-
Notifications
You must be signed in to change notification settings - Fork 2.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Backwards Compatibility] [HIGH] Push all policy updates to all policy members forever #34834
Comments
Triggered auto assignment to @puneetlath ( |
I spent around 2 hours discussing what seems like a design problem in our code: https://expensify.slack.com/archives/C02MW39LT9N/p1706111344262919?thread_ts=1706104155.034209&cid=C02MW39LT9N |
This is where that discussion landed:
|
Thanks for making this plan, it is better approach 🙌 |
@flodnv Whoops! This issue is 2 days overdue. Let's get this updated quick! |
I've been trying to wrap my ahead around how to accomplish this without introducing performance problems https://expensify.slack.com/archives/C02MW39LT9N/p1706557806120739?thread_ts=1706104155.034209&cid=C02MW39LT9N |
I've been swamped with reviews this week, and working 2 days at 50% did not help. This is my top priority after https://github.com/Expensify/Expensify/issues/358326 |
@flodnv Uh oh! This issue is overdue by 2 days. Don't forget to update your issues! |
No update, I hope to have some time this week to pick this back up
…On Mon, Feb 5, 2024 at 11:24 AM melvin-bot[bot] ***@***.***> wrote:
@flodnv <https://github.com/flodnv> Uh oh! This issue is overdue by 2
days. Don't forget to update your issues!
—
Reply to this email directly, view it on GitHub
<#34834 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AA7Y2OKIEJUKO733X3FBMR3YSD2UHAVCNFSM6AAAAABCCNGF6CVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMYTSMRXGI2TCMRQGY>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
Continued today, I have a POC where it works with the top level 'name' attribute. Tomorrow I'll work on finding a way to make it work with sub levels. I have a feeling this is going to be really challenging. |
BTW, I updated the title of this issue to be more clear: More progress today:
More to come 🙏 |
|
2 months later, we finally get to From looking at it, it seems to me like we want to send |
Latest discussion on |
Next discussion about |
This is the only important issue remaining for the Spring release. As you can see in the OP, it's being held by at least 5 other different tasks, in order to implement it the correct way. I'll be pushing these tasks so they keep going forward. |
@flodnv Eep! 4 days overdue now. Issues have feelings too... |
Started brainstorming this here: https://expensify.slack.com/archives/C036QM0SLJK/p1712606285676069 |
Calling |
Issues for which we are HOLDing this last item are being worked on daily. |
Created #40356 |
Once #40356 is closed, we can close this. |
Cleanup task for later here: https://github.com/Expensify/Expensify/issues/389638 |
In summary, let's close this once #40532 is in prod. |
Sounds good to me! Deployed to prod, closing. Solid work here! |
Problem
When the approver on Collect policy is changed, we do not update all the policy members with this information.
The
submitsTo
property is used to determine who to submit the report to or to compute correct NextStep information on the expense report. Hence if its not up to date after admin's changes, we can show incorrect data to the user.Solution
When the approver is changed, push onyx update of the new accountID in the
submitsTo
field to all the members of a policy.Left to do:
testDeleteAllTags
Policy::updateAttribute
AuthTestHelper::isOnyxUpdateQueued
verifyOnyxUpdates
is continuing execution after an assertion in the loop: https://expensify.slack.com/archives/C03TQ48KC/p1710791698732929?thread_ts=1710789927.884809&cid=C03TQ48KCverifyOnyxUpdates
so we know where it failed in the calling method https://expensify.slack.com/archives/C03TQ48KC/p1710791531318939?thread_ts=1710789927.884809&cid=C03TQ48KCtestDeleteAllTags
Policy::getSubmitsTo
in app [HOLD for payment 2024-05-03] [Backwards Compatibility] [$250] Remove usages ofpolicy.submitsTo
in favor of using a new methodPolicyUtils.getSubmitTo
#40356policy.role
in favor ofemployeeList
#39025At some point somewhere in App, we need to update the code that gets an employee from the employeeList to use an email instead of an accountID
?The text was updated successfully, but these errors were encountered: