Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
24 commits
Select commit Hold shift + click to select a range
d052f80
Add Feature Flag to Conditionally Call VA Mock API (#7004)
gangelo Sep 22, 2022
c52b51b
changelog: Internal, OpenID Connect Logout, Remove unused OpenID Conn…
Sep 22, 2022
e46ffc6
LG-7469 Standardize naming conventions (#7010)
olatifflexion Sep 22, 2022
6f861fe
Speed up feature_management_spec.rb by removing use of browser (#7005)
zachmargolis Sep 22, 2022
90ac2c1
Recompile Sass after exception when watching files (#7009)
aduth Sep 22, 2022
063d350
use deliver later for ipp results emails (#7007)
Sep 22, 2022
6cb7589
LG-7602 Pull VA IP Data and Store It In Session (#7008)
gangelo Sep 22, 2022
6be4a5e
LG-7275 Expand metrics for USPS proofing attempts (#6967)
eileen-nava Sep 22, 2022
0fa7516
changelog: Bug Fixes, Email Confirmation, Fix link in email when conf…
Sep 22, 2022
d71f47b
LG-7602 Pull VA IP Data and Store It In Session (InheritedProofingCon…
gangelo Sep 23, 2022
5d9ec6a
Include U.S. territories in allowed countries for IdV phone (#7016)
aduth Sep 23, 2022
52c19fc
LG-7648: Create PR template (#7015)
eileen-nava Sep 23, 2022
4b6ebbc
LG-7602 Pull VA IP Data and Store It In Session (Controller and Flow …
gangelo Sep 23, 2022
b0b171d
LG-6387: Make CTA button more prominent (#6986)
jmdembe Sep 23, 2022
54cd883
LG-7417 Standardize failure responses (#7006)
ThatSpaceGuy Sep 24, 2022
7d0115f
Update add_email to build its URL once and re-use it (#7021)
zachmargolis Sep 26, 2022
41914fb
Remove isConnected check in phone input JavaScript (#7026)
Sep 26, 2022
5915efd
Remove feature specs related to FSMv2 (#7014)
aduth Sep 26, 2022
399e9bb
Send the address to AAMVA (#7011)
jmhooper Sep 26, 2022
f43f000
Add mock ThreatMetrix Javascript implementation (LG-7174) (#7018)
zachmargolis Sep 26, 2022
b79159c
Improve changelog tool flexibility for commit messages (#7027)
aduth Sep 26, 2022
a49111a
lg-7150 add login icon alt text (#7023)
svalexander Sep 26, 2022
688a0d1
LG-6896: Send 'fraud suspected' in-person proofing failed email (#7013)
svalexander Sep 26, 2022
cf21ea5
Merge remote-tracking branch 'origin/stages/prod' into stages/rc-2022…
solipet Sep 26, 2022
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
26 changes: 26 additions & 0 deletions app/assets/stylesheets/utilities/_typography.scss
Original file line number Diff line number Diff line change
Expand Up @@ -99,3 +99,29 @@ h6,
.h6 {
@extend %h6;
}

.separator-text {
display: flex;
align-items: center;
text-align: center;
font-size: 1.125rem;
margin-top: 32px;
margin-bottom: 16px;

&::before,
&::after {
content: '';
display: block;
border-bottom: 1px solid color('primary-light');
flex-grow: 1;
min-width: 2rem;
}

&::before {
margin-right: 1rem;
}

&::after {
margin-left: 1rem;
}
}
2 changes: 1 addition & 1 deletion app/controllers/account_reset/delete_account_controller.rb
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ def delete

irs_attempts_api_tracker.account_reset_account_deleted(
success: result.success?,
failure_reason: result.errors,
failure_reason: irs_attempts_api_tracker.parse_failure_reason(result),
)
if result.success?
handle_successful_deletion(result)
Expand Down
34 changes: 34 additions & 0 deletions app/controllers/concerns/inherited_proofing_concern.rb
Original file line number Diff line number Diff line change
Expand Up @@ -27,4 +27,38 @@ def va_inherited_proofing_auth_code
def va_inherited_proofing_auth_code_params_key
'inherited_proofing_auth'
end

# Service Provider-agnostic members for now.
# Think about putting this in a factory(ies).

def inherited_proofing_service
inherited_proofing_service_class.new inherited_proofing_service_provider_data
end

def inherited_proofing_service_class
raise 'Inherited Proofing is not enabled' unless IdentityConfig.store.inherited_proofing_enabled

if va_inherited_proofing?
if IdentityConfig.store.va_inherited_proofing_mock_enabled
return Idv::InheritedProofing::Va::Mocks::Service
end
return Idv::InheritedProofing::Va::Service
end

raise 'Inherited proofing service class could not be identified'
end

def inherited_proofing_form(payload_hash)
return Idv::InheritedProofing::Va::Form.new payload_hash: payload_hash if va_inherited_proofing?

raise 'Inherited proofing form could not be identified'
end

def inherited_proofing_service_provider_data
if va_inherited_proofing?
{ auth_code: va_inherited_proofing_auth_code }
else
{}
end
end
end
2 changes: 1 addition & 1 deletion app/controllers/concerns/unconfirmed_user_concern.rb
Original file line number Diff line number Diff line change
Expand Up @@ -38,7 +38,7 @@ def stop_if_invalid_token
irs_attempts_api_tracker.user_registration_email_confirmation(
email: @email_address&.email,
success: result.success?,
failure_reason: result.to_h[:error_details],
failure_reason: irs_attempts_api_tracker.parse_failure_reason(result),
)
return if result.success?
process_unsuccessful_confirmation
Expand Down
2 changes: 1 addition & 1 deletion app/controllers/idv/gpo_verify_controller.rb
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@ def create
analytics.idv_gpo_verification_submitted(**result.to_h)
irs_attempts_api_tracker.idv_gpo_verification_submitted(
success: result.success?,
failure_reason: result.errors.presence,
failure_reason: irs_attempts_api_tracker.parse_failure_reason(result),
)

if result.success?
Expand Down
2 changes: 2 additions & 0 deletions app/controllers/idv/inherited_proofing_controller.rb
Original file line number Diff line number Diff line change
@@ -1,6 +1,8 @@
module Idv
class InheritedProofingController < ApplicationController
include Flow::FlowStateMachine
include IdvSession
include InheritedProofingConcern

before_action :render_404_if_disabled

Expand Down
2 changes: 1 addition & 1 deletion app/controllers/idv/phone_controller.rb
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ def create
irs_attempts_api_tracker.idv_phone_submitted(
phone_number: step_params[:phone],
success: result.success?,
failure_reason: result.errors,
failure_reason: irs_attempts_api_tracker.parse_failure_reason(result),
)
flash[:error] = result.first_error_message if !result.success?
return render :new, locals: { gpo_letter_available: gpo_letter_available } if !result.success?
Expand Down
11 changes: 4 additions & 7 deletions app/controllers/openid_connect/logout_controller.rb
Original file line number Diff line number Diff line change
Expand Up @@ -19,12 +19,10 @@ def index

if result.success? && (redirect_uri = result.extra[:redirect_uri])
sign_out
unless logout_params[:prevent_logout_redirect] == 'true'
redirect_to(
redirect_uri,
allow_other_host: true,
)
end
redirect_to(
redirect_uri,
allow_other_host: true,
)
else
render :error
end
Expand All @@ -35,7 +33,6 @@ def logout_params
:id_token_hint,
:post_logout_redirect_uri,
:state,
:prevent_logout_redirect,
]

if IdentityConfig.store.accept_client_id_in_oidc_logout ||
Expand Down
2 changes: 1 addition & 1 deletion app/controllers/sign_up/passwords_controller.rb
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ def create
analytics.password_creation(**result.to_h)
irs_attempts_api_tracker.user_registration_password_submitted(
success: result.success?,
failure_reason: result.errors,
failure_reason: irs_attempts_api_tracker.parse_failure_reason(result),
)
store_sp_metadata_in_session unless sp_request_id.empty?

Expand Down
2 changes: 1 addition & 1 deletion app/controllers/sign_up/registrations_controller.rb
Original file line number Diff line number Diff line change
Expand Up @@ -30,7 +30,7 @@ def create
irs_attempts_api_tracker.user_registration_email_submitted(
email: permitted_params[:email],
success: result.success?,
failure_reason: result.to_h[:error_details],
failure_reason: irs_attempts_api_tracker.parse_failure_reason(result),
)

if result.success?
Expand Down
33 changes: 33 additions & 0 deletions app/controllers/test/device_profiling_controller.rb
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@
module Test
class DeviceProfilingController < ApplicationController
prepend_before_action :skip_session_load
prepend_before_action :skip_session_expiration
skip_before_action :verify_authenticity_token

layout false

# iframe fallback
def index
tmx_backend.record_profiling_result(
session_id: params[:session_id],
result: 'no_result',
)
end

# explicit JS POST
def create
tmx_backend.record_profiling_result(
session_id: params[:session_id],
result: params[:result],
)

head :ok
end

private

def tmx_backend
@tmx_backend ||= Proofing::Mock::DeviceProfilingBackend.new
end
end
end
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@ def process_token
irs_attempts_api_tracker.mfa_login_piv_cac(
success: result.success?,
subject_dn: piv_cac_verification_form.x509_dn,
failure_reason: result.errors.presence,
failure_reason: irs_attempts_api_tracker.parse_failure_reason(result),
)
if result.success?
handle_valid_piv_cac
Expand Down
4 changes: 2 additions & 2 deletions app/controllers/users/delete_controller.rb
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ def show
end

def delete
irs_attempts_api_tracker.account_purged(success: true)
irs_attempts_api_tracker.logged_in_account_purged(success: true)
send_push_notifications
delete_user
sign_out
Expand All @@ -31,7 +31,7 @@ def confirm_current_password

flash[:error] = t('idv.errors.incorrect_password')
analytics.account_delete_submitted(success: false)
irs_attempts_api_tracker.account_purged(success: false)
irs_attempts_api_tracker.logged_in_account_purged(success: false)
render :show
end

Expand Down
2 changes: 1 addition & 1 deletion app/controllers/users/passwords_controller.rb
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ def update
analytics.password_changed(**result.to_h)
irs_attempts_api_tracker.logged_in_password_change(
success: result.success?,
failure_reason: result.to_h[:error_details],
failure_reason: irs_attempts_api_tracker.parse_failure_reason(result),
)

if result.success?
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -89,7 +89,7 @@ def process_piv_cac_setup
irs_attempts_api_tracker.mfa_enroll_piv_cac(
success: result.success?,
subject_dn: user_piv_cac_form.x509_dn,
failure_reason: result.errors.presence,
failure_reason: irs_attempts_api_tracker.parse_failure_reason(result),
)
if result.success?
process_valid_submission
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -40,7 +40,7 @@ def process_piv_cac_setup
irs_attempts_api_tracker.mfa_enroll_piv_cac(
success: result.success?,
subject_dn: user_piv_cac_form.x509_dn,
failure_reason: result.errors.presence,
failure_reason: irs_attempts_api_tracker.parse_failure_reason(result),
)
if result.success?
process_valid_submission
Expand Down
6 changes: 3 additions & 3 deletions app/controllers/users/reset_passwords_controller.rb
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ def edit
analytics.password_reset_token(**result.to_h)
irs_attempts_api_tracker.forgot_password_email_confirmed(
success: result.success?,
failure_reason: result.errors,
failure_reason: irs_attempts_api_tracker.parse_failure_reason(result),
)

if result.success?
Expand All @@ -45,7 +45,7 @@ def update
analytics.password_reset_password(**result.to_h)
irs_attempts_api_tracker.forgot_password_new_password_submitted(
success: result.success?,
failure_reason: result.errors,
failure_reason: irs_attempts_api_tracker.parse_failure_reason(result),
)

if result.success?
Expand Down Expand Up @@ -98,7 +98,7 @@ def create_account_if_email_not_found
irs_attempts_api_tracker.user_registration_email_submitted(
email: email,
success: result.success?,
failure_reason: result.to_h[:error_details],
failure_reason: irs_attempts_api_tracker.parse_failure_reason(result),
)
create_user_event(:account_created, user)
end
Expand Down
2 changes: 1 addition & 1 deletion app/controllers/users/verify_personal_key_controller.rb
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@ def create
)
irs_attempts_api_tracker.personal_key_reactivation_submitted(
success: result.success?,
failure_reason: result.errors,
failure_reason: irs_attempts_api_tracker.parse_failure_reason(result),
)
if result.success?
handle_success(decrypted_pii: personal_key_form.decrypted_pii)
Expand Down
Loading