Align PIV/CAC setup-after-sign-in specs to user behavior#10939
Conversation
changelog: Internal, Automated Testing, Align PIV/CAC setup-after-sign-in specs to user behavior
|
I'm intentionally trying to keep the scope here limited, but follow-on tasks include:
|
| def multi_factor_auth_added_piv_cac( | ||
| enabled_mfa_methods_count:, | ||
| in_account_creation_flow:, | ||
| method_name: :piv_cac, |
There was a problem hiding this comment.
With the event being mult_factor_auth_added_piv_cac, what information would be captured in method_name?
There was a problem hiding this comment.
Yeah, I'm honestly not really sure I see the value in logging method_name. I kept it here just for parity with how it worked previously. I could imagine a potential query where someone filters like filter properties.event_properties.method_name = 'piv_cac' without an event name, since some other events follow this pattern as well (e.g. 'Multi-Factor Authentication: Added phone'). But I kinda doubt that's common? We could create a follow-up ticket to investigate if we're querying that way and remove the redundant event property if unused.
There was a problem hiding this comment.
And to clarify, this change was necessary because it was flagged by our undocumented analytics parameters checker. It wasn't flagged previously because sign_in_spec.rb still exempts itself from these checks, but creating a new feature test file without the exemptions caused it to be caught.
There was a problem hiding this comment.
This is just the default, was added a long time ago but I do wonder if we still need it.
* Align PIV/CAC setup-after-sign-in specs to user behavior changelog: Internal, Automated Testing, Align PIV/CAC setup-after-sign-in specs to user behavior * Remove unused code for PIV/CAC token processing
🎫 Ticket
Supports LG-13477 (#10918)
🛠 Summary of changes
Updates feature specs targeting the expected behavior for prompting a user to add a PIV to their account after signing in when having previously failed logging in with PIV due to the card not being associated with a user.
Specifically:
features/users/sign_in_spec.rbin checkstub_piv_cac_serviceto behave more realistically to the deployed user behaviorPivCacSetupFromSignInController/present_piv_cac(PivCacAuthenticationSetupController)📜 Testing Plan
Verify specs pass:
Ensure no regressions in the expected behavior: