Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ORV2-2755 - STOS application form and review #1674

Merged
merged 57 commits into from
Nov 29, 2024
Merged

ORV2-2755 - STOS application form and review #1674

merged 57 commits into from
Nov 29, 2024

Conversation

zgong-gov
Copy link
Collaborator

@zgong-gov zgong-gov commented Nov 27, 2024

Description

Please provide a summary of the change and the issue fixed. Please include relevant context. List dependency changes.

  • Integrate policy engine on the frontend
  • Complete STOS permit type for application form and review
  • Add and refactor various components related to input and STOS field validation
  • Fix bugs related to application/permit workflows
  • Refactor number inputs and introduced new number input component (possible breaking change)

Type of change

Please delete options that are not relevant.

  • Bug fix (non-breaking change which fixes an issue)
  • New feature (non-breaking change which adds functionality)
  • Breaking change (fix or feature that would cause existing functionality to not work as expected)
  • This change requires a documentation update

How Has This Been Tested?

Please describe the tests that you ran to verify your changes. Provide instructions so we can reproduce. Please also list any relevant details for your test configuration

  • Go through the entire process of creating/editing/amending term applications, and make sure that everything still works properly.
  • Create an STOS application, and fill out all the required fields, and verify that the application is created successfully, and if invalid inputs were entered, the form gives proper validation errors.
  • Edit a created STOS application, and verify that the existing fields and inputs are display correct values.
  • Verify that the STOS review and confirm page displays correct values, and that the continue button allows the application to be sent to the queue, and verify that all the queue processes work correctly.

Checklist

  • I have read the CONTRIBUTING doc
  • I have performed a self-review of my own code
  • I have commented my code, particularly in hard-to-understand areas
  • I have made corresponding changes to the documentation
  • My changes generate no new warnings
  • I have added tests that prove my fix is effective or that my feature works
  • New and existing unit tests pass locally with my changes
  • Any dependent changes have already been accepted and merged

Further comments

Please ensure that the configuration (env variables, deployment vite and yaml files) is correct for accommodating the policy engine url/integration.


Thanks for the PR!

Deployments, as required, will be available below:

Please create PRs in draft mode. Mark as ready to enable:

After merge, new images are promoted to:

…s with eligible subtypes instead, move hardcoded permit-specific constants from json to .ts files
…stom form components, refactor code for permittedCommodity
… remove hardcoded test permit commodities values
… and modified vehicle details modal for STOS
…configuration loading and policy instantiation failed
…to drive vehicle configuration based on selected commodity
Comment on lines +6597 to +6605
"node_modules/jsonpath-plus": {
"version": "7.2.0",
"resolved": "https://registry.npmjs.org/jsonpath-plus/-/jsonpath-plus-7.2.0.tgz",
"integrity": "sha512-zBfiUPM5nD0YZSBT/o/fbCUlCcepMIdP0CJZxM1+KgA4f2T206f6VAg9e7mX35+KlMaIc5qXW34f3BnwJ3w+RA==",
"license": "MIT",
"engines": {
"node": ">=12.0.0"
}
},

Check failure

Code scanning / Trivy

jsonpath-plus: Remote Code Execution in jsonpath-plus via Improper Input Sanitization

Package: jsonpath-plus Installed Version: 7.2.0 Vulnerability CVE-2024-21534 Severity: CRITICAL Fixed Version: 10.0.7 Link: [CVE-2024-21534](https://avd.aquasec.com/nvd/cve-2024-21534)
Copy link

sonarcloud bot commented Nov 29, 2024

Copy link

sonarcloud bot commented Nov 29, 2024

Copy link

sonarcloud bot commented Nov 29, 2024

Copy link

sonarcloud bot commented Nov 29, 2024

Copy link

sonarcloud bot commented Nov 29, 2024

Quality Gate Failed Quality Gate failed for 'onroutebc frontend'

Failed conditions
37.6% Coverage on New Code (required ≥ 80%)
3.6% Duplication on New Code (required ≤ 3%)

See analysis details on SonarQube Cloud

@zgong-gov zgong-gov merged commit ffa5971 into main Nov 29, 2024
20 of 22 checks passed
@zgong-gov zgong-gov deleted the ORV2-2755 branch November 29, 2024 00:29
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants