Skip to content

Deploy RC 393 to Production#10881

Merged
jmhooper merged 11 commits intostages/prodfrom
stages/rc-2024-06-27
Jun 27, 2024
Merged

Deploy RC 393 to Production#10881
jmhooper merged 11 commits intostages/prodfrom
stages/rc-2024-06-27

Conversation

@jmhooper
Copy link
Copy Markdown
Contributor

Internal

  • Analytics: Remove analytics event route (#10876)
  • Analytics: Removes now-redundant ssn_is_unique check (#10833)
  • GpoMail: Query optimization (#10852)
  • Reporting: Update unique users logic in combined-invoice-supplement-report-v2 (#10869)
  • Reporting: Fix query error in fraud metrics reporting (#10874)
  • Reporting: Fix queries across multiple internal reports (#10875)

Upcoming Features

  • Aggregated Sign-In Email: Avoid sending new device email after account creation (#10877)
  • In-person proofing: Backfill sponsor id (#10872)

n1zyy and others added 11 commits June 24, 2024 13:55
* Simplify queries with GpoConfirmationCode relationship

changelog: Internal, GpoMail, Query optimization

* updated_at -> created_at
* Document parameters for verify proofing results event

[skip changelog]

* Use dots to separate nested option keys

* Apply .compact before logging

* Analytics: remove nil args from happy hybrid path

* Analytics: remove nil args from happy path

* Analytics: Remove nil args from gpo path test

* Analytics: Remove nil args from in person test

* Analytics: Remove nil args from happy selfie tests
…l to the `ResolutionProofingJob` (#10827)

We deprecated this argument in #10796. This commit stops invoking the job with the argument. A future commit should remove the argument from the job.

[skip changelog]
…0864)

This commit begins the process of splitting the `Idv::ByMail::RequestLetter` controller into 2 separate controllers:

1. A controller for requesting a letter in the IdV workflow
2. A controller for requesting a new letter after the IdV workflow from the enter-code step

This change is being made because the current `Idv::ByMail::RequestLetter` controller is built like an IdV-Step controller but has some hacks to enable it to be visited outside the IdV flow to support resends. These exceptions lead to a number of inconsistencies that risk becoming bugs as we make changes to the GPO flow.

This commit makes the first part of the change: Adding the new controller and setting up routes for it. A future change will start directing traffic to the new routes and a further change will remove the old routes.

[skip changelog]
* Stub AWS cloudwatch at a lower level to create a failing test for fraud report

* Fix fraud report query that was missing "limit 10000"

changelog: Internal, Reporting, Fix query error in fraud metrics reporting
* Add unique users across all IAL level to UniqueMonthlyAuthCountsByIaa
* Add unique users across all IAL levels to TotalMonthlyAuthCountsWithinIaaWindow
* Update unique users in CombinedInvoiceSupplementReportV2 (LG-13703)

- remove iaa_ial1_plus_2_unique_users
- remove issuer_ial1_plus_2_unique_users
- add iaa_unique_users
- add issuer_unique_users

changelog: Internal, Reporting, Update unique users logic in combined-invoice-supplement-report-v2
* draft rake task to backfill sponsor id in all envs

* changelog: Upcoming Features, In-person proofing, backfill sponsor id

* finish rake task to backfill sponsor id in all envs

* ensure that sponsor id is a string and not an integer
Now that BackgroundProofingJob logs ssn_is_unique, we can pull it out
of VerifyInfoConcern.

This does move where in the giant analytics blob this is logged,
but this shouldn't have a significant impact on anything.

changelog: Internal, Analytics, Removes now-redundant ssn_is_unique check
This documentation is now served by the [Internal Handbook itself](https://gitlab.login.gov/lg-public/identity-internal-handbook/-/merge_requests/10), so the IdP no longer needs to provide it.

changelog: Internal, Analytics, Remove analytics event route
changelog: Upcoming Features, Aggregated Sign-In Email, Avoid sending new device email after account creation
* Set ensure_complete_logs: false for MfaReport

- This report uses an aggregate "stats" query, ensure_complete_logs does not
  necessarily make sense when the results are pre-aggregated

* Use more realistic stubbing in Reporting::DropOffReport specs
* Use more realistic stubbing in Reporting::AuthenticationReport specs

* Update Protocols report to not use ensure_complete_logs

- Each query has some sort of aggregation or deduping, so ensure_complete_logs
  would not have expected behavior

changelog: Internal, Reporting, Fix queries across multiple internal reports
@jmhooper jmhooper merged commit 796951e into stages/prod Jun 27, 2024
@jmhooper jmhooper deleted the stages/rc-2024-06-27 branch June 27, 2024 20:17
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants