][actualResponse][body][token]}", + "ignore_warning": true + } + }, + + "expectedResponse": { + "_extends_": "Common_201_Response", + "body" : { + "id" : "[[ANYTHING_PRESENT]]", + "jurisdiction" : "BEFTA_MASTER", + "state" : "CaseUpdated", + "version" : 1, + "case_type_id" : "FT_CaseAccessGroups_Align_Befta", + "created_date" : "[[ANYTHING_PRESENT]]", + "last_modified" : "[[ANYTHING_PRESENT]]", + "last_state_modified_date" : "[[ANYTHING_PRESENT]]", + "security_classification" : "PUBLIC", + "case_data": { + "CaseAccessGroups": [ + { + "__ordering__": "ordered" + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "CCD:all-cases-access", + "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + } + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "CCD:all-cases-access", + "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + } + } + ], + "OrganisationPolicyField" : { + "OrgPolicyCaseAssignedRole" : "GroupRole1", + "OrgPolicyReference" : "ref", + "Organisation" : { + "OrganisationID" : "orgID1", + "OrganisationName" : "orgName1" + } + } + }, + "data_classification": { + "CaseAccessGroups": { + "classification": "PUBLIC", + "value": [ + { + "__ordering__": "ordered" + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "PUBLIC", + "caseAccessGroupId" : "PUBLIC" + } + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "PUBLIC", + "caseAccessGroupId" : "PUBLIC" + } + }] + } + }, + "supplementary_data" : null, + "after_submit_callback_response" : null, + "callback_response_status_code" : null, + "callback_response_status" : null, + "delete_draft_response_status_code" : null, + "delete_draft_response_status" : null + } + } +} diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.17.td.json b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.17.td.json new file mode 100644 index 0000000000..43337b66bf --- /dev/null +++ b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.17.td.json @@ -0,0 +1,133 @@ +{ + "_guid_": "S-1026.17", + "_extends_": "F-1026_Test_Data_Event_Citizen", + + "title": "Submit Event Creation is invoked on on v1_external#/case-details-endpoint/createCaseEventForCitizenUsingPOST", + + "prerequisites" : [ { + "Token_Creation": "S-1026_GetUpdateTokenCitizen" + } + ], + + "specs": [ + "an active profile in CCD", + "contains a case Id that has just been created as in F-1026_CreateCasePreRequisiteCitizen", + "contains an event token for the case just created above", + "contains some OrganisationPolicy fields with all correct values", + "is of caseType where case_data has caseAccessGroupType of CCD:all-cases-access", + "contains correctly configured CaseAccessGroups field in F-1026_CreateCasePreRequisiteCitizen", + "specifying the case to be updated, as created in F-1026_CreateCasePreRequisiteCitizen" + ], + + "request": { + "pathVariables": { + "jid" : "BEFTA_MASTER", + "ctid" : "FT_CaseAccessGroups_Align_Befta", + "cid": "${[scenarioContext][childContexts][F-1026_CreateCasePreRequisiteCitizen][testData][actualResponse][body][id]}" + }, + "headers": { + "_extends_": "Common_Request_Headers" + }, + "body": { + "data": { + "OrganisationPolicyField": { + "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyReference": "ref", + "Organisation": { + "OrganisationID": "orgID1", + "OrganisationName": "orgName1" + } + }, + "CaseAccessGroups" : [ { + "value" : { + "caseAccessGroupType" : "CCD:all-cases-access", + "caseAccessGroupId" : "test" + }, + "id" : null + } ] + }, + "event": { + "id": "updateCase", + "summary": "", + "description": "" + }, + "security_classification": "PUBLIC", + "event_token" : "${[scenarioContext][childContexts][Token_Creation][testData][actualResponse][body][token]}", + "ignore_warning": true + } + }, + + "expectedResponse": { + "_extends_": "Common_201_Response", + "body" : { + "id" : "[[ANYTHING_PRESENT]]", + "jurisdiction" : "BEFTA_MASTER", + "state" : "CaseUpdated", + "version" : 1, + "case_type_id" : "FT_CaseAccessGroups_Align_Befta", + "created_date" : "[[ANYTHING_PRESENT]]", + "last_modified" : "[[ANYTHING_PRESENT]]", + "last_state_modified_date" : "[[ANYTHING_PRESENT]]", + "security_classification" : "PUBLIC", + "case_data": { + "CaseAccessGroups": [ + { + "__ordering__": "ordered" + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "CCD:all-cases-access", + "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + } + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "CCD:all-cases-access", + "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + } + } + ], + "OrganisationPolicyField" : { + "OrgPolicyCaseAssignedRole" : "GroupRole1", + "OrgPolicyReference" : "ref", + "Organisation" : { + "OrganisationID" : "orgID1", + "OrganisationName" : "orgName1" + } + } + }, + "data_classification": { + "CaseAccessGroups": { + "classification": "PUBLIC", + "value": [ + { + "__ordering__": "ordered" + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "PUBLIC", + "caseAccessGroupId" : "PUBLIC" + } + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "PUBLIC", + "caseAccessGroupId" : "PUBLIC" + } + }] + } + }, + "supplementary_data" : null, + "after_submit_callback_response" : null, + "callback_response_status_code" : null, + "callback_response_status" : null, + "delete_draft_response_status_code" : null, + "delete_draft_response_status" : null + } + } + +} diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.18.td.json b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.18.td.json new file mode 100644 index 0000000000..1854c3d2e4 --- /dev/null +++ b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.18.td.json @@ -0,0 +1,122 @@ +{ + "_guid_": "S-1026.18", + "_extends_": "SubmitEvent_v2Ext__PositiveResponse_Base", + + "title": "Submit Event Creation is invoked on v2_external#/case-controller/createEventUsingPOST and caseAccessGroupId", + + "prerequisites" : [ { + "Token_Creation": "S-1026_GetUpdateTokenCaseworker" + } + ], + + "specs": [ + "an active profile in CCD", + "contains a case Id that has just been created as in F-1026_CreateCasePreRequisiteCaseworker", + "contains an event token for the case just created above", + "contains some OrganisationPolicy fields with all correct values", + "is of caseType where case_data has caseAccessGroupType of CCD:all-cases-access", + "contains correctly configured CaseAccessGroups field in F-1026_CreateCasePreRequisiteCaseworker", + "specifying the case to be updated, as created in F-1026_CreateCasePreRequisiteCaseworker" + ], + + "users": { + "invokingUser": { + "_extends_": "BeftaMasterCaseworker" + } + }, + + "request": { + "pathVariables": { + "cid": "${[scenarioContext][childContexts][F-1026_CreateCasePreRequisiteCaseworker][testData][actualResponse][body][id]}" + }, + "body": { + "data": { + "OrganisationPolicyField": { + "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyReference": "ref", + "Organisation": { + "OrganisationID": "orgID1", + "OrganisationName": "orgName1" + } + }, + "CaseAccessGroups" : [ { + "value" : { + "caseAccessGroupType" : "CCD:all-cases-access", + "caseAccessGroupId" : "test" + }, + "id" : null + } ] + }, + "event": { + "id": "updateCase", + "summary": "", + "description": "" + }, + "event_token" : "${[scenarioContext][childContexts][Token_Creation][testData][actualResponse][body][token]}" + } + }, + + "expectedResponse": { + "body" : { + "id" : "[[ANYTHING_PRESENT]]", + + "jurisdiction" : "BEFTA_MASTER", + "case_type" : "FT_CaseAccessGroups_Align_Befta", + + "state" : "CaseUpdated", + + "data" : { + "CaseAccessGroups": [ + { + "__ordering__": "ordered" + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "CCD:all-cases-access", + "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + } + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "CCD:all-cases-access", + "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + } + } + ], + "OrganisationPolicyField" : { + "OrgPolicyCaseAssignedRole" : "GroupRole1", + "OrgPolicyReference" : "ref", + "Organisation" : { + "OrganisationID" : "orgID1", + "OrganisationName" : "orgName1" + } + } + }, + "data_classification": { + "CaseAccessGroups": { + "classification": "PUBLIC", + "value": [ + { + "__ordering__": "ordered" + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "PUBLIC", + "caseAccessGroupId" : "PUBLIC" + } + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "PUBLIC", + "caseAccessGroupId" : "PUBLIC" + } + }] + } + } + } + } +} diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.2.td.json b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.2.td.json new file mode 100644 index 0000000000..3339643ebf --- /dev/null +++ b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.2.td.json @@ -0,0 +1,133 @@ +{ + "_guid_": "S-1026.2", + "_extends_": "F-1026_Test_Data_Base", + "title": "Invoke saveCaseDetailsForCaseWorkerUsingPOST and caseAccessGroupId not created when caseGroupType != CCD:all-cases-access", + + "prerequisites" : [ { + "Token_Creation": "S-1026_GetCreateToken" + } + ], + "specs": [ + "an active profile in CCD", + "contains some OrganisationPolicy fields with all correct values", + "is of caseType where caseAccessGroupType is not CCD:all-cases-access", + "Submit case creation as Case worker", + "contains correctly configured values", + "contains updated values for case_data and data_classification" + + ], + "request": { + "body": { + "data": { + "OrganisationPolicyField": { + "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyReference": "ref", + "Organisation": { + "OrganisationID": "orgID1", + "OrganisationName": "orgName1" + } + }, + "CaseAccessGroups" : [ { + "value" : { + "caseAccessGroupType" : "some thing else", + "caseAccessGroupId" : "test" + }, + "id" : null + } ] + }, + "event": { + "id": "createCase" + }, + "event_token": "${[scenarioContext][childContexts][Token_Creation][testData][actualResponse][body][token]}" + } + }, + "expectedResponse": { + "_extends_": "Common_201_Response", + "headers": { + "Content-Encoding": "gzip", + "vary": "accept-encoding", + "Content-Length": "[[ANYTHING_PRESENT]]" + }, + "body": { + "id": "[[ANYTHING_PRESENT]]", + "jurisdiction": "BEFTA_MASTER", + "case_type_id": "FT_CaseAccessGroups_Align_Befta", + "created_date": "[[ANYTHING_PRESENT]]", + "last_modified": "[[ANYTHING_PRESENT]]", + "last_state_modified_date": "[[ANYTHING_PRESENT]]", + "security_classification": "PUBLIC", + "case_data": { + "CaseAccessGroups": [ + { + "__ordering__": "ordered" + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "some thing else", + "caseAccessGroupId" : "test" + } + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "CCD:all-cases-access", + "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + } + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "CCD:all-cases-access", + "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + } + }], + "OrganisationPolicyField" : { + "OrgPolicyCaseAssignedRole" : "GroupRole1", + "OrgPolicyReference" : "ref", + "Organisation" : { + "OrganisationID" : "orgID1", + "OrganisationName" : "orgName1" + } + } + }, + "data_classification" : { + "CaseAccessGroups" : { + "classification" : "PUBLIC", + "value" : [ + { + "__ordering__": "ordered" + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "PUBLIC", + "caseAccessGroupId" : "PUBLIC" + } + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "PUBLIC", + "caseAccessGroupId" : "PUBLIC" + } + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "PUBLIC", + "caseAccessGroupId" : "PUBLIC" + } + } + ] + } + } + }, + "supplementary_data" : null, + "after_submit_callback_response": null, + "callback_response_status_code": null, + "callback_response_status": null, + "delete_draft_response_status_code": null, + "delete_draft_response_status": null + } +} diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.3.td.json b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.3.td.json new file mode 100644 index 0000000000..7fa64e3f7b --- /dev/null +++ b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.3.td.json @@ -0,0 +1,81 @@ +{ + "_guid_": "S-1026.3", + "_extends_": "F-1026_Test_Data_Base", + "title": "Invoke saveCaseDetailsForCaseWorkerUsingPOST when OrganisationID is empty", + + "prerequisites" : [ { + "Token_Creation": "S-1026_GetCreateToken" + } + ], + "specs": [ + "an active profile in CCD", + "contains some OrganisationPolicy fields with all correct values", + "is of caseType where caseAccessGroupType = CCD:all-cases-access", + "caseData Organisation.OrganisationID value is empty value", + "Submit case creation as Case worker", + "contains correctly configured values", + "contains updated values for case_data and data_classification" + + ], + "request": { + "body": { + "data": { + "OrganisationPolicyField": { + "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyReference": "ref", + "Organisation": { + "OrganisationID": "", + "OrganisationName": "orgName1" + } + }, + "CaseAccessGroups": [ + { + "value": { + "caseAccessGroupId": "test", + "caseAccessGroupType": "CCD:all-cases-access" + }, + "id": null + } + ] + }, + "event": { + "id": "createCase" + }, + "event_token": "${[scenarioContext][childContexts][Token_Creation][testData][actualResponse][body][token]}" + } + }, + "expectedResponse": { + "_extends_": "Common_201_Response", + "headers": { + "Content-Encoding": "gzip", + "vary": "accept-encoding", + "Content-Length": "[[ANYTHING_PRESENT]]" + }, + "body": { + "id": "[[ANYTHING_PRESENT]]", + "jurisdiction": "BEFTA_MASTER", + "case_type_id": "FT_CaseAccessGroups_Align_Befta", + "created_date": "[[ANYTHING_PRESENT]]", + "last_modified": "[[ANYTHING_PRESENT]]", + "last_state_modified_date": "[[ANYTHING_PRESENT]]", + "security_classification": "PUBLIC", + "case_data": { + "OrganisationPolicyField": { + "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyReference": "ref", + "Organisation": { + "OrganisationID": "", + "OrganisationName": "orgName1" + } + } + }, + "data_classification" : {} + }, + "supplementary_data" : null, + "after_submit_callback_response": null, + "callback_response_status_code": null, + "callback_response_status": null, + "delete_draft_response_status_code": null, + "delete_draft_response_status": null + } +} diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.4.td.json b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.4.td.json new file mode 100644 index 0000000000..e50089c22e --- /dev/null +++ b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.4.td.json @@ -0,0 +1,91 @@ +{ + "_guid_": "S-1026.4", + "_extends_": "F-1026_Test_Data_Base", + "title": "Invoke saveCaseDetailsForCaseWorkerUsingPOST and caseAccessGroupId created", + + "prerequisites" : [ { + "Token_Creation": "S-1026_GetCreateToken" + } + ], + "specs": [ + "an active profile in CCD", + "contains some OrganisationPolicy fields with all correct values", + "is of caseType where caseAccessGroupType = CCD:all-cases-access and -OrganisationPolicyField- CaseAssignedRoleField field exists in caseData and case data has Organisation.OrganisationID value not set to empty value but accessType does not have GroupRoleName", + "Submit case creation as Case worker", + "contains correctly configured values", + "contains updated values for case_data and data_classification" + + ], + "request": { + "body": { + "data": { + "OrganisationPolicyField": { + "OrgPolicyCaseAssignedRole": "GroupRole2", + "OrgPolicyReference": "ref", + "Organisation": { + "OrganisationID": "orgID1", + "OrganisationName": "orgName1" + } + }, + "CaseAccessGroups": [ + { + "value": { + "caseAccessGroupId": "test", + "caseAccessGroupType": "CCD:all-cases-access" + }, + "id": null + } + ] + }, + "event": { + "id": "createCase" + }, + "event_token": "${[scenarioContext][childContexts][Token_Creation][testData][actualResponse][body][token]}", + "event_data": { + "CaseAccessGroups": [ + { + "value": { + "caseAccessGroupId": "test", + "caseAccessGroupType": "CCD:all-cases-access" + }, + "id": null + } + ] + } + } + }, + "expectedResponse": { + "_extends_": "Common_201_Response", + "headers": { + "Content-Encoding": "gzip", + "vary": "accept-encoding", + "Content-Length": "[[ANYTHING_PRESENT]]" + }, + "body": { + "id": "[[ANYTHING_PRESENT]]", + "jurisdiction": "BEFTA_MASTER", + "case_type_id": "FT_CaseAccessGroups_Align_Befta", + "created_date": "[[ANYTHING_PRESENT]]", + "last_modified": "[[ANYTHING_PRESENT]]", + "last_state_modified_date": "[[ANYTHING_PRESENT]]", + "security_classification": "PUBLIC", + "case_data": { + "OrganisationPolicyField" : { + "OrgPolicyCaseAssignedRole" : "GroupRole2", + "OrgPolicyReference" : "ref", + "Organisation" : { + "OrganisationID" : "orgID1", + "OrganisationName" : "orgName1" + } + } + }, + "data_classification" : {} + }, + "supplementary_data" : null, + "after_submit_callback_response": null, + "callback_response_status_code": null, + "callback_response_status": null, + "delete_draft_response_status_code": null, + "delete_draft_response_status": null + } +} diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.5.td.json b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.5.td.json new file mode 100644 index 0000000000..b1538099b5 --- /dev/null +++ b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.5.td.json @@ -0,0 +1,114 @@ +{ + "_guid_": "S-1026.5", + "_extends_": "F-1026_Test_Data_Base", + "title": "Invoke saveCaseDetailsForCaseWorkerUsingPOST and caseAccessGroups field contains blank value", + "prerequisites": [ + { + "Token_Creation": "S-1026_GetCreateToken" + } + ], + "specs": [ + "an active profile in CCD", + "contains some OrganisationPolicy fields with all correct values", + "Submit case creation as Case worker", + "contains updated values for case_data and data_classification" + ], + "request": { + "body": { + "data": { + "OrganisationPolicyField": { + "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyReference": "ref", + "Organisation": { + "OrganisationID": "orgID1", + "OrganisationName": "orgName1" + } + }, + "CaseAccessGroups": [] + }, + "event": { + "id": "createCase" + }, + "event_token": "${[scenarioContext][childContexts][Token_Creation][testData][actualResponse][body][token]}", + "event_data": { + "id": null + } + } + }, + "expectedResponse": { + "_extends_": "Common_201_Response", + "headers": { + "Content-Encoding": "gzip", + "vary": "accept-encoding", + "Content-Length": "[[ANYTHING_PRESENT]]" + }, + "body": { + "id": "[[ANYTHING_PRESENT]]", + "jurisdiction": "BEFTA_MASTER", + "case_type_id": "FT_CaseAccessGroups_Align_Befta", + "created_date": "[[ANYTHING_PRESENT]]", + "last_modified": "[[ANYTHING_PRESENT]]", + "last_state_modified_date": "[[ANYTHING_PRESENT]]", + "security_classification": "PUBLIC", + "case_data": { + "CaseAccessGroups": [ + { + "__ordering__": "ordered" + }, + { + "id": "[[ANY_STRING_NOT_NULLABLE]]", + "value": { + "caseAccessGroupType": "CCD:all-cases-access", + "caseAccessGroupId": "BEFTA_MASTER:orgID1" + } + }, + { + "id": "[[ANY_STRING_NOT_NULLABLE]]", + "value": { + "caseAccessGroupType": "CCD:all-cases-access", + "caseAccessGroupId": "BEFTA_MASTER:orgID1" + } + } + ], + "OrganisationPolicyField": { + "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyReference": "ref", + "Organisation": { + "OrganisationID": "orgID1", + "OrganisationName": "orgName1" + } + } + }, + "data_classification": { + "CaseAccessGroups" : { + "classification" : "PUBLIC", + "value" : [ + { + "__ordering__": "ordered" + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "PUBLIC", + "caseAccessGroupId" : "PUBLIC" + } + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "PUBLIC", + "caseAccessGroupId" : "PUBLIC" + } + } + ] + } + } + }, + "supplementary_data": null, + "after_submit_callback_response": null, + "callback_response_status_code": null, + "callback_response_status": null, + "delete_draft_response_status_code": null, + "delete_draft_response_status": null + } +} diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.6.td.json b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.6.td.json new file mode 100644 index 0000000000..679e417e20 --- /dev/null +++ b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.6.td.json @@ -0,0 +1,118 @@ +{ + "_guid_": "S-1026.6", + "_extends_": "F-1026_Test_Data_Citizen_Base", + "title": "Invoke saveCaseDetailsForCitizenUsingPOST and caseAccessGroupId created", + + "prerequisites" : [ { + "Token_Creation": "S-1026_GetCitizenCreateToken" + } + ], + "specs": [ + "an active profile in CCD", + "contains some OrganisationPolicy fields with all correct values", + "is of caseType where case_data has caseAccessGroupType of CCD:all-cases-access", + "Submit case creation as Citizen", + "contains correctly configured values", + "contains updated values for case_data and data_classification" + ], + "request": { + "body": { + "data": { + "OrganisationPolicyField": { + "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyReference": "ref", + "Organisation": { + "OrganisationID": "orgID1", + "OrganisationName": "orgName1" + } + }, + "CaseAccessGroups" : [ { + "value" : { + "caseAccessGroupType" : "CCD:all-cases-access", + "caseAccessGroupId" : "test" + }, + "id" : null + } ] + }, + "event": { + "id": "createCase" + }, + "event_token": "${[scenarioContext][childContexts][Token_Creation][testData][actualResponse][body][token]}" + } + }, + "expectedResponse": { + "_extends_": "Common_201_Response", + "headers": { + "Content-Encoding": "gzip", + "vary": "accept-encoding", + "Content-Length": "[[ANYTHING_PRESENT]]" + }, + "body": { + "id": "[[ANYTHING_PRESENT]]", + "jurisdiction": "BEFTA_MASTER", + "case_type_id": "FT_CaseAccessGroups_Align_Befta", + "created_date": "[[ANYTHING_PRESENT]]", + "last_modified": "[[ANYTHING_PRESENT]]", + "last_state_modified_date": "[[ANYTHING_PRESENT]]", + "security_classification": "PUBLIC", + "case_data": { + "CaseAccessGroups": [ + { + "__ordering__": "ordered" + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "CCD:all-cases-access", + "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + } + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "CCD:all-cases-access", + "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + } + } + ], + "OrganisationPolicyField" : { + "OrgPolicyCaseAssignedRole" : "GroupRole1", + "OrgPolicyReference" : "ref", + "Organisation" : { + "OrganisationID" : "orgID1", + "OrganisationName" : "orgName1" + } + } + }, + "data_classification": { + "CaseAccessGroups": { + "classification": "PUBLIC", + "value": [ + { + "__ordering__": "ordered" + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "PUBLIC", + "caseAccessGroupId" : "PUBLIC" + } + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "PUBLIC", + "caseAccessGroupId" : "PUBLIC" + } + }] + } + }, + "supplementary_data": null, + "after_submit_callback_response": null, + "callback_response_status_code": null, + "callback_response_status": null, + "delete_draft_response_status_code": null, + "delete_draft_response_status": null + } + } +} diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.7.td.json b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.7.td.json new file mode 100644 index 0000000000..ef5052c6c7 --- /dev/null +++ b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.7.td.json @@ -0,0 +1,133 @@ +{ + "_guid_": "S-1026.7", + "_extends_": "F-1026_Test_Data_Citizen_Base", + "title": "Invoke saveCaseDetailsForCitizenUsingPOST and caseAccessGroupId not created when caseGroupType != CCD:all-cases-access", + + "prerequisites" : [ { + "Token_Creation": "S-1026_GetCitizenCreateToken" + } + ], + "specs": [ + "an active profile in CCD", + "contains some OrganisationPolicy fields with all correct values", + "is of caseType where caseAccessGroupType is not CCD:all-cases-access", + "Submit case creation as Citizen", + "contains correctly configured values", + "contains updated values for case_data and data_classification" + + ], + "request": { + "body": { + "data": { + "OrganisationPolicyField": { + "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyReference": "ref", + "Organisation": { + "OrganisationID": "orgID1", + "OrganisationName": "orgName1" + } + }, + "CaseAccessGroups" : [ { + "value" : { + "caseAccessGroupType" : "some thing else", + "caseAccessGroupId" : "test" + }, + "id" : null + } ] + }, + "event": { + "id": "createCase" + }, + "event_token": "${[scenarioContext][childContexts][Token_Creation][testData][actualResponse][body][token]}" + } + }, + "expectedResponse": { + "_extends_": "Common_201_Response", + "headers": { + "Content-Encoding": "gzip", + "vary": "accept-encoding", + "Content-Length": "[[ANYTHING_PRESENT]]" + }, + "body": { + "id": "[[ANYTHING_PRESENT]]", + "jurisdiction": "BEFTA_MASTER", + "case_type_id": "FT_CaseAccessGroups_Align_Befta", + "created_date": "[[ANYTHING_PRESENT]]", + "last_modified": "[[ANYTHING_PRESENT]]", + "last_state_modified_date": "[[ANYTHING_PRESENT]]", + "security_classification": "PUBLIC", + "case_data": { + "CaseAccessGroups": [ + { + "__ordering__": "ordered" + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "some thing else", + "caseAccessGroupId" : "test" + } + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "CCD:all-cases-access", + "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + } + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "CCD:all-cases-access", + "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + } + }], + "OrganisationPolicyField" : { + "OrgPolicyCaseAssignedRole" : "GroupRole1", + "OrgPolicyReference" : "ref", + "Organisation" : { + "OrganisationID" : "orgID1", + "OrganisationName" : "orgName1" + } + } + }, + "data_classification" : { + "CaseAccessGroups" : { + "classification" : "PUBLIC", + "value" : [ + { + "__ordering__": "ordered" + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "PUBLIC", + "caseAccessGroupId" : "PUBLIC" + } + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "PUBLIC", + "caseAccessGroupId" : "PUBLIC" + } + }, + { + "id" : "[[ANY_STRING_NOT_NULLABLE]]", + "value" : { + "caseAccessGroupType" : "PUBLIC", + "caseAccessGroupId" : "PUBLIC" + } + } + ] + } + } + }, + "supplementary_data" : null, + "after_submit_callback_response": null, + "callback_response_status_code": null, + "callback_response_status": null, + "delete_draft_response_status_code": null, + "delete_draft_response_status": null + } +} diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.8.td.json b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.8.td.json new file mode 100644 index 0000000000..d35aabed15 --- /dev/null +++ b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.8.td.json @@ -0,0 +1,81 @@ +{ + "_guid_": "S-1026.8", + "_extends_": "F-1026_Test_Data_Citizen_Base", + "title": "Invoke saveCaseDetailsForCitizenUsingPOST and caseAccessGroupId created", + + "prerequisites" : [ { + "Token_Creation": "S-1026_GetCitizenCreateToken" + } + ], + "specs": [ + "an active profile in CCD", + "contains some OrganisationPolicy fields with all correct values", + "is of caseType where caseAccessGroupType = CCD:all-cases-access", + "caseData Organisation.OrganisationID value is empty value", + "Submit case creation as Citizen", + "contains correctly configured values", + "contains updated values for case_data and data_classification" + + ], + "request": { + "body": { + "data": { + "OrganisationPolicyField": { + "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyReference": "ref", + "Organisation": { + "OrganisationID": "", + "OrganisationName": "orgName1" + } + }, + "CaseAccessGroups": [ + { + "value": { + "caseAccessGroupId": "test", + "caseAccessGroupType": "CCD:all-cases-access" + }, + "id": null + } + ] + }, + "event": { + "id": "createCase" + }, + "event_token": "${[scenarioContext][childContexts][Token_Creation][testData][actualResponse][body][token]}" + } + }, + "expectedResponse": { + "_extends_": "Common_201_Response", + "headers": { + "Content-Encoding": "gzip", + "vary": "accept-encoding", + "Content-Length": "[[ANYTHING_PRESENT]]" + }, + "body": { + "id": "[[ANYTHING_PRESENT]]", + "jurisdiction": "BEFTA_MASTER", + "case_type_id": "FT_CaseAccessGroups_Align_Befta", + "created_date": "[[ANYTHING_PRESENT]]", + "last_modified": "[[ANYTHING_PRESENT]]", + "last_state_modified_date": "[[ANYTHING_PRESENT]]", + "security_classification": "PUBLIC", + "case_data": { + "OrganisationPolicyField": { + "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyReference": "ref", + "Organisation": { + "OrganisationID": "", + "OrganisationName": "orgName1" + } + } + }, + "data_classification" : {} + }, + "supplementary_data" : null, + "after_submit_callback_response": null, + "callback_response_status_code": null, + "callback_response_status": null, + "delete_draft_response_status_code": null, + "delete_draft_response_status": null + } +} diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.9.td.json b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.9.td.json new file mode 100644 index 0000000000..86cebb6fb5 --- /dev/null +++ b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.9.td.json @@ -0,0 +1,91 @@ +{ + "_guid_": "S-1026.9", + "_extends_": "F-1026_Test_Data_Citizen_Base", + "title": "Invoke saveCaseDetailsForCitizenUsingPOST and caseAccessGroupId created", + + "prerequisites" : [ { + "Token_Creation": "S-1026_GetCitizenCreateToken" + } + ], + "specs": [ + "an active profile in CCD", + "contains some OrganisationPolicy fields with all correct values", + "is of caseType where caseAccessGroupType = CCD:all-cases-access and -OrganisationPolicyField- CaseAssignedRoleField field exists in caseData and case data has Organisation.OrganisationID value not set to empty value but accessType does not have GroupRoleName", + "Submit case creation as Citizen", + "contains correctly configured values", + "contains updated values for case_data and data_classification" + + ], + "request": { + "body": { + "data": { + "OrganisationPolicyField": { + "OrgPolicyCaseAssignedRole": "GroupRole2", + "OrgPolicyReference": "ref", + "Organisation": { + "OrganisationID": "orgID1", + "OrganisationName": "orgName1" + } + }, + "CaseAccessGroups": [ + { + "value": { + "caseAccessGroupId": "test", + "caseAccessGroupType": "CCD:all-cases-access" + }, + "id": null + } + ] + }, + "event": { + "id": "createCase" + }, + "event_token": "${[scenarioContext][childContexts][Token_Creation][testData][actualResponse][body][token]}", + "event_data": { + "CaseAccessGroups": [ + { + "value": { + "caseAccessGroupId": "test", + "caseAccessGroupType": "CCD:all-cases-access" + }, + "id": null + } + ] + } + } + }, + "expectedResponse": { + "_extends_": "Common_201_Response", + "headers": { + "Content-Encoding": "gzip", + "vary": "accept-encoding", + "Content-Length": "[[ANYTHING_PRESENT]]" + }, + "body": { + "id": "[[ANYTHING_PRESENT]]", + "jurisdiction": "BEFTA_MASTER", + "case_type_id": "FT_CaseAccessGroups_Align_Befta", + "created_date": "[[ANYTHING_PRESENT]]", + "last_modified": "[[ANYTHING_PRESENT]]", + "last_state_modified_date": "[[ANYTHING_PRESENT]]", + "security_classification": "PUBLIC", + "case_data": { + "OrganisationPolicyField" : { + "OrgPolicyCaseAssignedRole" : "GroupRole2", + "OrgPolicyReference" : "ref", + "Organisation" : { + "OrganisationID" : "orgID1", + "OrganisationName" : "orgName1" + } + } + }, + "data_classification" : {} + }, + "supplementary_data" : null, + "after_submit_callback_response": null, + "callback_response_status_code": null, + "callback_response_status": null, + "delete_draft_response_status_code": null, + "delete_draft_response_status": null + } +} diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026_GetCitizenCreateToken.td.json b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026_GetCitizenCreateToken.td.json new file mode 100644 index 0000000000..145e0f8981 --- /dev/null +++ b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026_GetCitizenCreateToken.td.json @@ -0,0 +1,33 @@ +{ + "_guid_": "S-1026_GetCitizenCreateToken", + "_extends_": "Citizen_Token_Creation_Data_For_Case_Creation", + + "specs": [ + "to create a token for case creation", + "As a prerequisite" + ], + + "users": { + "invokingUser": { + "_extends_": "BeftaCitizen2" + } + }, + + "request": { + "pathVariables": { + "jid": "BEFTA_MASTER", + "ctid": "FT_CaseAccessGroups_Align_Befta", + "etid": "createCase" + } + }, + + "expectedResponse": { + "body": { + "case_details": { + "jurisdiction": "BEFTA_MASTER", + "case_type_id": "FT_CaseAccessGroups_Align_Befta" + }, + "event_id": "createCase" + } + } +} diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026_GetCreateToken.td.json b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026_GetCreateToken.td.json new file mode 100644 index 0000000000..1a6a4cb08b --- /dev/null +++ b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026_GetCreateToken.td.json @@ -0,0 +1,28 @@ +{ + "_guid_": "S-1026_GetCreateToken", + "_extends_": "Standard_Token_Creation_Data_For_Case_Creation", + + "specs": [ + "to create a token for case creation", + "As a prerequisite" + ], + + "users": { + "invokingUser": { + "_extends_": "BeftaMasterCaseworker" + } + }, + + "request": { + "pathVariables": { + "jid": "BEFTA_MASTER", + "ctid": "FT_CaseAccessGroups_Align_Befta", + "etid": "createCase" + } + }, + "expectedResponse": { + "body": { + "event_id": "createCase" + } + } +} diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026_GetEventTokenBase.td.json b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026_GetEventTokenBase.td.json new file mode 100644 index 0000000000..4b990bea71 --- /dev/null +++ b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026_GetEventTokenBase.td.json @@ -0,0 +1,32 @@ +{ + "_guid_": "S-1026_GetEventTokenBase", + "_extends_": "StartEvent_v2Ext__PositiveResponse_Base", + + "specs": [ + "As a prerequisite" + ], + + "request": { + "pathVariables": { + "cid": "OVERRIDE", + "etid": "updateCase" + } + }, + + "expectedResponse": { + "body": { + "case_details": { + "id": "[[ANYTHING_PRESENT]]", + "version": "[[ANY_INTEGER_NOT_NULLABLE]]", + + "jurisdiction": "BEFTA_MASTER", + "case_type_id": "[[ANYTHING_PRESENT]]", + + "case_data": "[[ANYTHING_PRESENT]]", + "data_classification": "[[ANYTHING_PRESENT]]" + }, + + "event_id": "updateCase" + } + } +} diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026_GetUpdateTokenCaseworker.td.json b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026_GetUpdateTokenCaseworker.td.json new file mode 100644 index 0000000000..57dd9fc6a0 --- /dev/null +++ b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026_GetUpdateTokenCaseworker.td.json @@ -0,0 +1,16 @@ +{ + "_guid_": "S-1026_GetUpdateTokenCaseworker", + "_extends_": "S-1026_GetEventTokenBase", + + "users": { + "invokingUser": { + "_extends_": "BeftaMasterCaseworker" + } + }, + + "request": { + "pathVariables": { + "cid": "${[scenarioContext][parentContext][childContexts][F-1026_CreateCasePreRequisiteCaseworker][testData][actualResponse][body][id]}" + } + } +} diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026_GetUpdateTokenCitizen.td.json b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026_GetUpdateTokenCitizen.td.json new file mode 100644 index 0000000000..736ae2c1ea --- /dev/null +++ b/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026_GetUpdateTokenCitizen.td.json @@ -0,0 +1,17 @@ +{ + "_guid_": "S-1026_GetUpdateTokenCitizen", + "_extends_": "S-1026_GetEventTokenBase", + + "users": { + "invokingUser": { + "_extends_": "BeftaCitizen2" + } + }, + + "request": { + "pathVariables": { + "cid": "${[scenarioContext][parentContext][childContexts][F-1026_CreateCasePreRequisiteCitizen][testData][actualResponse][body][id]}" + } + } +} + From 6f43a3cf3ed7846486c6ee13d04c4eab02fa1b00 Mon Sep 17 00:00:00 2001 From: patelila Date: Mon, 9 Feb 2026 12:15:57 +0000 Subject: [PATCH 03/13] Changes to use FT_CaseProfessionalGroupAccess, CaseProfessionalGroupAccess_Org_Rol and CaseProfessionalGroupAccess_GA_Role --- build.gradle | 2 +- .../F-1026.feature | 2 +- .../F-1026_CreateCasePreRequisiteCaseworker.td.json | 8 ++++---- .../F-1026_CreateCasePreRequisiteCitizen.td.json | 8 ++++---- .../F-1026_Test_Data_Base.td.json | 4 ++-- .../F-1026_Test_Data_Base_V2.td.json | 4 ++-- .../F-1026_Test_Data_Citizen_Base.td.json | 4 ++-- .../F-1026_Test_Data_Event_Caseworker.td.json | 2 +- .../F-1026_Test_Data_Event_Citizen.td.json | 2 +- .../S-1026-GetUpdateEventToken.td.json | 0 .../S-1026.1.td.json | 6 +++--- .../S-1026.10.td.json | 6 +++--- .../S-1026.11.td.json | 4 ++-- .../S-1026.12.td.json | 4 ++-- .../S-1026.13.td.json | 4 ++-- .../S-1026.14.td.json | 4 ++-- .../S-1026.15.td.json | 4 ++-- .../S-1026.16.td.json | 8 ++++---- .../S-1026.17.td.json | 8 ++++---- .../S-1026.18.td.json | 6 +++--- .../S-1026.2.td.json | 6 +++--- .../S-1026.3.td.json | 6 +++--- .../S-1026.4.td.json | 6 +++--- .../S-1026.5.td.json | 6 +++--- .../S-1026.6.td.json | 6 +++--- .../S-1026.7.td.json | 6 +++--- .../S-1026.8.td.json | 6 +++--- .../S-1026.9.td.json | 6 +++--- .../S-1026_GetCitizenCreateToken.td.json | 4 ++-- .../S-1026_GetCreateToken.td.json | 2 +- .../S-1026_GetEventTokenBase.td.json | 0 .../S-1026_GetUpdateTokenCaseworker.td.json | 0 .../S-1026_GetUpdateTokenCitizen.td.json | 0 33 files changed, 72 insertions(+), 72 deletions(-) rename src/aat/resources/features/{F-1026 - Align Befta Case update with caseAccessGroups => F-1026 - Align Professional Access Management Case update with caseAccessGroups}/F-1026.feature (99%) rename src/aat/resources/features/{F-1026 - Align Befta Case update with caseAccessGroups => F-1026 - Align Professional Access Management Case update with caseAccessGroups}/F-1026_CreateCasePreRequisiteCaseworker.td.json (91%) rename src/aat/resources/features/{F-1026 - Align Befta Case update with caseAccessGroups => F-1026 - Align Professional Access Management Case update with caseAccessGroups}/F-1026_CreateCasePreRequisiteCitizen.td.json (92%) rename src/aat/resources/features/{F-1026 - Align Befta Case update with caseAccessGroups => F-1026 - Align Professional Access Management Case update with caseAccessGroups}/F-1026_Test_Data_Base.td.json (90%) rename src/aat/resources/features/{F-1026 - Align Befta Case update with caseAccessGroups => F-1026 - Align Professional Access Management Case update with caseAccessGroups}/F-1026_Test_Data_Base_V2.td.json (80%) rename src/aat/resources/features/{F-1026 - Align Befta Case update with caseAccessGroups => F-1026 - Align Professional Access Management Case update with caseAccessGroups}/F-1026_Test_Data_Citizen_Base.td.json (90%) rename src/aat/resources/features/{F-1026 - Align Befta Case update with caseAccessGroups => F-1026 - Align Professional Access Management Case update with caseAccessGroups}/F-1026_Test_Data_Event_Caseworker.td.json (94%) rename src/aat/resources/features/{F-1026 - Align Befta Case update with caseAccessGroups => F-1026 - Align Professional Access Management Case update with caseAccessGroups}/F-1026_Test_Data_Event_Citizen.td.json (88%) rename src/aat/resources/features/{F-1026 - Align Befta Case update with caseAccessGroups => F-1026 - Align Professional Access Management Case update with caseAccessGroups}/S-1026-GetUpdateEventToken.td.json (100%) rename src/aat/resources/features/{F-1026 - Align Befta Case update with caseAccessGroups => F-1026 - Align Professional Access Management Case update with caseAccessGroups}/S-1026.1.td.json (94%) rename src/aat/resources/features/{F-1026 - Align Befta Case update with caseAccessGroups => F-1026 - Align Professional Access Management Case update with caseAccessGroups}/S-1026.10.td.json (93%) rename src/aat/resources/features/{F-1026 - Align Befta Case update with caseAccessGroups => F-1026 - Align Professional Access Management Case update with caseAccessGroups}/S-1026.11.td.json (95%) rename src/aat/resources/features/{F-1026 - Align Befta Case update with caseAccessGroups => F-1026 - Align Professional Access Management Case update with caseAccessGroups}/S-1026.12.td.json (96%) rename src/aat/resources/features/{F-1026 - Align Befta Case update with caseAccessGroups => F-1026 - Align Professional Access Management Case update with caseAccessGroups}/S-1026.13.td.json (93%) rename src/aat/resources/features/{F-1026 - Align Befta Case update with caseAccessGroups => F-1026 - Align Professional Access Management Case update with caseAccessGroups}/S-1026.14.td.json (94%) rename src/aat/resources/features/{F-1026 - Align Befta Case update with caseAccessGroups => F-1026 - Align Professional Access Management Case update with caseAccessGroups}/S-1026.15.td.json (95%) rename src/aat/resources/features/{F-1026 - Align Befta Case update with caseAccessGroups => F-1026 - Align Professional Access Management Case update with caseAccessGroups}/S-1026.16.td.json (93%) rename src/aat/resources/features/{F-1026 - Align Befta Case update with caseAccessGroups => F-1026 - Align Professional Access Management Case update with caseAccessGroups}/S-1026.17.td.json (93%) rename src/aat/resources/features/{F-1026 - Align Befta Case update with caseAccessGroups => F-1026 - Align Professional Access Management Case update with caseAccessGroups}/S-1026.18.td.json (94%) rename src/aat/resources/features/{F-1026 - Align Befta Case update with caseAccessGroups => F-1026 - Align Professional Access Management Case update with caseAccessGroups}/S-1026.2.td.json (94%) rename src/aat/resources/features/{F-1026 - Align Befta Case update with caseAccessGroups => F-1026 - Align Professional Access Management Case update with caseAccessGroups}/S-1026.3.td.json (91%) rename src/aat/resources/features/{F-1026 - Align Befta Case update with caseAccessGroups => F-1026 - Align Professional Access Management Case update with caseAccessGroups}/S-1026.4.td.json (92%) rename src/aat/resources/features/{F-1026 - Align Befta Case update with caseAccessGroups => F-1026 - Align Professional Access Management Case update with caseAccessGroups}/S-1026.5.td.json (93%) rename src/aat/resources/features/{F-1026 - Align Befta Case update with caseAccessGroups => F-1026 - Align Professional Access Management Case update with caseAccessGroups}/S-1026.6.td.json (94%) rename src/aat/resources/features/{F-1026 - Align Befta Case update with caseAccessGroups => F-1026 - Align Professional Access Management Case update with caseAccessGroups}/S-1026.7.td.json (94%) rename src/aat/resources/features/{F-1026 - Align Befta Case update with caseAccessGroups => F-1026 - Align Professional Access Management Case update with caseAccessGroups}/S-1026.8.td.json (91%) rename src/aat/resources/features/{F-1026 - Align Befta Case update with caseAccessGroups => F-1026 - Align Professional Access Management Case update with caseAccessGroups}/S-1026.9.td.json (92%) rename src/aat/resources/features/{F-1026 - Align Befta Case update with caseAccessGroups => F-1026 - Align Professional Access Management Case update with caseAccessGroups}/S-1026_GetCitizenCreateToken.td.json (83%) rename src/aat/resources/features/{F-1026 - Align Befta Case update with caseAccessGroups => F-1026 - Align Professional Access Management Case update with caseAccessGroups}/S-1026_GetCreateToken.td.json (90%) rename src/aat/resources/features/{F-1026 - Align Befta Case update with caseAccessGroups => F-1026 - Align Professional Access Management Case update with caseAccessGroups}/S-1026_GetEventTokenBase.td.json (100%) rename src/aat/resources/features/{F-1026 - Align Befta Case update with caseAccessGroups => F-1026 - Align Professional Access Management Case update with caseAccessGroups}/S-1026_GetUpdateTokenCaseworker.td.json (100%) rename src/aat/resources/features/{F-1026 - Align Befta Case update with caseAccessGroups => F-1026 - Align Professional Access Management Case update with caseAccessGroups}/S-1026_GetUpdateTokenCitizen.td.json (100%) diff --git a/build.gradle b/build.gradle index 27d1c7e555..feb833641f 100644 --- a/build.gradle +++ b/build.gradle @@ -41,7 +41,7 @@ ext { testContainersVersion = '1.20.4' cucumber = '6.11.0' beftaFwVersion = '9.2.4' - ccdTestDefinitionVersion = '7.26.0-SNAPSHOT-CCD-7049' + ccdTestDefinitionVersion = '7.26.0-SNAPSHOT-CCD-7049_1' limits = [ 'instruction': 90, 'branch' : 85, diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026.feature b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026.feature similarity index 99% rename from src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026.feature rename to src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026.feature index 9adf545638..27e6e0ccd7 100644 --- a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026.feature +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026.feature @@ -1,4 +1,4 @@ -@F-1026 +@F-1026 # Aligning the Professional Access Management capability Feature: F-1026: Submit Case Creation Handle CaseAccessGroups Background: Load test data for the scenario diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_CreateCasePreRequisiteCaseworker.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026_CreateCasePreRequisiteCaseworker.td.json similarity index 91% rename from src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_CreateCasePreRequisiteCaseworker.td.json rename to src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026_CreateCasePreRequisiteCaseworker.td.json index 286bef6401..2b5a9505f4 100644 --- a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_CreateCasePreRequisiteCaseworker.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026_CreateCasePreRequisiteCaseworker.td.json @@ -19,12 +19,12 @@ "request": { "pathVariables": { "jid": "BEFTA_MASTER", - "ctid": "FT_CaseAccessGroups_Align_Befta" + "ctid": "FT_CaseProfessionalGroupAccess" }, "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", @@ -47,7 +47,7 @@ "id": "[[ANYTHING_PRESENT]]", "jurisdiction": "BEFTA_MASTER", "state" : "CaseCreated", - "case_type_id": "FT_CaseAccessGroups_Align_Befta", + "case_type_id": "FT_CaseProfessionalGroupAccess", "supplementary_data" : null, "created_date": "[[ANYTHING_PRESENT]]", "last_modified": "[[ANYTHING_PRESENT]]", @@ -74,7 +74,7 @@ } ], "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_CreateCasePreRequisiteCitizen.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026_CreateCasePreRequisiteCitizen.td.json similarity index 92% rename from src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_CreateCasePreRequisiteCitizen.td.json rename to src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026_CreateCasePreRequisiteCitizen.td.json index dce4fd6f79..cf5d30ed60 100644 --- a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_CreateCasePreRequisiteCitizen.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026_CreateCasePreRequisiteCitizen.td.json @@ -19,13 +19,13 @@ "request": { "pathVariables": { "uid": "[[DEFAULT_AUTO_VALUE]]", - "ctid": "FT_CaseAccessGroups_Align_Befta", + "ctid": "FT_CaseProfessionalGroupAccess", "jid": "BEFTA_MASTER" }, "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", @@ -48,7 +48,7 @@ "id": "[[ANYTHING_PRESENT]]", "jurisdiction": "BEFTA_MASTER", "state" : "CaseCreated", - "case_type_id": "FT_CaseAccessGroups_Align_Befta", + "case_type_id": "FT_CaseProfessionalGroupAccess", "version" : 0, "created_date": "[[ANYTHING_PRESENT]]", "last_modified": "[[ANYTHING_PRESENT]]", @@ -81,7 +81,7 @@ } ], "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_Test_Data_Base.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026_Test_Data_Base.td.json similarity index 90% rename from src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_Test_Data_Base.td.json rename to src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026_Test_Data_Base.td.json index af40645f59..3a1dda28b3 100644 --- a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_Test_Data_Base.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026_Test_Data_Base.td.json @@ -11,7 +11,7 @@ "request": { "pathVariables": { "jid": "BEFTA_MASTER", - "ctid": "FT_CaseAccessGroups_Align_Befta" + "ctid": "FT_CaseProfessionalGroupAccess" } }, @@ -24,7 +24,7 @@ "id" : "[[ANYTHING_PRESENT]]", "jurisdiction" : "BEFTA_MASTER", "state" : "CaseCreated", - "case_type_id" : "FT_CaseAccessGroups_Align_Befta", + "case_type_id" : "FT_CaseProfessionalGroupAccess", "version" : 0, "created_date" : "[[ANY_STRING_NOT_NULLABLE]]", "last_modified" : "[[ANY_STRING_NOT_NULLABLE]]", diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_Test_Data_Base_V2.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026_Test_Data_Base_V2.td.json similarity index 80% rename from src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_Test_Data_Base_V2.td.json rename to src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026_Test_Data_Base_V2.td.json index 808ae8bfb1..a4d03d640a 100644 --- a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_Test_Data_Base_V2.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026_Test_Data_Base_V2.td.json @@ -8,7 +8,7 @@ "experimental": true }, "pathVariables": { - "CaseTypeID": "FT_CaseAccessGroups_Align_Befta" + "CaseTypeID": "FT_CaseProfessionalGroupAccess" } }, @@ -16,7 +16,7 @@ "body" : { "_links" : "[[ANYTHING_PRESENT]]", "jurisdiction" : "BEFTA_MASTER", - "case_type" : "FT_CaseAccessGroups_Align_Befta", + "case_type" : "FT_CaseProfessionalGroupAccess", "state" : "CaseCreated" } } diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_Test_Data_Citizen_Base.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026_Test_Data_Citizen_Base.td.json similarity index 90% rename from src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_Test_Data_Citizen_Base.td.json rename to src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026_Test_Data_Citizen_Base.td.json index 22c20eecc5..dbf3f33dda 100644 --- a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_Test_Data_Citizen_Base.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026_Test_Data_Citizen_Base.td.json @@ -11,7 +11,7 @@ "request": { "pathVariables": { "jid": "BEFTA_MASTER", - "ctid": "FT_CaseAccessGroups_Align_Befta" + "ctid": "FT_CaseProfessionalGroupAccess" } }, @@ -24,7 +24,7 @@ "id" : "[[ANYTHING_PRESENT]]", "jurisdiction" : "BEFTA_MASTER", "state" : "CaseCreated", - "case_type_id" : "FT_CaseAccessGroups_Align_Befta", + "case_type_id" : "FT_CaseProfessionalGroupAccess", "version" : 0, "created_date" : "[[ANY_STRING_NOT_NULLABLE]]", "last_modified" : "[[ANY_STRING_NOT_NULLABLE]]", diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_Test_Data_Event_Caseworker.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026_Test_Data_Event_Caseworker.td.json similarity index 94% rename from src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_Test_Data_Event_Caseworker.td.json rename to src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026_Test_Data_Event_Caseworker.td.json index 130429dfaa..73a4fdf324 100644 --- a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_Test_Data_Event_Caseworker.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026_Test_Data_Event_Caseworker.td.json @@ -16,7 +16,7 @@ "body" : { "id" : "OVERRIDE", "jurisdiction" : "BEFTA_MASTER", - "case_type_id" : "FT_CaseAccessGroups_Align_Befta", + "case_type_id" : "FT_CaseProfessionalGroupAccess", "state" : "CaseUpdated", "version" : 1, "created_date" : "[[ANY_STRING_NOT_NULLABLE]]", diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_Test_Data_Event_Citizen.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026_Test_Data_Event_Citizen.td.json similarity index 88% rename from src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_Test_Data_Event_Citizen.td.json rename to src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026_Test_Data_Event_Citizen.td.json index 3d363ed9f7..892b98f652 100644 --- a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/F-1026_Test_Data_Event_Citizen.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026_Test_Data_Event_Citizen.td.json @@ -11,7 +11,7 @@ "request": { "pathVariables": { "jid": "BEFTA_MASTER", - "ctid": "FT_CaseAccessGroups_Align_Befta", + "ctid": "FT_CaseProfessionalGroupAccess", "cid": "${[scenarioContext][childContexts][F-1026_CreateCasePreRequisiteCitizen][testData][actualResponse][body][id]}" } } diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026-GetUpdateEventToken.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026-GetUpdateEventToken.td.json similarity index 100% rename from src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026-GetUpdateEventToken.td.json rename to src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026-GetUpdateEventToken.td.json diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.1.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.1.td.json similarity index 94% rename from src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.1.td.json rename to src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.1.td.json index 2a3384b413..b4866d91c8 100644 --- a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.1.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.1.td.json @@ -19,7 +19,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", @@ -50,7 +50,7 @@ "body": { "id": "[[ANYTHING_PRESENT]]", "jurisdiction": "BEFTA_MASTER", - "case_type_id": "FT_CaseAccessGroups_Align_Befta", + "case_type_id": "FT_CaseProfessionalGroupAccess", "created_date": "[[ANYTHING_PRESENT]]", "last_modified": "[[ANYTHING_PRESENT]]", "last_state_modified_date": "[[ANYTHING_PRESENT]]", @@ -76,7 +76,7 @@ } ], "OrganisationPolicyField" : { - "OrgPolicyCaseAssignedRole" : "GroupRole1", + "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference" : "ref", "Organisation" : { "OrganisationID" : "orgID1", diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.10.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.10.td.json similarity index 93% rename from src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.10.td.json rename to src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.10.td.json index 26a8811429..ef21cc8d14 100644 --- a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.10.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.10.td.json @@ -17,7 +17,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", @@ -45,7 +45,7 @@ "body": { "id": "[[ANYTHING_PRESENT]]", "jurisdiction": "BEFTA_MASTER", - "case_type_id": "FT_CaseAccessGroups_Align_Befta", + "case_type_id": "FT_CaseProfessionalGroupAccess", "created_date": "[[ANYTHING_PRESENT]]", "last_modified": "[[ANYTHING_PRESENT]]", "last_state_modified_date": "[[ANYTHING_PRESENT]]", @@ -71,7 +71,7 @@ } ], "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.11.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.11.td.json similarity index 95% rename from src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.11.td.json rename to src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.11.td.json index ccd48900b0..3d0bf365e2 100644 --- a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.11.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.11.td.json @@ -19,7 +19,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", @@ -76,7 +76,7 @@ } ], "OrganisationPolicyField" : { - "OrgPolicyCaseAssignedRole" : "GroupRole1", + "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference" : "ref", "Organisation" : { "OrganisationID" : "orgID1", diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.12.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.12.td.json similarity index 96% rename from src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.12.td.json rename to src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.12.td.json index b546347aea..f5147c8364 100644 --- a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.12.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.12.td.json @@ -20,7 +20,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", @@ -83,7 +83,7 @@ } }], "OrganisationPolicyField" : { - "OrgPolicyCaseAssignedRole" : "GroupRole1", + "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference" : "ref", "Organisation" : { "OrganisationID" : "orgID1", diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.13.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.13.td.json similarity index 93% rename from src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.13.td.json rename to src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.13.td.json index 3d5a374d6a..6a289889c1 100644 --- a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.13.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.13.td.json @@ -21,7 +21,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "", @@ -61,7 +61,7 @@ "security_classification": "PUBLIC", "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "", diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.14.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.14.td.json similarity index 94% rename from src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.14.td.json rename to src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.14.td.json index ca2a040b3b..6b6cd6d844 100644 --- a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.14.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.14.td.json @@ -20,7 +20,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "GroupRole2", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", @@ -71,7 +71,7 @@ "security_classification": "PUBLIC", "data": { "OrganisationPolicyField" : { - "OrgPolicyCaseAssignedRole" : "GroupRole2", + "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference" : "ref", "Organisation" : { "OrganisationID" : "orgID1", diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.15.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.15.td.json similarity index 95% rename from src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.15.td.json rename to src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.15.td.json index b63e4e20c4..b8c367a49a 100644 --- a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.15.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.15.td.json @@ -17,7 +17,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", @@ -71,7 +71,7 @@ } ], "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.16.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.16.td.json similarity index 93% rename from src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.16.td.json rename to src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.16.td.json index 9c90b0d2c7..e509ab5d59 100644 --- a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.16.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.16.td.json @@ -20,7 +20,7 @@ "request": { "pathVariables": { - "ctid" : "FT_CaseAccessGroups_Align_Befta", + "ctid" : "FT_CaseProfessionalGroupAccess", "cid": "${[scenarioContext][childContexts][F-1026_CreateCasePreRequisiteCaseworker][testData][actualResponse][body][id]}" }, "headers": { @@ -29,7 +29,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", @@ -62,7 +62,7 @@ "jurisdiction" : "BEFTA_MASTER", "state" : "CaseUpdated", "version" : 1, - "case_type_id" : "FT_CaseAccessGroups_Align_Befta", + "case_type_id" : "FT_CaseProfessionalGroupAccess", "created_date" : "[[ANYTHING_PRESENT]]", "last_modified" : "[[ANYTHING_PRESENT]]", "last_state_modified_date" : "[[ANYTHING_PRESENT]]", @@ -88,7 +88,7 @@ } ], "OrganisationPolicyField" : { - "OrgPolicyCaseAssignedRole" : "GroupRole1", + "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference" : "ref", "Organisation" : { "OrganisationID" : "orgID1", diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.17.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.17.td.json similarity index 93% rename from src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.17.td.json rename to src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.17.td.json index 43337b66bf..056264e8c4 100644 --- a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.17.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.17.td.json @@ -22,7 +22,7 @@ "request": { "pathVariables": { "jid" : "BEFTA_MASTER", - "ctid" : "FT_CaseAccessGroups_Align_Befta", + "ctid" : "FT_CaseProfessionalGroupAccess", "cid": "${[scenarioContext][childContexts][F-1026_CreateCasePreRequisiteCitizen][testData][actualResponse][body][id]}" }, "headers": { @@ -31,7 +31,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", @@ -64,7 +64,7 @@ "jurisdiction" : "BEFTA_MASTER", "state" : "CaseUpdated", "version" : 1, - "case_type_id" : "FT_CaseAccessGroups_Align_Befta", + "case_type_id" : "FT_CaseProfessionalGroupAccess", "created_date" : "[[ANYTHING_PRESENT]]", "last_modified" : "[[ANYTHING_PRESENT]]", "last_state_modified_date" : "[[ANYTHING_PRESENT]]", @@ -90,7 +90,7 @@ } ], "OrganisationPolicyField" : { - "OrgPolicyCaseAssignedRole" : "GroupRole1", + "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference" : "ref", "Organisation" : { "OrganisationID" : "orgID1", diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.18.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.18.td.json similarity index 94% rename from src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.18.td.json rename to src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.18.td.json index 1854c3d2e4..396715099b 100644 --- a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.18.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.18.td.json @@ -32,7 +32,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", @@ -61,7 +61,7 @@ "id" : "[[ANYTHING_PRESENT]]", "jurisdiction" : "BEFTA_MASTER", - "case_type" : "FT_CaseAccessGroups_Align_Befta", + "case_type" : "FT_CaseProfessionalGroupAccess", "state" : "CaseUpdated", @@ -86,7 +86,7 @@ } ], "OrganisationPolicyField" : { - "OrgPolicyCaseAssignedRole" : "GroupRole1", + "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference" : "ref", "Organisation" : { "OrganisationID" : "orgID1", diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.2.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.2.td.json similarity index 94% rename from src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.2.td.json rename to src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.2.td.json index 3339643ebf..709676162a 100644 --- a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.2.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.2.td.json @@ -20,7 +20,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", @@ -51,7 +51,7 @@ "body": { "id": "[[ANYTHING_PRESENT]]", "jurisdiction": "BEFTA_MASTER", - "case_type_id": "FT_CaseAccessGroups_Align_Befta", + "case_type_id": "FT_CaseProfessionalGroupAccess", "created_date": "[[ANYTHING_PRESENT]]", "last_modified": "[[ANYTHING_PRESENT]]", "last_state_modified_date": "[[ANYTHING_PRESENT]]", @@ -83,7 +83,7 @@ } }], "OrganisationPolicyField" : { - "OrgPolicyCaseAssignedRole" : "GroupRole1", + "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference" : "ref", "Organisation" : { "OrganisationID" : "orgID1", diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.3.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.3.td.json similarity index 91% rename from src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.3.td.json rename to src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.3.td.json index 7fa64e3f7b..95740a51a6 100644 --- a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.3.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.3.td.json @@ -21,7 +21,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "", @@ -54,14 +54,14 @@ "body": { "id": "[[ANYTHING_PRESENT]]", "jurisdiction": "BEFTA_MASTER", - "case_type_id": "FT_CaseAccessGroups_Align_Befta", + "case_type_id": "FT_CaseProfessionalGroupAccess", "created_date": "[[ANYTHING_PRESENT]]", "last_modified": "[[ANYTHING_PRESENT]]", "last_state_modified_date": "[[ANYTHING_PRESENT]]", "security_classification": "PUBLIC", "case_data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "", diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.4.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.4.td.json similarity index 92% rename from src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.4.td.json rename to src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.4.td.json index e50089c22e..96761906e3 100644 --- a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.4.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.4.td.json @@ -20,7 +20,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "GroupRole2", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", @@ -64,14 +64,14 @@ "body": { "id": "[[ANYTHING_PRESENT]]", "jurisdiction": "BEFTA_MASTER", - "case_type_id": "FT_CaseAccessGroups_Align_Befta", + "case_type_id": "FT_CaseProfessionalGroupAccess", "created_date": "[[ANYTHING_PRESENT]]", "last_modified": "[[ANYTHING_PRESENT]]", "last_state_modified_date": "[[ANYTHING_PRESENT]]", "security_classification": "PUBLIC", "case_data": { "OrganisationPolicyField" : { - "OrgPolicyCaseAssignedRole" : "GroupRole2", + "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference" : "ref", "Organisation" : { "OrganisationID" : "orgID1", diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.5.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.5.td.json similarity index 93% rename from src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.5.td.json rename to src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.5.td.json index b1538099b5..e40b0fd472 100644 --- a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.5.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.5.td.json @@ -17,7 +17,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", @@ -45,7 +45,7 @@ "body": { "id": "[[ANYTHING_PRESENT]]", "jurisdiction": "BEFTA_MASTER", - "case_type_id": "FT_CaseAccessGroups_Align_Befta", + "case_type_id": "FT_CaseProfessionalGroupAccess", "created_date": "[[ANYTHING_PRESENT]]", "last_modified": "[[ANYTHING_PRESENT]]", "last_state_modified_date": "[[ANYTHING_PRESENT]]", @@ -71,7 +71,7 @@ } ], "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.6.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.6.td.json similarity index 94% rename from src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.6.td.json rename to src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.6.td.json index 679e417e20..51902e3e33 100644 --- a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.6.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.6.td.json @@ -19,7 +19,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", @@ -50,7 +50,7 @@ "body": { "id": "[[ANYTHING_PRESENT]]", "jurisdiction": "BEFTA_MASTER", - "case_type_id": "FT_CaseAccessGroups_Align_Befta", + "case_type_id": "FT_CaseProfessionalGroupAccess", "created_date": "[[ANYTHING_PRESENT]]", "last_modified": "[[ANYTHING_PRESENT]]", "last_state_modified_date": "[[ANYTHING_PRESENT]]", @@ -76,7 +76,7 @@ } ], "OrganisationPolicyField" : { - "OrgPolicyCaseAssignedRole" : "GroupRole1", + "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference" : "ref", "Organisation" : { "OrganisationID" : "orgID1", diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.7.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.7.td.json similarity index 94% rename from src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.7.td.json rename to src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.7.td.json index ef5052c6c7..e4ef60a63d 100644 --- a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.7.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.7.td.json @@ -20,7 +20,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", @@ -51,7 +51,7 @@ "body": { "id": "[[ANYTHING_PRESENT]]", "jurisdiction": "BEFTA_MASTER", - "case_type_id": "FT_CaseAccessGroups_Align_Befta", + "case_type_id": "FT_CaseProfessionalGroupAccess", "created_date": "[[ANYTHING_PRESENT]]", "last_modified": "[[ANYTHING_PRESENT]]", "last_state_modified_date": "[[ANYTHING_PRESENT]]", @@ -83,7 +83,7 @@ } }], "OrganisationPolicyField" : { - "OrgPolicyCaseAssignedRole" : "GroupRole1", + "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference" : "ref", "Organisation" : { "OrganisationID" : "orgID1", diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.8.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.8.td.json similarity index 91% rename from src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.8.td.json rename to src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.8.td.json index d35aabed15..d6cf168e69 100644 --- a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.8.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.8.td.json @@ -21,7 +21,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "", @@ -54,14 +54,14 @@ "body": { "id": "[[ANYTHING_PRESENT]]", "jurisdiction": "BEFTA_MASTER", - "case_type_id": "FT_CaseAccessGroups_Align_Befta", + "case_type_id": "FT_CaseProfessionalGroupAccess", "created_date": "[[ANYTHING_PRESENT]]", "last_modified": "[[ANYTHING_PRESENT]]", "last_state_modified_date": "[[ANYTHING_PRESENT]]", "security_classification": "PUBLIC", "case_data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "GroupRole1", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "", diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.9.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.9.td.json similarity index 92% rename from src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.9.td.json rename to src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.9.td.json index 86cebb6fb5..973029c3f6 100644 --- a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026.9.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.9.td.json @@ -20,7 +20,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "GroupRole2", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", @@ -64,14 +64,14 @@ "body": { "id": "[[ANYTHING_PRESENT]]", "jurisdiction": "BEFTA_MASTER", - "case_type_id": "FT_CaseAccessGroups_Align_Befta", + "case_type_id": "FT_CaseProfessionalGroupAccess", "created_date": "[[ANYTHING_PRESENT]]", "last_modified": "[[ANYTHING_PRESENT]]", "last_state_modified_date": "[[ANYTHING_PRESENT]]", "security_classification": "PUBLIC", "case_data": { "OrganisationPolicyField" : { - "OrgPolicyCaseAssignedRole" : "GroupRole2", + "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_Org_Role", "OrgPolicyReference" : "ref", "Organisation" : { "OrganisationID" : "orgID1", diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026_GetCitizenCreateToken.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026_GetCitizenCreateToken.td.json similarity index 83% rename from src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026_GetCitizenCreateToken.td.json rename to src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026_GetCitizenCreateToken.td.json index 145e0f8981..06f903c1a0 100644 --- a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026_GetCitizenCreateToken.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026_GetCitizenCreateToken.td.json @@ -16,7 +16,7 @@ "request": { "pathVariables": { "jid": "BEFTA_MASTER", - "ctid": "FT_CaseAccessGroups_Align_Befta", + "ctid": "FT_CaseProfessionalGroupAccess", "etid": "createCase" } }, @@ -25,7 +25,7 @@ "body": { "case_details": { "jurisdiction": "BEFTA_MASTER", - "case_type_id": "FT_CaseAccessGroups_Align_Befta" + "case_type_id": "FT_CaseProfessionalGroupAccess" }, "event_id": "createCase" } diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026_GetCreateToken.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026_GetCreateToken.td.json similarity index 90% rename from src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026_GetCreateToken.td.json rename to src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026_GetCreateToken.td.json index 1a6a4cb08b..16e3a98fb8 100644 --- a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026_GetCreateToken.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026_GetCreateToken.td.json @@ -16,7 +16,7 @@ "request": { "pathVariables": { "jid": "BEFTA_MASTER", - "ctid": "FT_CaseAccessGroups_Align_Befta", + "ctid": "FT_CaseProfessionalGroupAccess", "etid": "createCase" } }, diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026_GetEventTokenBase.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026_GetEventTokenBase.td.json similarity index 100% rename from src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026_GetEventTokenBase.td.json rename to src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026_GetEventTokenBase.td.json diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026_GetUpdateTokenCaseworker.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026_GetUpdateTokenCaseworker.td.json similarity index 100% rename from src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026_GetUpdateTokenCaseworker.td.json rename to src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026_GetUpdateTokenCaseworker.td.json diff --git a/src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026_GetUpdateTokenCitizen.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026_GetUpdateTokenCitizen.td.json similarity index 100% rename from src/aat/resources/features/F-1026 - Align Befta Case update with caseAccessGroups/S-1026_GetUpdateTokenCitizen.td.json rename to src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026_GetUpdateTokenCitizen.td.json From bffc0b74ae0504ccc8390a1aeef926f9bf2f36f4 Mon Sep 17 00:00:00 2001 From: patelila Date: Wed, 11 Feb 2026 09:53:16 +0000 Subject: [PATCH 04/13] Changes to use FT_CaseProfessionalGroupAccess CaseProfessionalGroupAccess_Org_Rol and CaseProfessionalGroupAccess_GA_Role --- build.gradle | 2 +- .../F-1026_CreateCasePreRequisiteCaseworker.td.json | 8 ++++---- .../F-1026_CreateCasePreRequisiteCitizen.td.json | 8 ++++---- .../S-1026.1.td.json | 8 ++++---- .../S-1026.10.td.json | 8 ++++---- .../S-1026.11.td.json | 8 ++++---- .../S-1026.12.td.json | 8 ++++---- .../S-1026.13.td.json | 4 ++-- .../S-1026.14.td.json | 4 ++-- .../S-1026.15.td.json | 8 ++++---- .../S-1026.16.td.json | 8 ++++---- .../S-1026.17.td.json | 8 ++++---- .../S-1026.18.td.json | 8 ++++---- .../S-1026.2.td.json | 8 ++++---- .../S-1026.3.td.json | 4 ++-- .../S-1026.4.td.json | 4 ++-- .../S-1026.5.td.json | 8 ++++---- .../S-1026.6.td.json | 8 ++++---- .../S-1026.7.td.json | 8 ++++---- .../S-1026.8.td.json | 4 ++-- .../S-1026.9.td.json | 4 ++-- 21 files changed, 69 insertions(+), 69 deletions(-) diff --git a/build.gradle b/build.gradle index 3b0b1c3b6c..3f87db18fc 100644 --- a/build.gradle +++ b/build.gradle @@ -40,7 +40,7 @@ ext { testContainersVersion = '1.21.4' cucumber = '6.11.0' beftaFwVersion = '9.2.4' - ccdTestDefinitionVersion = '7.26.0-SNAPSHOT-CCD-7049_1' + ccdTestDefinitionVersion = '7.26.0-SNAPSHOT-CCD-7049_2' limits = [ 'instruction': 90, 'branch' : 85, diff --git a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026_CreateCasePreRequisiteCaseworker.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026_CreateCasePreRequisiteCaseworker.td.json index 2b5a9505f4..75fead3efc 100644 --- a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026_CreateCasePreRequisiteCaseworker.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026_CreateCasePreRequisiteCaseworker.td.json @@ -24,7 +24,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", @@ -62,19 +62,19 @@ "id": "[[ANY_STRING_NOT_NULLABLE]]", "value": { "caseAccessGroupType": "CCD:all-cases-access", - "caseAccessGroupId": "BEFTA_MASTER:orgID1" + "caseAccessGroupId": "BEFTA_MASTER:FT_CaseProfessionalGroupAccess:CaseProfessionalGroupAccess_GA_Role:orgID1" } }, { "id": "[[ANY_STRING_NOT_NULLABLE]]", "value": { "caseAccessGroupType": "CCD:all-cases-access", - "caseAccessGroupId": "BEFTA_MASTER:orgID1" + "caseAccessGroupId": "BEFTA_MASTER:FT_CaseProfessionalGroupAccess:CaseProfessionalGroupAccess_GA_Role:orgID1" } } ], "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", diff --git a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026_CreateCasePreRequisiteCitizen.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026_CreateCasePreRequisiteCitizen.td.json index cf5d30ed60..d53e5e848a 100644 --- a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026_CreateCasePreRequisiteCitizen.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026_CreateCasePreRequisiteCitizen.td.json @@ -25,7 +25,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", @@ -69,19 +69,19 @@ "id": "[[ANY_STRING_NOT_NULLABLE]]", "value": { "caseAccessGroupType": "CCD:all-cases-access", - "caseAccessGroupId": "BEFTA_MASTER:orgID1" + "caseAccessGroupId": "BEFTA_MASTER:FT_CaseProfessionalGroupAccess:CaseProfessionalGroupAccess_GA_Role:orgID1" } }, { "id": "[[ANY_STRING_NOT_NULLABLE]]", "value": { "caseAccessGroupType": "CCD:all-cases-access", - "caseAccessGroupId": "BEFTA_MASTER:orgID1" + "caseAccessGroupId": "BEFTA_MASTER:FT_CaseProfessionalGroupAccess:CaseProfessionalGroupAccess_GA_Role:orgID1" } } ], "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", diff --git a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.1.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.1.td.json index b4866d91c8..047df731bd 100644 --- a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.1.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.1.td.json @@ -19,7 +19,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", @@ -64,19 +64,19 @@ "id" : "[[ANY_STRING_NOT_NULLABLE]]", "value" : { "caseAccessGroupType" : "CCD:all-cases-access", - "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + "caseAccessGroupId" : "BEFTA_MASTER:FT_CaseProfessionalGroupAccess:CaseProfessionalGroupAccess_GA_Role:orgID1" } }, { "id" : "[[ANY_STRING_NOT_NULLABLE]]", "value" : { "caseAccessGroupType" : "CCD:all-cases-access", - "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + "caseAccessGroupId" : "BEFTA_MASTER:FT_CaseProfessionalGroupAccess:CaseProfessionalGroupAccess_GA_Role:orgID1" } } ], "OrganisationPolicyField" : { - "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference" : "ref", "Organisation" : { "OrganisationID" : "orgID1", diff --git a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.10.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.10.td.json index ef21cc8d14..aa0c9887ce 100644 --- a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.10.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.10.td.json @@ -17,7 +17,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", @@ -59,19 +59,19 @@ "id": "[[ANY_STRING_NOT_NULLABLE]]", "value": { "caseAccessGroupType": "CCD:all-cases-access", - "caseAccessGroupId": "BEFTA_MASTER:orgID1" + "caseAccessGroupId": "BEFTA_MASTER:FT_CaseProfessionalGroupAccess:CaseProfessionalGroupAccess_GA_Role:orgID1" } }, { "id": "[[ANY_STRING_NOT_NULLABLE]]", "value": { "caseAccessGroupType": "CCD:all-cases-access", - "caseAccessGroupId": "BEFTA_MASTER:orgID1" + "caseAccessGroupId": "BEFTA_MASTER:FT_CaseProfessionalGroupAccess:CaseProfessionalGroupAccess_GA_Role:orgID1" } } ], "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", diff --git a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.11.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.11.td.json index 3d0bf365e2..7a4ace3297 100644 --- a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.11.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.11.td.json @@ -19,7 +19,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", @@ -64,19 +64,19 @@ "id" : "[[ANY_STRING_NOT_NULLABLE]]", "value" : { "caseAccessGroupType" : "CCD:all-cases-access", - "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + "caseAccessGroupId" : "BEFTA_MASTER:FT_CaseProfessionalGroupAccess:CaseProfessionalGroupAccess_GA_Role:orgID1" } }, { "id" : "[[ANY_STRING_NOT_NULLABLE]]", "value" : { "caseAccessGroupType" : "CCD:all-cases-access", - "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + "caseAccessGroupId" : "BEFTA_MASTER:FT_CaseProfessionalGroupAccess:CaseProfessionalGroupAccess_GA_Role:orgID1" } } ], "OrganisationPolicyField" : { - "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference" : "ref", "Organisation" : { "OrganisationID" : "orgID1", diff --git a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.12.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.12.td.json index f5147c8364..18351991aa 100644 --- a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.12.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.12.td.json @@ -20,7 +20,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", @@ -72,18 +72,18 @@ "id" : "[[ANY_STRING_NOT_NULLABLE]]", "value" : { "caseAccessGroupType" : "CCD:all-cases-access", - "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + "caseAccessGroupId" : "BEFTA_MASTER:FT_CaseProfessionalGroupAccess:CaseProfessionalGroupAccess_GA_Role:orgID1" } }, { "id" : "[[ANY_STRING_NOT_NULLABLE]]", "value" : { "caseAccessGroupType" : "CCD:all-cases-access", - "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + "caseAccessGroupId" : "BEFTA_MASTER:FT_CaseProfessionalGroupAccess:CaseProfessionalGroupAccess_GA_Role:orgID1" } }], "OrganisationPolicyField" : { - "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference" : "ref", "Organisation" : { "OrganisationID" : "orgID1", diff --git a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.13.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.13.td.json index 6a289889c1..46b43b87bd 100644 --- a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.13.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.13.td.json @@ -21,7 +21,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "", @@ -61,7 +61,7 @@ "security_classification": "PUBLIC", "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "", diff --git a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.14.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.14.td.json index 6b6cd6d844..d9b3602c46 100644 --- a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.14.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.14.td.json @@ -20,7 +20,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", @@ -71,7 +71,7 @@ "security_classification": "PUBLIC", "data": { "OrganisationPolicyField" : { - "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference" : "ref", "Organisation" : { "OrganisationID" : "orgID1", diff --git a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.15.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.15.td.json index b8c367a49a..d2acfe2833 100644 --- a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.15.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.15.td.json @@ -17,7 +17,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", @@ -59,19 +59,19 @@ "id": "[[ANY_STRING_NOT_NULLABLE]]", "value": { "caseAccessGroupType": "CCD:all-cases-access", - "caseAccessGroupId": "BEFTA_MASTER:orgID1" + "caseAccessGroupId": "BEFTA_MASTER:FT_CaseProfessionalGroupAccess:CaseProfessionalGroupAccess_GA_Role:orgID1" } }, { "id": "[[ANY_STRING_NOT_NULLABLE]]", "value": { "caseAccessGroupType": "CCD:all-cases-access", - "caseAccessGroupId": "BEFTA_MASTER:orgID1" + "caseAccessGroupId": "BEFTA_MASTER:FT_CaseProfessionalGroupAccess:CaseProfessionalGroupAccess_GA_Role:orgID1" } } ], "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", diff --git a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.16.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.16.td.json index e509ab5d59..020216a784 100644 --- a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.16.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.16.td.json @@ -29,7 +29,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", @@ -76,19 +76,19 @@ "id" : "[[ANY_STRING_NOT_NULLABLE]]", "value" : { "caseAccessGroupType" : "CCD:all-cases-access", - "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + "caseAccessGroupId" : "BEFTA_MASTER:FT_CaseProfessionalGroupAccess:CaseProfessionalGroupAccess_GA_Role:orgID1" } }, { "id" : "[[ANY_STRING_NOT_NULLABLE]]", "value" : { "caseAccessGroupType" : "CCD:all-cases-access", - "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + "caseAccessGroupId" : "BEFTA_MASTER:FT_CaseProfessionalGroupAccess:CaseProfessionalGroupAccess_GA_Role:orgID1" } } ], "OrganisationPolicyField" : { - "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference" : "ref", "Organisation" : { "OrganisationID" : "orgID1", diff --git a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.17.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.17.td.json index 056264e8c4..430bf8aef9 100644 --- a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.17.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.17.td.json @@ -31,7 +31,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", @@ -78,19 +78,19 @@ "id" : "[[ANY_STRING_NOT_NULLABLE]]", "value" : { "caseAccessGroupType" : "CCD:all-cases-access", - "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + "caseAccessGroupId" : "BEFTA_MASTER:FT_CaseProfessionalGroupAccess:CaseProfessionalGroupAccess_GA_Role:orgID1" } }, { "id" : "[[ANY_STRING_NOT_NULLABLE]]", "value" : { "caseAccessGroupType" : "CCD:all-cases-access", - "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + "caseAccessGroupId" : "BEFTA_MASTER:FT_CaseProfessionalGroupAccess:CaseProfessionalGroupAccess_GA_Role:orgID1" } } ], "OrganisationPolicyField" : { - "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference" : "ref", "Organisation" : { "OrganisationID" : "orgID1", diff --git a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.18.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.18.td.json index 396715099b..4e0dac0ed8 100644 --- a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.18.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.18.td.json @@ -32,7 +32,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", @@ -74,19 +74,19 @@ "id" : "[[ANY_STRING_NOT_NULLABLE]]", "value" : { "caseAccessGroupType" : "CCD:all-cases-access", - "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + "caseAccessGroupId" : "BEFTA_MASTER:FT_CaseProfessionalGroupAccess:CaseProfessionalGroupAccess_GA_Role:orgID1" } }, { "id" : "[[ANY_STRING_NOT_NULLABLE]]", "value" : { "caseAccessGroupType" : "CCD:all-cases-access", - "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + "caseAccessGroupId" : "BEFTA_MASTER:FT_CaseProfessionalGroupAccess:CaseProfessionalGroupAccess_GA_Role:orgID1" } } ], "OrganisationPolicyField" : { - "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference" : "ref", "Organisation" : { "OrganisationID" : "orgID1", diff --git a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.2.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.2.td.json index 709676162a..bf0e6b872f 100644 --- a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.2.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.2.td.json @@ -20,7 +20,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", @@ -72,18 +72,18 @@ "id" : "[[ANY_STRING_NOT_NULLABLE]]", "value" : { "caseAccessGroupType" : "CCD:all-cases-access", - "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + "caseAccessGroupId" : "BEFTA_MASTER:FT_CaseProfessionalGroupAccess:CaseProfessionalGroupAccess_GA_Role:orgID1" } }, { "id" : "[[ANY_STRING_NOT_NULLABLE]]", "value" : { "caseAccessGroupType" : "CCD:all-cases-access", - "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + "caseAccessGroupId" : "BEFTA_MASTER:FT_CaseProfessionalGroupAccess:CaseProfessionalGroupAccess_GA_Role:orgID1" } }], "OrganisationPolicyField" : { - "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference" : "ref", "Organisation" : { "OrganisationID" : "orgID1", diff --git a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.3.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.3.td.json index 95740a51a6..3a8d758a5f 100644 --- a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.3.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.3.td.json @@ -21,7 +21,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "", @@ -61,7 +61,7 @@ "security_classification": "PUBLIC", "case_data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "", diff --git a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.4.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.4.td.json index 96761906e3..a2eee0aca2 100644 --- a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.4.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.4.td.json @@ -20,7 +20,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", @@ -71,7 +71,7 @@ "security_classification": "PUBLIC", "case_data": { "OrganisationPolicyField" : { - "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference" : "ref", "Organisation" : { "OrganisationID" : "orgID1", diff --git a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.5.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.5.td.json index e40b0fd472..4143057489 100644 --- a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.5.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.5.td.json @@ -17,7 +17,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", @@ -59,19 +59,19 @@ "id": "[[ANY_STRING_NOT_NULLABLE]]", "value": { "caseAccessGroupType": "CCD:all-cases-access", - "caseAccessGroupId": "BEFTA_MASTER:orgID1" + "caseAccessGroupId": "BEFTA_MASTER:FT_CaseProfessionalGroupAccess:CaseProfessionalGroupAccess_GA_Role:orgID1" } }, { "id": "[[ANY_STRING_NOT_NULLABLE]]", "value": { "caseAccessGroupType": "CCD:all-cases-access", - "caseAccessGroupId": "BEFTA_MASTER:orgID1" + "caseAccessGroupId": "BEFTA_MASTER:FT_CaseProfessionalGroupAccess:CaseProfessionalGroupAccess_GA_Role:orgID1" } } ], "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", diff --git a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.6.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.6.td.json index 51902e3e33..fb790435e1 100644 --- a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.6.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.6.td.json @@ -19,7 +19,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", @@ -64,19 +64,19 @@ "id" : "[[ANY_STRING_NOT_NULLABLE]]", "value" : { "caseAccessGroupType" : "CCD:all-cases-access", - "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + "caseAccessGroupId" : "BEFTA_MASTER:FT_CaseProfessionalGroupAccess:CaseProfessionalGroupAccess_GA_Role:orgID1" } }, { "id" : "[[ANY_STRING_NOT_NULLABLE]]", "value" : { "caseAccessGroupType" : "CCD:all-cases-access", - "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + "caseAccessGroupId" : "BEFTA_MASTER:FT_CaseProfessionalGroupAccess:CaseProfessionalGroupAccess_GA_Role:orgID1" } } ], "OrganisationPolicyField" : { - "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference" : "ref", "Organisation" : { "OrganisationID" : "orgID1", diff --git a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.7.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.7.td.json index e4ef60a63d..e5d8adac10 100644 --- a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.7.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.7.td.json @@ -20,7 +20,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", @@ -72,18 +72,18 @@ "id" : "[[ANY_STRING_NOT_NULLABLE]]", "value" : { "caseAccessGroupType" : "CCD:all-cases-access", - "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + "caseAccessGroupId" : "BEFTA_MASTER:FT_CaseProfessionalGroupAccess:CaseProfessionalGroupAccess_GA_Role:orgID1" } }, { "id" : "[[ANY_STRING_NOT_NULLABLE]]", "value" : { "caseAccessGroupType" : "CCD:all-cases-access", - "caseAccessGroupId" : "BEFTA_MASTER:orgID1" + "caseAccessGroupId" : "BEFTA_MASTER:FT_CaseProfessionalGroupAccess:CaseProfessionalGroupAccess_GA_Role:orgID1" } }], "OrganisationPolicyField" : { - "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference" : "ref", "Organisation" : { "OrganisationID" : "orgID1", diff --git a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.8.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.8.td.json index d6cf168e69..c13ef5afeb 100644 --- a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.8.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.8.td.json @@ -21,7 +21,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "", @@ -61,7 +61,7 @@ "security_classification": "PUBLIC", "case_data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "", diff --git a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.9.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.9.td.json index 973029c3f6..fc541436c1 100644 --- a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.9.td.json +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.9.td.json @@ -20,7 +20,7 @@ "body": { "data": { "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference": "ref", "Organisation": { "OrganisationID": "orgID1", @@ -71,7 +71,7 @@ "security_classification": "PUBLIC", "case_data": { "OrganisationPolicyField" : { - "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_Org_Role", + "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_GA_Role", "OrgPolicyReference" : "ref", "Organisation" : { "OrganisationID" : "orgID1", From 563d12349fdd6538b8e12fddb694a102ce546eb6 Mon Sep 17 00:00:00 2001 From: patelila Date: Thu, 12 Feb 2026 09:16:57 +0000 Subject: [PATCH 05/13] Removing these tests as the definition file does not have the data required to test these scenarios. However, they are tested in FT-1023 so no worries. --- .../F-1026.feature | 33 ------- .../S-1026.14.td.json | 90 ------------------ .../S-1026.4.td.json | 91 ------------------- .../S-1026.9.td.json | 91 ------------------- 4 files changed, 305 deletions(-) delete mode 100644 src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.14.td.json delete mode 100644 src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.4.td.json delete mode 100644 src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.9.td.json diff --git a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026.feature b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026.feature index 27e6e0ccd7..ed5377b5ca 100644 --- a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026.feature +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026.feature @@ -46,17 +46,6 @@ Feature: F-1026: Submit Case Creation Handle CaseAccessGroups And the response has all other details as expected And the response [contains updated values for case_data and data_classification] - @S-1026.4 #AC-4 #AC-10 of CCD-5324 - Scenario: CaseAccessGroups field contains valid caseAccessGroupType value but case data invalid and Submit Case Creation Event is invoked on v1_external#/case-details-endpoint/saveCaseDetailsForCaseWorkerUsingPOST - Given a user with [an active profile in CCD] - When a request is prepared with appropriate values - And the request [contains correctly configured values] - And the request [is of caseType where caseAccessGroupType = CCD:all-cases-access and -OrganisationPolicyField- CaseAssignedRoleField field exists in caseData and case data has Organisation.OrganisationID value not set to empty value but accessType does not have GroupRoleName] - And it is submitted to call the [Submit case creation as Case worker] operation of [CCD Data Store] - Then a positive response is received - And the response has all other details as expected - And the response [contains updated values for case_data and data_classification] - @S-1026.5 #Testing Blank value Scenario: Invoke saveCaseDetailsForCaseWorkerUsingPOST and caseAccessGroups field contains blank value Given a user with [an active profile in CCD] @@ -109,17 +98,6 @@ Feature: F-1026: Submit Case Creation Handle CaseAccessGroups And the response has all other details as expected And the response [contains updated values for case_data and data_classification] - @S-1026.9 #AC-9 #AC-10 of CCD-5324 - Scenario: CaseAccessGroups field contains valid caseAccessGroupType value but case data invalid and Submit Case Creation Event is invoked on v1_external#/case-details-endpoint/saveCaseDetailsForCitizenUsingPOST - Given a user with [an active profile in CCD] - When a request is prepared with appropriate values - And the request [contains correctly configured values] - And the request [is of caseType where caseAccessGroupType = CCD:all-cases-access and -OrganisationPolicyField- CaseAssignedRoleField field exists in caseData and case data has Organisation.OrganisationID value not set to empty value but accessType does not have GroupRoleName] - And it is submitted to call the [Submit case creation as Citizen] operation of [CCD Data Store] - Then a positive response is received - And the response has all other details as expected - And the response [contains updated values for case_data and data_classification] - @S-1026.10 #Testing Blank value Scenario: Invoke saveCaseDetailsForCitizenUsingPOST and caseAccessGroups field contains blank value Given a user with [an active profile in CCD] @@ -171,17 +149,6 @@ Feature: F-1026: Submit Case Creation Handle CaseAccessGroups And the response has all other details as expected And the response [contains updated values for data and data_classification] - @S-1026.14 #AC-14 - Scenario: CaseAccessGroups field contains valid caseAccessGroupType value but case data invalid and Submit Case Creation Event is invoked on v2_external#/case-controller/createCaseUsingPOST - Given a user with [an active profile in CCD] - When a request is prepared with appropriate values - And the request [contains correctly configured values] - And the request [is of caseType where caseAccessGroupType = CCD:all-cases-access and -OrganisationPolicyField- CaseAssignedRoleField field exists in caseData and case data has Organisation.OrganisationID value not set to empty value but accessType does not have GroupRoleName] - And it is submitted to call the [Submit case creation as Case worker (V2)] operation of [CCD Data Store] - Then a positive response is received - And the response has all other details as expected - And the response [contains updated values for data and data_classification] - @S-1026.15 #Testing Blank value Scenario: Invoke v2_external#/case-controller/createCaseUsingPOST and caseAccessGroups field contains blank value Given a user with [an active profile in CCD] diff --git a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.14.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.14.td.json deleted file mode 100644 index d9b3602c46..0000000000 --- a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.14.td.json +++ /dev/null @@ -1,90 +0,0 @@ -{ - "_guid_": "S-1026.14", - "_extends_": "F-1026_Test_Data_Base_V2", - "title": "Invoke v2_external#/case-controller/createCaseUsingPOST and caseAccessGroupId created", - - "prerequisites" : [ { - "Token_Creation": "S-1026_GetCreateToken" - } - ], - "specs": [ - "an active profile in CCD", - "contains some OrganisationPolicy fields with all correct values", - "is of caseType where caseAccessGroupType = CCD:all-cases-access and -OrganisationPolicyField- CaseAssignedRoleField field exists in caseData and case data has Organisation.OrganisationID value not set to empty value but accessType does not have GroupRoleName", - "Submit case creation as Case worker (V2)", - "contains correctly configured values", - "contains updated values for data and data_classification" - - ], - "request": { - "body": { - "data": { - "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_GA_Role", - "OrgPolicyReference": "ref", - "Organisation": { - "OrganisationID": "orgID1", - "OrganisationName": "orgName1" - } - }, - "CaseAccessGroups": [ - { - "value": { - "caseAccessGroupId": "test", - "caseAccessGroupType": "CCD:all-cases-access" - }, - "id": null - } - ] - }, - "event": { - "id": "createCase" - }, - "event_token": "${[scenarioContext][childContexts][Token_Creation][testData][actualResponse][body][token]}", - "event_data": { - "CaseAccessGroups": [ - { - "value": { - "caseAccessGroupId": "test", - "caseAccessGroupType": "CCD:all-cases-access" - }, - "id": null - } - ] - } - } - }, - "expectedResponse": { - "_extends_": "Common_201_Response", - "headers": { - "Content-Encoding": "gzip", - "vary": "accept-encoding", - "Content-Length": "[[ANYTHING_PRESENT]]" - }, - "body": { - "_links" : "[[ANYTHING_PRESENT]]", - "id": "[[ANYTHING_PRESENT]]", - "jurisdiction": "BEFTA_MASTER", - "created_on": "[[ANYTHING_PRESENT]]", - "last_modified_on": "[[ANYTHING_PRESENT]]", - "last_state_modified_on": "[[ANYTHING_PRESENT]]", - "security_classification": "PUBLIC", - "data": { - "OrganisationPolicyField" : { - "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_GA_Role", - "OrgPolicyReference" : "ref", - "Organisation" : { - "OrganisationID" : "orgID1", - "OrganisationName" : "orgName1" - } - } - }, - "data_classification" : {} - }, - "after_submit_callback_response": null, - "callback_response_status_code": null, - "callback_response_status": null, - "delete_draft_response_status_code": null, - "delete_draft_response_status": null - } -} diff --git a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.4.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.4.td.json deleted file mode 100644 index a2eee0aca2..0000000000 --- a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.4.td.json +++ /dev/null @@ -1,91 +0,0 @@ -{ - "_guid_": "S-1026.4", - "_extends_": "F-1026_Test_Data_Base", - "title": "Invoke saveCaseDetailsForCaseWorkerUsingPOST and caseAccessGroupId created", - - "prerequisites" : [ { - "Token_Creation": "S-1026_GetCreateToken" - } - ], - "specs": [ - "an active profile in CCD", - "contains some OrganisationPolicy fields with all correct values", - "is of caseType where caseAccessGroupType = CCD:all-cases-access and -OrganisationPolicyField- CaseAssignedRoleField field exists in caseData and case data has Organisation.OrganisationID value not set to empty value but accessType does not have GroupRoleName", - "Submit case creation as Case worker", - "contains correctly configured values", - "contains updated values for case_data and data_classification" - - ], - "request": { - "body": { - "data": { - "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_GA_Role", - "OrgPolicyReference": "ref", - "Organisation": { - "OrganisationID": "orgID1", - "OrganisationName": "orgName1" - } - }, - "CaseAccessGroups": [ - { - "value": { - "caseAccessGroupId": "test", - "caseAccessGroupType": "CCD:all-cases-access" - }, - "id": null - } - ] - }, - "event": { - "id": "createCase" - }, - "event_token": "${[scenarioContext][childContexts][Token_Creation][testData][actualResponse][body][token]}", - "event_data": { - "CaseAccessGroups": [ - { - "value": { - "caseAccessGroupId": "test", - "caseAccessGroupType": "CCD:all-cases-access" - }, - "id": null - } - ] - } - } - }, - "expectedResponse": { - "_extends_": "Common_201_Response", - "headers": { - "Content-Encoding": "gzip", - "vary": "accept-encoding", - "Content-Length": "[[ANYTHING_PRESENT]]" - }, - "body": { - "id": "[[ANYTHING_PRESENT]]", - "jurisdiction": "BEFTA_MASTER", - "case_type_id": "FT_CaseProfessionalGroupAccess", - "created_date": "[[ANYTHING_PRESENT]]", - "last_modified": "[[ANYTHING_PRESENT]]", - "last_state_modified_date": "[[ANYTHING_PRESENT]]", - "security_classification": "PUBLIC", - "case_data": { - "OrganisationPolicyField" : { - "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_GA_Role", - "OrgPolicyReference" : "ref", - "Organisation" : { - "OrganisationID" : "orgID1", - "OrganisationName" : "orgName1" - } - } - }, - "data_classification" : {} - }, - "supplementary_data" : null, - "after_submit_callback_response": null, - "callback_response_status_code": null, - "callback_response_status": null, - "delete_draft_response_status_code": null, - "delete_draft_response_status": null - } -} diff --git a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.9.td.json b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.9.td.json deleted file mode 100644 index fc541436c1..0000000000 --- a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/S-1026.9.td.json +++ /dev/null @@ -1,91 +0,0 @@ -{ - "_guid_": "S-1026.9", - "_extends_": "F-1026_Test_Data_Citizen_Base", - "title": "Invoke saveCaseDetailsForCitizenUsingPOST and caseAccessGroupId created", - - "prerequisites" : [ { - "Token_Creation": "S-1026_GetCitizenCreateToken" - } - ], - "specs": [ - "an active profile in CCD", - "contains some OrganisationPolicy fields with all correct values", - "is of caseType where caseAccessGroupType = CCD:all-cases-access and -OrganisationPolicyField- CaseAssignedRoleField field exists in caseData and case data has Organisation.OrganisationID value not set to empty value but accessType does not have GroupRoleName", - "Submit case creation as Citizen", - "contains correctly configured values", - "contains updated values for case_data and data_classification" - - ], - "request": { - "body": { - "data": { - "OrganisationPolicyField": { - "OrgPolicyCaseAssignedRole": "CaseProfessionalGroupAccess_GA_Role", - "OrgPolicyReference": "ref", - "Organisation": { - "OrganisationID": "orgID1", - "OrganisationName": "orgName1" - } - }, - "CaseAccessGroups": [ - { - "value": { - "caseAccessGroupId": "test", - "caseAccessGroupType": "CCD:all-cases-access" - }, - "id": null - } - ] - }, - "event": { - "id": "createCase" - }, - "event_token": "${[scenarioContext][childContexts][Token_Creation][testData][actualResponse][body][token]}", - "event_data": { - "CaseAccessGroups": [ - { - "value": { - "caseAccessGroupId": "test", - "caseAccessGroupType": "CCD:all-cases-access" - }, - "id": null - } - ] - } - } - }, - "expectedResponse": { - "_extends_": "Common_201_Response", - "headers": { - "Content-Encoding": "gzip", - "vary": "accept-encoding", - "Content-Length": "[[ANYTHING_PRESENT]]" - }, - "body": { - "id": "[[ANYTHING_PRESENT]]", - "jurisdiction": "BEFTA_MASTER", - "case_type_id": "FT_CaseProfessionalGroupAccess", - "created_date": "[[ANYTHING_PRESENT]]", - "last_modified": "[[ANYTHING_PRESENT]]", - "last_state_modified_date": "[[ANYTHING_PRESENT]]", - "security_classification": "PUBLIC", - "case_data": { - "OrganisationPolicyField" : { - "OrgPolicyCaseAssignedRole" : "CaseProfessionalGroupAccess_GA_Role", - "OrgPolicyReference" : "ref", - "Organisation" : { - "OrganisationID" : "orgID1", - "OrganisationName" : "orgName1" - } - } - }, - "data_classification" : {} - }, - "supplementary_data" : null, - "after_submit_callback_response": null, - "callback_response_status_code": null, - "callback_response_status": null, - "delete_draft_response_status_code": null, - "delete_draft_response_status": null - } -} From a066670b49f799bef73efd125f30ecca61aa64c8 Mon Sep 17 00:00:00 2001 From: patelila Date: Thu, 12 Feb 2026 10:06:15 +0000 Subject: [PATCH 06/13] feature name change --- .../F-1026.feature | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026.feature b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026.feature index ed5377b5ca..3c7d5f615c 100644 --- a/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026.feature +++ b/src/aat/resources/features/F-1026 - Align Professional Access Management Case update with caseAccessGroups/F-1026.feature @@ -1,5 +1,5 @@ @F-1026 # Aligning the Professional Access Management capability -Feature: F-1026: Submit Case Creation Handle CaseAccessGroups +Feature: F-1026: Align Professional Access Management Case update with caseAccessGroups Background: Load test data for the scenario Given an appropriate test context as detailed in the test data source From 9bf72c9b780157d21a34368f5059232a0bd49fdd Mon Sep 17 00:00:00 2001 From: Ila Patel <137802184+patelila@users.noreply.github.com> Date: Mon, 9 Mar 2026 10:46:53 +0000 Subject: [PATCH 07/13] Update build.gradle --- build.gradle | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/build.gradle b/build.gradle index 0b7a7acb97..a2538263bb 100644 --- a/build.gradle +++ b/build.gradle @@ -246,7 +246,7 @@ dependencies { implementation group: 'com.github.hmcts', name: 'service-auth-provider-java-client', version: '5.3.3' implementation group: 'com.github.hmcts', name: 'idam-java-client', version: '3.0.5' implementation group: 'com.github.hmcts', name: 'ccd-case-document-am-client', version: '1.59.2' - implementation group: 'com.github.hmcts.java-logging', name: 'logging', version: '6.1.9' + implementation group: 'com.github.hmcts.java-logging', name: 'logging', version: '8.0.0' implementation group: 'com.auth0', name: 'java-jwt', version: '4.5.1' implementation group: 'com.google.guava', name: 'guava', version: '33.5.0-jre' From f422b7f21c4c59989732450b8a9681f78fabca84 Mon Sep 17 00:00:00 2001 From: patelila Date: Thu, 12 Mar 2026 09:43:02 +0000 Subject: [PATCH 08/13] Use Update BEFTA_MASTER_GROUPACCESS access defaults release --- build.gradle | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/build.gradle b/build.gradle index a1026e9078..cd5b74cbfe 100644 --- a/build.gradle +++ b/build.gradle @@ -40,7 +40,7 @@ ext { testContainersVersion = '1.21.4' cucumber = '7.34.3' beftaFwVersion = '9.2.4' - ccdTestDefinitionVersion = '7.26.0-SNAPSHOT-CCD-7049_2' + ccdTestDefinitionVersion = '7.26.0-SNAPSHOT-CCD-7049_3' limits = [ 'instruction': 90, 'branch' : 85, From f565591c83c588314655dca6e700c449ebed2537 Mon Sep 17 00:00:00 2001 From: patelila Date: Thu, 12 Mar 2026 16:09:36 +0000 Subject: [PATCH 09/13] changes so def-store and data-store each get used correctly for true tests to occur --- Jenkinsfile_CNP | 25 ++++++++++++++++--- .../values.preview.template.yaml | 3 ++- 2 files changed, 23 insertions(+), 5 deletions(-) diff --git a/Jenkinsfile_CNP b/Jenkinsfile_CNP index 00b8d254da..94ea3629c4 100644 --- a/Jenkinsfile_CNP +++ b/Jenkinsfile_CNP @@ -19,6 +19,10 @@ def product = "ccd" def component = "data-store-api" def branchesToSync = ['demo', 'ithc', 'perftest', 'develop'] +// Variables to switch pipeline logic and wiring per type of build. +def definitionStoreDevelopPr = "PR-1709" +def dataStoreApiDevelopPr = "PR-2779" +def prsToUseAat = "PR-1793,PR-1888" GradleBuilder builder = new GradleBuilder(this, product) def secrets = [ @@ -115,6 +119,11 @@ env.BEFTA_RETRY_NON_RETRYABLE_HTTP_METHODS = "POST,PUT" // Prevent Docker hub rate limit errors by ensuring that testcontainers uses images from hmctspublic ACR env.TESTCONTAINERS_HUB_IMAGE_NAME_PREFIX = "hmctspublic.azurecr.io/imported/" +//enable BEFTA logging +env.LOGGING_LEVEL_UK_GOV_HMCTS_CCD = "DEBUG" +env.BEFTA_HTTP_LOGGING_ENABLED = "true" + + withPipeline(type, product, component) { onMaster { enableSlackNotifications('#ccd-master-builds') @@ -122,6 +131,10 @@ withPipeline(type, product, component) { // AppPipelineDsl.PactRoles.PROVIDER // ]) } + if (env.BRANCH_NAME.equalsIgnoreCase(dataStoreApiDevelopPr)) { + enableSlackNotifications('#ccd-develop-builds') + env.ELASTIC_SEARCH_FTA_ENABLED = "true" + } onDemo { enableSlackNotifications('#ccd-demo-builds') } @@ -133,10 +146,14 @@ withPipeline(type, product, component) { } // Check if the build should be wired to an environment higher than 'preview'. - if (env.BRANCH_NAME == 'master' || env.BRANCH_NAME == 'demo' || env.BRANCH_NAME == 'perftest' || env.BRANCH_NAME == 'ithc') { + if (env.BRANCH_NAME == 'master' || env.BRANCH_NAME == 'demo' || env.BRANCH_NAME == 'perftest' || + env.BRANCH_NAME == 'ithc' || + prsToUseAat.toLowerCase().contains(env.BRANCH_NAME.toLowerCase())) { + env.ELASTIC_SEARCH_FTA_ENABLED = "true" env.DEFINITION_STORE_HOST = "http://ccd-definition-store-api-aat.service.core-compute-aat.internal" } else { - env.DEFINITION_STORE_URL_BASE = "https://ccd-definition-store-ccd-data-store-api-${env.BRANCH_NAME}.preview.platform.hmcts.net".toLowerCase() + //env.DEFINITION_STORE_URL_BASE = "https://ccd-definition-store-ccd-data-store-api-${env.BRANCH_NAME}.preview.platform.hmcts.net".toLowerCase() + env.DEFINITION_STORE_URL_BASE = "https://ccd-definition-store-api-${definitionStoreDevelopPr}.preview.platform.hmcts.net".toLowerCase() env.DEFINITION_STORE_HOST = env.DEFINITION_STORE_URL_BASE } @@ -160,10 +177,10 @@ withPipeline(type, product, component) { copyIgnore('./build/reports/tests/integration', './Integration Tests/') steps.archiveArtifacts allowEmptyArchive: true, artifacts: '**/Integration Tests/**/*' - + copyIgnore('./build/reports/tests/test', './Unit Tests/') steps.archiveArtifacts allowEmptyArchive: true, artifacts: '**/Unit Tests/**/*' - + publishHTML target: [ allowMissing : true, alwaysLinkToLastBuild: true, diff --git a/charts/ccd-data-store-api/values.preview.template.yaml b/charts/ccd-data-store-api/values.preview.template.yaml index 696373792b..0450ca3e51 100644 --- a/charts/ccd-data-store-api/values.preview.template.yaml +++ b/charts/ccd-data-store-api/values.preview.template.yaml @@ -29,7 +29,8 @@ java: DATA_STORE_DB_PASSWORD: "{{ .Values.postgresql.auth.password}}" DATA_STORE_DB_OPTIONS: "?stringtype=unspecified" DATA_STORE_DB_MAX_POOL_SIZE: 10 - DEFINITION_STORE_HOST: http://${SERVICE_NAME}-ccd-definition-store + #DEFINITION_STORE_HOST: http://${SERVICE_NAME}-ccd-definition-store + DEFINITION_STORE_HOST: http://ccd-definition-store-api-pr-1709-java/ USER_PROFILE_HOST: http://${SERVICE_NAME}-ccd-user-profile-api ROLE_ASSIGNMENT_URL: http://${SERVICE_NAME}-am-role-assignment-service ELASTIC_SEARCH_ENABLED: true From b92e7898fb129adc07c51ddcb28292e043dd84bd Mon Sep 17 00:00:00 2001 From: patelila Date: Fri, 13 Mar 2026 11:45:26 +0000 Subject: [PATCH 10/13] Migrate deprecated ACR references to hmctsprod across Dockerfile, Helm charts, ACB template, and Jenkins pipelines --- Dockerfile | 2 +- Jenkinsfile_CNP | 4 ++-- Jenkinsfile_nightly | 4 ++-- acb.tpl.yaml | 4 ++-- charts/ccd-data-store-api/Chart.yaml | 4 ++-- charts/ccd-data-store-api/values.preview.template.yaml | 8 ++++---- charts/ccd-data-store-api/values.yaml | 2 +- 7 files changed, 14 insertions(+), 14 deletions(-) diff --git a/Dockerfile b/Dockerfile index 6fc9cab769..502fb7f05a 100644 --- a/Dockerfile +++ b/Dockerfile @@ -3,7 +3,7 @@ ARG JAVA_OPTS="-Djava.security.egd=file:/dev/./urandom" ARG APP_INSIGHTS_AGENT_VERSION=3.7.7 ARG PLATFORM="" -FROM hmctspublic.azurecr.io/base/java${PLATFORM}:21-distroless +FROM hmctsprod.azurecr.io/base/java${PLATFORM}:21-distroless USER hmcts LABEL maintainer="https://github.com/hmcts/ccd-data-store-api" diff --git a/Jenkinsfile_CNP b/Jenkinsfile_CNP index 94ea3629c4..60b6ee032d 100644 --- a/Jenkinsfile_CNP +++ b/Jenkinsfile_CNP @@ -116,8 +116,8 @@ env.BEFTA_RETRY_MAX_ATTEMPTS = "3" env.BEFTA_RETRY_STATUS_CODES = "500,502,503,504" env.BEFTA_RETRY_MAX_DELAY = "1000" env.BEFTA_RETRY_NON_RETRYABLE_HTTP_METHODS = "POST,PUT" -// Prevent Docker hub rate limit errors by ensuring that testcontainers uses images from hmctspublic ACR -env.TESTCONTAINERS_HUB_IMAGE_NAME_PREFIX = "hmctspublic.azurecr.io/imported/" +// Prevent Docker hub rate limit errors by ensuring that testcontainers uses images from hmctsprod ACR +env.TESTCONTAINERS_HUB_IMAGE_NAME_PREFIX = "hmctsprod.azurecr.io/imported/" //enable BEFTA logging env.LOGGING_LEVEL_UK_GOV_HMCTS_CCD = "DEBUG" diff --git a/Jenkinsfile_nightly b/Jenkinsfile_nightly index 3812977cde..60d57c4334 100644 --- a/Jenkinsfile_nightly +++ b/Jenkinsfile_nightly @@ -81,8 +81,8 @@ def vaultOverrides = [ // vars needed for functional tests // Assume a feature build branched off 'develop', with dependencies develop-to-develop. env.TEST_URL = "http://ccd-data-store-api-aat.service.core-compute-aat.internal" -// Prevent Docker hub rate limit errors by ensuring that testcontainers uses images from hmctspublic ACR -env.TESTCONTAINERS_HUB_IMAGE_NAME_PREFIX = "hmctspublic.azurecr.io/imported/" +// Prevent Docker hub rate limit errors by ensuring that testcontainers uses images from hmctsprod ACR +env.TESTCONTAINERS_HUB_IMAGE_NAME_PREFIX = "hmctsprod.azurecr.io/imported/" // Other env variables needed for BEFTA. env.BEFTA_S2S_CLIENT_ID = "ccd_gw" diff --git a/acb.tpl.yaml b/acb.tpl.yaml index 730b380a3d..2f4555af09 100644 --- a/acb.tpl.yaml +++ b/acb.tpl.yaml @@ -1,7 +1,7 @@ version: 1.0-preview-1 steps: - id: pull-base-image-amd64 - cmd: docker pull --platform linux/amd64 hmctspublic.azurecr.io/base/java:21-distroless && docker tag hmctspublic.azurecr.io/base/java:21-distroless hmctspublic.azurecr.io/base/java/linux/amd64:21-distroless + cmd: docker pull --platform linux/amd64 hmctsprod.azurecr.io/base/java:21-distroless && docker tag hmctsprod.azurecr.io/base/java:21-distroless hmctsprod.azurecr.io/base/java/linux/amd64:21-distroless when: ["-"] retries: 3 retryDelay: 5 @@ -18,7 +18,7 @@ steps: retryDelay: 5 - id: pull-base-image-arm64 - cmd: docker pull --platform linux/arm64 hmctspublic.azurecr.io/base/java:21-distroless && docker tag hmctspublic.azurecr.io/base/java:21-distroless hmctspublic.azurecr.io/base/java/linux/arm64:21-distroless + cmd: docker pull --platform linux/arm64 hmctsprod.azurecr.io/base/java:21-distroless && docker tag hmctsprod.azurecr.io/base/java:21-distroless hmctsprod.azurecr.io/base/java/linux/arm64:21-distroless when: - pull-base-image-amd64 retries: 3 diff --git a/charts/ccd-data-store-api/Chart.yaml b/charts/ccd-data-store-api/Chart.yaml index 88984aaf76..1f158978ec 100644 --- a/charts/ccd-data-store-api/Chart.yaml +++ b/charts/ccd-data-store-api/Chart.yaml @@ -9,7 +9,7 @@ maintainers: dependencies: - name: java version: 5.3.0 - repository: 'oci://hmctspublic.azurecr.io/helm' + repository: 'oci://hmctsprod.azurecr.io/helm' - name: elasticsearch version: 7.17.3 repository: 'https://helm.elastic.co' @@ -20,5 +20,5 @@ dependencies: condition: elastic.enabled - name: ccd version: 9.2.2 - repository: 'oci://hmctspublic.azurecr.io/helm' + repository: 'oci://hmctsprod.azurecr.io/helm' condition: ccd.enabled diff --git a/charts/ccd-data-store-api/values.preview.template.yaml b/charts/ccd-data-store-api/values.preview.template.yaml index 0450ca3e51..b12199ce13 100644 --- a/charts/ccd-data-store-api/values.preview.template.yaml +++ b/charts/ccd-data-store-api/values.preview.template.yaml @@ -93,7 +93,7 @@ ccd: ccd-definition-store-api: java: ingressHost: ccd-definition-store-${SERVICE_FQDN} - image: hmctspublic.azurecr.io/ccd/definition-store-api:latest + image: hmctsprod.azurecr.io/ccd/definition-store-api:latest imagePullPolicy: Always devmemoryRequests: 2048Mi devcpuRequests: 2000m @@ -117,7 +117,7 @@ ccd: ccd-user-profile-api: java: ingressHost: ccd-user-profile-api-${SERVICE_FQDN} - image: hmctspublic.azurecr.io/ccd/user-profile-api:latest + image: hmctsprod.azurecr.io/ccd/user-profile-api:latest imagePullPolicy: Always environment: USER_PROFILE_DB_HOST: "{{ .Release.Name }}-postgresql" @@ -179,13 +179,13 @@ elasticsearch: # paths: # - path: / logstash: - image: "hmctspublic.azurecr.io/imported/logstash/logstash" + image: "hmctsprod.azurecr.io/imported/logstash/logstash" imageTag: "7.16.1" imagePullPolicy: "IfNotPresent" logstashJavaOpts: "-Xmx1g -Xms512M" extraInitContainers: | - name: download-postgres-jdbc - image: hmctspublic.azurecr.io/curl:7.70.0 + image: hmctsprod.azurecr.io/curl:7.70.0 command: ['curl', '-L', 'https://jdbc.postgresql.org/download/postgresql-42.2.18.jar', '-o', '/logstash-lib/postgresql.jar'] volumeMounts: - name: logstash-lib diff --git a/charts/ccd-data-store-api/values.yaml b/charts/ccd-data-store-api/values.yaml index c2ae820393..9bb268fecd 100644 --- a/charts/ccd-data-store-api/values.yaml +++ b/charts/ccd-data-store-api/values.yaml @@ -4,7 +4,7 @@ ccd: enabled: false java: - image: 'hmctspublic.azurecr.io/ccd/data-store-api:latest' + image: 'hmctsprod.azurecr.io/ccd/data-store-api:latest' ingressHost: ccd-data-store-api-{{ .Values.global.environment }}.service.core-compute-{{ .Values.global.environment }}.internal applicationPort: 4452 aadIdentityName: ccd From 89f7f7b8804a36953b14c40975c21bdcf5101ef4 Mon Sep 17 00:00:00 2001 From: hmcts-jenkins-a-to-c <62422075+hmcts-jenkins-a-to-c[bot]@users.noreply.github.com> Date: Fri, 13 Mar 2026 11:47:10 +0000 Subject: [PATCH 11/13] Bumping chart version/ fixing aliases --- charts/ccd-data-store-api/Chart.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/charts/ccd-data-store-api/Chart.yaml b/charts/ccd-data-store-api/Chart.yaml index 1f158978ec..69dc755e86 100644 --- a/charts/ccd-data-store-api/Chart.yaml +++ b/charts/ccd-data-store-api/Chart.yaml @@ -2,7 +2,7 @@ description: Helm chart for the HMCTS CCD Data Store name: ccd-data-store-api apiVersion: v2 home: https://github.com/hmcts/ccd-data-store-api -version: 2.0.37 +version: 2.0.38 maintainers: - name: HMCTS CCD Dev Team email: ccd-devops@HMCTS.NET From 1f2f3cefe0217e9401f3c09e012bc0777fa42905 Mon Sep 17 00:00:00 2001 From: patelila Date: Fri, 13 Mar 2026 15:37:34 +0000 Subject: [PATCH 12/13] Set Lombok Jacksonized config to Jackson2 to remove ambiguity warnings --- lombok.config | 1 + 1 file changed, 1 insertion(+) diff --git a/lombok.config b/lombok.config index df71bb6a0f..e4e935d15b 100644 --- a/lombok.config +++ b/lombok.config @@ -1,2 +1,3 @@ config.stopBubbling = true lombok.addLombokGeneratedAnnotation = true +lombok.jacksonized.jacksonVersion += 2 From 6627d105d58e16efe7320313c1af0021b5f2fc7b Mon Sep 17 00:00:00 2001 From: Rebecca Baker Date: Mon, 16 Mar 2026 12:27:16 +0000 Subject: [PATCH 13/13] CCD-6049 update preview setup --- Jenkinsfile_CNP | 16 +++------------- .../values.preview.template.yaml | 5 ++--- 2 files changed, 5 insertions(+), 16 deletions(-) diff --git a/Jenkinsfile_CNP b/Jenkinsfile_CNP index 60b6ee032d..34c479f831 100644 --- a/Jenkinsfile_CNP +++ b/Jenkinsfile_CNP @@ -19,10 +19,6 @@ def product = "ccd" def component = "data-store-api" def branchesToSync = ['demo', 'ithc', 'perftest', 'develop'] -// Variables to switch pipeline logic and wiring per type of build. -def definitionStoreDevelopPr = "PR-1709" -def dataStoreApiDevelopPr = "PR-2779" -def prsToUseAat = "PR-1793,PR-1888" GradleBuilder builder = new GradleBuilder(this, product) def secrets = [ @@ -131,10 +127,7 @@ withPipeline(type, product, component) { // AppPipelineDsl.PactRoles.PROVIDER // ]) } - if (env.BRANCH_NAME.equalsIgnoreCase(dataStoreApiDevelopPr)) { - enableSlackNotifications('#ccd-develop-builds') - env.ELASTIC_SEARCH_FTA_ENABLED = "true" - } + onDemo { enableSlackNotifications('#ccd-demo-builds') } @@ -146,14 +139,11 @@ withPipeline(type, product, component) { } // Check if the build should be wired to an environment higher than 'preview'. - if (env.BRANCH_NAME == 'master' || env.BRANCH_NAME == 'demo' || env.BRANCH_NAME == 'perftest' || - env.BRANCH_NAME == 'ithc' || - prsToUseAat.toLowerCase().contains(env.BRANCH_NAME.toLowerCase())) { + if (env.BRANCH_NAME == 'master' || env.BRANCH_NAME == 'demo' || env.BRANCH_NAME == 'perftest' || env.BRANCH_NAME == 'ithc') { env.ELASTIC_SEARCH_FTA_ENABLED = "true" env.DEFINITION_STORE_HOST = "http://ccd-definition-store-api-aat.service.core-compute-aat.internal" } else { - //env.DEFINITION_STORE_URL_BASE = "https://ccd-definition-store-ccd-data-store-api-${env.BRANCH_NAME}.preview.platform.hmcts.net".toLowerCase() - env.DEFINITION_STORE_URL_BASE = "https://ccd-definition-store-api-${definitionStoreDevelopPr}.preview.platform.hmcts.net".toLowerCase() + env.DEFINITION_STORE_URL_BASE = "https://ccd-definition-store-ccd-data-store-api-${env.BRANCH_NAME}.preview.platform.hmcts.net".toLowerCase() env.DEFINITION_STORE_HOST = env.DEFINITION_STORE_URL_BASE } diff --git a/charts/ccd-data-store-api/values.preview.template.yaml b/charts/ccd-data-store-api/values.preview.template.yaml index b12199ce13..3a19bfc47f 100644 --- a/charts/ccd-data-store-api/values.preview.template.yaml +++ b/charts/ccd-data-store-api/values.preview.template.yaml @@ -29,8 +29,7 @@ java: DATA_STORE_DB_PASSWORD: "{{ .Values.postgresql.auth.password}}" DATA_STORE_DB_OPTIONS: "?stringtype=unspecified" DATA_STORE_DB_MAX_POOL_SIZE: 10 - #DEFINITION_STORE_HOST: http://${SERVICE_NAME}-ccd-definition-store - DEFINITION_STORE_HOST: http://ccd-definition-store-api-pr-1709-java/ + DEFINITION_STORE_HOST: http://${SERVICE_NAME}-ccd-definition-store USER_PROFILE_HOST: http://${SERVICE_NAME}-ccd-user-profile-api ROLE_ASSIGNMENT_URL: http://${SERVICE_NAME}-am-role-assignment-service ELASTIC_SEARCH_ENABLED: true @@ -93,7 +92,7 @@ ccd: ccd-definition-store-api: java: ingressHost: ccd-definition-store-${SERVICE_FQDN} - image: hmctsprod.azurecr.io/ccd/definition-store-api:latest + image: hmctsprod.azurecr.io/ccd/definition-store-api:pr-1709-1f616d1-20260312162137 imagePullPolicy: Always devmemoryRequests: 2048Mi devcpuRequests: 2000m