-
Notifications
You must be signed in to change notification settings - Fork 112
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Deploy RC 411 to Production #11188
Deploy RC 411 to Production #11188
Commits on Aug 30, 2024
-
Log context of contextless kms (#11174)
changelog: Internal, Logging, Log the context of contextless KMS
Configuration menu - View commit details
-
Copy full SHA for d9dc70b - Browse repository at this point
Copy the full SHA d9dc70bView commit details -
Update fast-glob (micromatch) to resolve security advisory (#11173)
changelog: Internal, Dependencies, Update dependency to resolve security advisory
Configuration menu - View commit details
-
Copy full SHA for 6c4ba3d - Browse repository at this point
Copy the full SHA 6c4ba3dView commit details -
LG-14216: Implement configurable percent tested reCAPTCHA at sign-in (#…
…11148) * LG-14216: Implement configurable percent tested reCAPTCHA at sign-in changelog: Upcoming Features, Fraud Prevent, Implement configurable percent tested reCAPTCHA at sign-in * Add A/B testing concern to controller where used * Annotate reCAPTCHA result received event * Exclude from A/B test where captcha validation not performed * Determine exempt before captcha submission Move contextual arguments to constructor * Fix error unknown keywords * Add specs for AbTest should_log respond_to include * Add specs for ab_test_bucket user keyword argument * Update SignInRecaptchaForm specs * Avoid return statement in block * Document captcha_validation_performed * Force reCAPTCHA performed in feature spec * Update sessions controller asserted logging expectations * Handle nil user, user_session * Memoize user_from_params Co-authored-by: Zach Margolis <zachmargolis@users.noreply.github.com> * Use Array#to_set to avoid extra indentation See: #11148 (comment) Co-Authored-By: Zach Margolis <zachmargolis@users.noreply.github.com> * Reload A/B tests after stubbing bucket configuration A/B test constants are defined before the stubs go into effect, so they'll use the default even if stubbed with something different. Reload A/B tests after stub goes into effect / is torn down to force configuration to be used. * Reload A/B tests for enabled reCAPTCHA in sessions controlller * Stub controller ab_test_bucket * Add specs for AbTests:: RECAPTCHA_SIGN_IN * Default to always test in development * Replace user action events with application-facing --------- Co-authored-by: Zach Margolis <zachmargolis@users.noreply.github.com>
Configuration menu - View commit details
-
Copy full SHA for 833b9e3 - Browse repository at this point
Copy the full SHA 833b9e3View commit details -
Return user to connected accounts when cancelling revocation (#11178)
changelog: User-Facing Improvements, Connected Accounts, Return user to connected accounts when cancelling revocation
Configuration menu - View commit details
-
Copy full SHA for 19a0d92 - Browse repository at this point
Copy the full SHA 19a0d92View commit details -
LG-14253 Track time to complete proofing workflow (#11179)
We want to start tracking how long it takes people to complete identity proofing. Part of that is understanding how long it takes people to go from the start of the process to the enter password step where their profile is created. At this point we want to know: 1. How long did it take the person to complete the workflow 2. What steps remain before person finishes proofing (i.e. verify-by-mail, in-person-proofing, or fraud review) The enter password submit events already logs enough information to determine the second. This commit starts tracking the duration of the proofing session by adding a timestamp at the welcome step and logging the elapsed seconds since on the enter password events.
Configuration menu - View commit details
-
Copy full SHA for 524983b - Browse repository at this point
Copy the full SHA 524983bView commit details -
LG-13963: 👤 Socure shadow mode background job (#11139)
* Add Socure configs to IdentityConfig * Add failure_message_when_negated to HaveLoggedEventMatcher * Add SocureShadowModeProofingJob Add job to make requests to Socure's KYC API and log the results alongside the original resolution proofing result. changelog: Upcoming Features, Identity verification, Add background job for Socure KYC proofing * Make ResolutionProofingJob schedule Socure KYC call - When flag is enabled, invoke Socure KYC as well * Add verified_attributes to resolution result to_h * Add more detail to resolution proofer logging test * Don't log TMX response body ong idv_socure_shadow_mode_proofing_result These are real big and mess with Cloudwatch's ability to parse fields out oflogs. * Tweak socure default base URL for dev * Remove pointless user_id arg to analytics event * Update app/jobs/socure_shadow_mode_proofing_job.rb Co-authored-by: Zach Margolis <zachmargolis@users.noreply.github.com> * Clarify comment in spec * Clarify spec name * Clarify spec name * Use user.first_email * Revert "Use user.first_email" This reverts commit fd4dcab. * Remove pointless service_provider_issuer let --------- Co-authored-by: Zach Margolis <zachmargolis@users.noreply.github.com>
Configuration menu - View commit details
-
Copy full SHA for a52223a - Browse repository at this point
Copy the full SHA a52223aView commit details
Commits on Sep 2, 2024
-
LG-14259 Update Report formatting (#11166)
* LG-14259 Update Report formatting\n\n changelog: Internal, Reporting, Update LG-99 Report Layout * changelog: Internal, Reporting, Update LG-99 Report Layout * LG-14259/update tests for fraud metrics * update lg99 columns * lumberjack code
Configuration menu - View commit details
-
Copy full SHA for 641185a - Browse repository at this point
Copy the full SHA 641185aView commit details
Commits on Sep 3, 2024
-
LG-14198: AAGUID logging (#11138)
* changelog: Internal, Webauthn Setup, Add aaguid for webauthn configuration * change to use backend uuid instead of front end * update and fix spec * update webauthn verification * update schema * log aaguid for webauthn * changelog: Internal, Authentication, add aaguid to webauthn configuration * remove unneeded migration * fix schema * add back fed email domains
Configuration menu - View commit details
-
Copy full SHA for e82d6c9 - Browse repository at this point
Copy the full SHA e82d6c9View commit details