Bits In Glass
BIG Pega COE Team

Detailed Acceptance Criteria (ACs)

Category: CA Train

This report presents the exact business rules dynamically extracted from the legacy system. Rules are formatted in an Agile/BDD Given/When/Then structure, offering a bridge between business requirements and technical implementation constraints. Component rules have been logically grouped into feature sets.

🎯 CA Train Scope Detected: Extracted 21 rules, Optimally Merged into 7 Feature Scenarios.
R-GCCIH-cbl-00001 (+6) File: GCCIH.cbl Overview Rules Merged 7 Rules
Action Rules (from EDI)
👔 Business Narrative
Business Logic Rules for 'Overview Rules':
  • Context - a message processing operation is initiated:
    For 1:Initialize Program Control:
    When the system begins message processing, then the current program name is saved and the module name becomes the active program identifier.
  • Context - a new ih notification needs to be processed:
    For 2:Prepare IH Notification Data:
    When the notification data structure is being prepared, then the input structure is initialized and security byte is set to high values for maximum security.
  • Context - ih notification data is prepared with security controls:
    For 3:Format CCN Status Message:
    When the ccn status message is being formatted, then the 91-byte input data is moved to positions 2-91 of the message structure and the formatted input is copied to the message area.
  • Context - a ccn status message is formatted and ready for processing:
    For 3:Format CCN Status Message:
    When the message is prepared for transmission, then the accept status is set to spaces to indicate a cleared/ready state.
  • Context - a formatted ccn status message with cleared accept status:
    For 4:Send Initial IMS Message:
    When the message is sent for initial processing, then the cims service is invoked with change operation parameters to process the message.
  • Context - a message has been processed through initial ims processing:
    For 5:Write Message Log:
    When the message logging is performed, then the writmsgl service is invoked with message code, content, length, and module name for complete audit logging.
  • Context - a message has been processed and logged successfully:
    For 6:Purge IMS Message:
    When the cleanup operation is performed, then the cims service is invoked with purge operation to remove the processed message from the system.
👨‍💻 Technical ACs (Gherkin)
Context: A message processing operation is initiated
GIVEN
A message processing operation is initiated
Applied to: 1:Initialize Program Control
WHEN
The system begins message processing
THEN
The current program name is saved and the module name becomes the active program identifier
Context: A new IH notification needs to be processed
GIVEN
A new IH notification needs to be processed
Applied to: 2:Prepare IH Notification Data
WHEN
The notification data structure is being prepared
THEN
The input structure is initialized and security byte is set to high values for maximum security
Context: IH notification data is prepared with security controls
GIVEN
IH notification data is prepared with security controls
Applied to: 3:Format CCN Status Message
WHEN
The CCN status message is being formatted
THEN
The 91-byte input data is moved to positions 2-91 of the message structure and the formatted input is copied to the message area
Context: A CCN status message is formatted and ready for processing
GIVEN
A CCN status message is formatted and ready for processing
Applied to: 3:Format CCN Status Message
WHEN
The message is prepared for transmission
THEN
The accept status is set to spaces to indicate a cleared/ready state
Context: A formatted CCN status message with cleared accept status
GIVEN
A formatted CCN status message with cleared accept status
Applied to: 4:Send Initial IMS Message
WHEN
The message is sent for initial processing
THEN
The CIMS service is invoked with change operation parameters to process the message
Context: A message has been processed through initial IMS processing
GIVEN
A message has been processed through initial IMS processing
Applied to: 5:Write Message Log
WHEN
The message logging is performed
THEN
The WRITMSGL service is invoked with message code, content, length, and module name for complete audit logging
Context: A message has been processed and logged successfully
GIVEN
A message has been processed and logged successfully
Applied to: 6:Purge IMS Message
WHEN
The cleanup operation is performed
THEN
The CIMS service is invoked with purge operation to remove the processed message from the system
R-GCCIH-cbl-00008 (+1) File: GCCIH.cbl Initialize Program Control Merged 2 Rules
Action Rules (from EDI)
👔 Business Narrative
Business Logic Rules for 'Initialize Program Control':
  • Context - a program control initialization process is starting:
    For Save Current Program Name - CC-PROG → PROG-NAME-SAVED:
    When the system needs to track the current program context, then the current program identifier must be saved to preserve execution context.
  • Context - the current program context has been preserved:
    For Set Module Name for Tracking - MODULE-NAME → CC-PROG:
    When the system switches to module execution mode, then the module name must be assigned as the current program identifier for tracking purposes.
👨‍💻 Technical ACs (Gherkin)
Context: A program control initialization process is starting
GIVEN
A program control initialization process is starting
Applied to: Save Current Program Name - CC-PROG → PROG-NAME-SAVED
WHEN
The system needs to track the current program context
THEN
The current program identifier must be saved to preserve execution context
Context: The current program context has been preserved
GIVEN
The current program context has been preserved
Applied to: Set Module Name for Tracking - MODULE-NAME → CC-PROG
WHEN
The system switches to module execution mode
THEN
The module name must be assigned as the current program identifier for tracking purposes
R-GCCIH-cbl-00010 (+2) File: GCCIH.cbl Prepare IH Notification Data Merged 3 Rules
Action Rules (from EDI)
👔 Business Narrative
Business Logic Rules for 'Prepare IH Notification Data':
  • Context - a ccn status notification needs to be processed:
    For Clear Input Structure:
    When the system begins preparing the ih notification data, then the gcx153-input structure is initialized to clear any previous data.
  • Context - the input structure has been initialized for ccn status notification:
    For Set Security Parameters to High Values:
    When security parameters need to be established, then the gcx153-security-byte is set to high-values to enforce maximum security level.
  • Context - the input structure is initialized and security parameters are set:
    For Input Structure Ready for CCN Status:
    When ccn status data needs to be loaded into the notification structure, then 91 bytes of gcwih data are moved to positions 2-91 of gcx153-input structure.
👨‍💻 Technical ACs (Gherkin)
Context: A CCN status notification needs to be processed
GIVEN
A CCN status notification needs to be processed
Applied to: Clear Input Structure
WHEN
The system begins preparing the IH notification data
THEN
The GCX153-INPUT structure is initialized to clear any previous data
Context: The input structure has been initialized for CCN status notification
GIVEN
The input structure has been initialized for CCN status notification
Applied to: Set Security Parameters to High Values
WHEN
Security parameters need to be established
THEN
The GCX153-SECURITY-BYTE is set to HIGH-VALUES to enforce maximum security level
Context: The input structure is initialized and security parameters are set
GIVEN
The input structure is initialized and security parameters are set
Applied to: Input Structure Ready for CCN Status
WHEN
CCN status data needs to be loaded into the notification structure
THEN
91 bytes of GCWIH data are moved to positions 2-91 of GCX153-INPUT structure
R-GCCIH-cbl-00013 (+3) File: GCCIH.cbl Format CCN Status Message Merged 4 Rules
Action Rules (from EDI)
👔 Business Narrative
Business Logic Rules for 'Format CCN Status Message':
  • Context - gcwih input structure contains ccn data in positions 1 through 91:
    For Extract CCN Data from GCWIH:
    When ccn data extraction is initiated, then 91 bytes of ccn data are extracted from gcwih starting at position 1.
  • Context - 91 bytes of ccn data have been extracted from gcwih:
    For Move CCN Data to Input Structure Position 2-92:
    When ccn data is moved to the input structure, then ccn data is placed in positions 2 through 92 of gcx153-input structure.
  • Context - a ccn status message is being prepared:
    For Move CCN Data to Input Structure Position 2-92:
    When security initialization is performed, then the security byte is set to high-values indicating maximum security level.
  • Context - gcx153-input structure contains properly formatted ccn data with security byte:
    For Transfer Formatted Input to IH Message Structure:
    When message structure transfer is initiated, then the complete formatted input is transferred to gct1531e-msg for ih processing.
👨‍💻 Technical ACs (Gherkin)
Context: GCWIH input structure contains CCN data in positions 1 through 91
GIVEN
GCWIH input structure contains CCN data in positions 1 through 91
Applied to: Extract CCN Data from GCWIH
WHEN
CCN data extraction is initiated
THEN
91 bytes of CCN data are extracted from GCWIH starting at position 1
Context: 91 bytes of CCN data have been extracted from GCWIH
GIVEN
91 bytes of CCN data have been extracted from GCWIH
Applied to: Move CCN Data to Input Structure Position 2-92
WHEN
CCN data is moved to the input structure
THEN
CCN data is placed in positions 2 through 92 of GCX153-INPUT structure
Context: A CCN status message is being prepared
GIVEN
A CCN status message is being prepared
Applied to: Move CCN Data to Input Structure Position 2-92
WHEN
Security initialization is performed
THEN
The security byte is set to HIGH-VALUES indicating maximum security level
Context: GCX153-INPUT structure contains properly formatted CCN data with security byte
GIVEN
GCX153-INPUT structure contains properly formatted CCN data with security byte
Applied to: Transfer Formatted Input to IH Message Structure
WHEN
Message structure transfer is initiated
THEN
The complete formatted input is transferred to GCT1531E-MSG for IH processing
R-GCCIH-cbl-00017 File: GCCIH.cbl Send Initial IMS Message
Action Rules (from EDI)
👔 Business Narrative
Business Logic Rules for 'Send Initial IMS Message':
  • Context - message input data has been prepared in gcx153-input structure and accept status is cleared:
    For Execute CIMS Call with CHNG Function:
    When system calls cims program with chng function using cccom, alt-pcb, and gct1531e parameters, then ims message processing is initiated for the prepared message.
👨‍💻 Technical ACs (Gherkin)
Context: Message input data has been prepared in GCX153-INPUT structure and accept status is cleared
GIVEN
Message input data has been prepared in GCX153-INPUT structure and accept status is cleared
Applied to: Execute CIMS Call with CHNG Function
WHEN
System calls CIMS program with CHNG function using CCCOM, ALT-PCB, and GCT1531E parameters
THEN
IMS message processing is initiated for the prepared message
R-GCCIH-cbl-00018 (+1) File: GCCIH.cbl Write Message Log Merged 2 Rules
Action Rules (from EDI)
👔 Business Narrative
Business Logic Rules for 'Write Message Log':
  • Context - a ccn status notification message needs to be logged:
    For Prepare Log Parameters:
    When the system prepares logging parameters, then the message code, message content, message length, and module name are made available for the logging operation.
  • Context - all logging parameters are prepared for the ccn status message:
    For Call WRITMSGL Program:
    When the system calls the writmsgl program with message code, message content, message length, and module name, then the writmsgl program is invoked to log the ccn status notification message.
👨‍💻 Technical ACs (Gherkin)
Context: A CCN status notification message needs to be logged
GIVEN
A CCN status notification message needs to be logged
Applied to: Prepare Log Parameters
WHEN
The system prepares logging parameters
THEN
The message code, message content, message length, and module name are made available for the logging operation
Context: All logging parameters are prepared for the CCN status message
GIVEN
All logging parameters are prepared for the CCN status message
Applied to: Call WRITMSGL Program
WHEN
The system calls the WRITMSGL program with message code, message content, message length, and module name
THEN
The WRITMSGL program is invoked to log the CCN status notification message
R-GCCIH-cbl-00020 (+1) File: GCCIH.cbl Purge IMS Message Merged 2 Rules
Action Rules (from EDI)
👔 Business Narrative
Business Logic Rules for 'Purge IMS Message':
  • Context - message processing has been completed and logged:
    For Execute PURG Function:
    When system initiates message cleanup process, then cims program is called with purg function to purge the message.
  • Context - message has been processed and purge function has been executed:
    For Complete Message Processing:
    When all message operations are completed, then system returns control to the calling program to complete the process.
👨‍💻 Technical ACs (Gherkin)
Context: Message processing has been completed and logged
GIVEN
Message processing has been completed and logged
Applied to: Execute PURG Function
WHEN
System initiates message cleanup process
THEN
CIMS program is called with PURG function to purge the message
Context: Message has been processed and purge function has been executed
GIVEN
Message has been processed and purge function has been executed
Applied to: Complete Message Processing
WHEN
All message operations are completed
THEN
System returns control to the calling program to complete the process