Skip to content

Deploy RC 386 to Prod#10747

Merged
aduth merged 20 commits intostages/prodfrom
stages/rc-2024-06-04
Jun 4, 2024
Merged

Deploy RC 386 to Prod#10747
aduth merged 20 commits intostages/prodfrom
stages/rc-2024-06-04

Conversation

@aduth
Copy link
Contributor

@aduth aduth commented Jun 3, 2024

User-Facing Improvements

  • Footer Links: Add Accessibility Statement link to footer (#10717)
  • Personal key profile recovery: Add label for personal key input (#10695)

Bug Fixes

  • Security: Fix CORS stopping POST for OIDC RP-Initiated Logout 1.0 (#10697)

Internal

  • Analytics: Document analytics for critical-path sign-in flow (#10736)
  • Analytics: Remove sp_request_requested_attributes from completion events (#10737)
  • Code Quality: Remove unused Attempts API code (#10732)
  • Configuration: Remove unused configuration keys (#10730)
  • Database: Remove unused database field (#10735)
  • Dependencies: Update dependencies to resolve security advisories (#10744)
  • OIDC: Fix missing action for OIDC test route (#10721)
  • Reporting: Adds users failing fraud review to DIVR (#10741)
  • Source code: Increase unit test coverage (#10739)

Upcoming Features

  • Aggregated Sign-In Email: Fix new device notification on reuathentication (#10731)

lmgeorge and others added 19 commits May 30, 2024 12:33
* LG-7434: Allow cross origin for POST OIDC Logout

**Why**:

- It is expected that requests will be made by relying parties on external domains

- The specification for OpenID Connect RP-Initiated Logout 1.0 requires
  both HTTP `GET` and `POST` methods to be supported.
  See: https://openid.net/specs/openid-connect-rpinitiated-1_0.html#RPLogout

**How**:

- The same OpenID Provider endpoint shall be used, `/openid_connect/logout`, but the
  request data must be sent as part of the body and use form
  serialization as required for  HTTP `POST` requests (RFC 9110, sec. 9.3.3).

- Disables Rail's CSRF token verification for the POST route only

- `POST` requests will redirect to the `GET` endpoint on the OpenID Provider's API for consistent behavior and handling.

resolves https://gitlab.login.gov/lg-people/lg-people-appdev/protocols/openid-connect/-/issues/3

changelog: Bug Fixes, Security, Fix CORS stopping POST for OIDC RP-Initiated Logout 1.0
changelog: Internal, OIDC, Fix missing action for OIDC test route
We performed an A/B test to determine which of the following so higher rates of OTP confirmation for voice OTPs:

1. 6 character alphanumeric OTPs
2. 10 digit voice OTPs

Analysis of the results determined that 10 digit numeric voice OTPs outperform 6 character alphanumeric voice OTPs.

This commit makes the state where 10 digit voice OTPs are sent during proofing the state for all users requesting voice OTPs during proofing. This commit also removes the code to support the A/B test.

[skip changelog]
In #10722 we added an argument for passing the service provider issuer to the `ResolutionProofingJob` evenutally this will be used for things like computing SP costs, creating `DocAuthLog` records, and determining the UUID prefix in the job.

This commit starts passing the issuer to the job but does not start using it. In order to ensure that results are consistent a future commit will start reading the issue once all of the web hosts are passing it to the job.

This can only be safely merged once #10722 is fully deployed.

[skip changelog]
…10724)

We ran an A/B test in late 2023 to measure differences between LexisNexis InstantVerify workflows. That test concluded on 01/03/2024. The code to support it got left behind. This commit removes it.

[skip changelog]
changelog: Internal, Configuration, Remove unused configuration keys
* LG-13269: Add Accessibility Statement link to footer

changelog: User-Facing Improvements, Footer Links, Add Accessibility Statement link to footer

* Reduce spacing at small viewports

Avoid collapsing on mobile as much as possible

* Remove margin from language picker at mobile

* Temporarily exempt missing translation key

* Add DoS translations for accessibility statement

* Normalize YAML
…10735)

changelog: Internal, Database, Remove unused database field
* Document analytics for critical-path sign-in flow

changelog: Internal, Analytics, Document analytics for critical-path sign-in flow

* Remove unnecessary allowed_extra_analytics

* Restore allowed_extra_analytics

* Fix typos and readability

Co-authored-by: Zach Margolis <zachmargolis@users.noreply.github.com>

---------

Co-authored-by: Zach Margolis <zachmargolis@users.noreply.github.com>
* LG-13419: Fix new device notification on reuathentication

changelog: Upcoming Features, Aggregated Sign-In Email, Fix new device notification on reuathentication

* Add spec coverage for authenticating with PIV

* Make set_new_device_session argument non-optional

See: #10731 (comment)

* Update existing assertions for set_new_device_session
changelog: Internal, Analytics, Remove sp_request_requested_attributes from completion events
- Accidentally forgot to commit as part of #10720

changelog: Internal, Source code, Increase unit test coverage
)

* Move log_irs_threatmetrix_fraud_check_event to VerifyInfoConcern

Couple changes:

1. Move log_irs_threatmetrix_fraud_check_event to VerifyInfoConcern
2. Move the logging out of `add_proofing_costs`, which we are trying to move out of VerifyInfoConcern

[skip changelog]

* Restore comment about source of transaction_id

* Split log_irs_threatmetrix_fraud_check_event into two methods

This method does two separate things:

1. Create a FraudReviewRequest that is used to track a user's fraud review
2. Sends an event to the attempts api

So this commit splits it in two.
* Move log_irs_threatmetrix_fraud_check_event to VerifyInfoConcern

Couple changes:

1. Move log_irs_threatmetrix_fraud_check_event to VerifyInfoConcern
2. Move the logging out of `add_proofing_costs`, which we are trying to move out of VerifyInfoConcern

[skip changelog]

* Restore comment about source of transaction_id

* Split log_irs_threatmetrix_fraud_check_event into two methods

This method does two separate things:

1. Create a FraudReviewRequest that is used to track a user's fraud review
2. Sends an event to the attempts api

So this commit splits it in two.

* Remove unused AAMVA DocAuthLog tracking

This state_tracking_enabled flag was never turned on in prod, and as a result this entire method is not used.

[skip changelog]

* Add `aamva` to ignored_columns for DocAuthLog

We aren't using this column and will want to drop it someday.

* Remove references to DocAuthLog.aamva in specs
* Update to newest saml_idp
* changelog: Bug Fixes, SAML validation, Fixes namespacing issue on the DigestMethod node
changelog: Internal, Dependencies, Update dependencies to resolve security advisories
* Remove unused Attempts API code

changelog: Internal, Code Quality, Remove unused Attempts API code

* Revert query changes to exclude IRS Attempts API events

See: #10732 (comment)

* Inline rate_limit_reached with arguments

See: #10732 (comment)

Co-authored-by: Zach Margolis <zachmargolis@users.noreply.github.com>

* Revert adding ignored_columns for irs_attempts_api_enabled

See: #10732 (comment)

---------

Co-authored-by: Zach Margolis <zachmargolis@users.noreply.github.com>
* changelog: User-Facing Improvements, Personal key profile recovery, add label for personal key input

* remove aria-label
Adds "Fraud review rejected" to report.

changelog: Internal, Reporting, Adds users failing fraud review to DIVR
@Sgtpluck
Copy link
Contributor

Sgtpluck commented Jun 4, 2024

since #10734 was reverted, should we remove it from the description?

@aduth
Copy link
Contributor Author

aduth commented Jun 4, 2024

since #10734 was reverted, should we remove it from the description?

Yep, good call. 👍 Updated.

@aduth aduth merged commit af39df3 into stages/prod Jun 4, 2024
@aduth aduth deleted the stages/rc-2024-06-04 branch June 4, 2024 17:37
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

8 participants