Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Api 24364 improve validation for survivor #11898

Merged
merged 0 commits into from
Mar 2, 2023

Conversation

mchristiansonVA
Copy link
Contributor

@mchristiansonVA mchristiansonVA commented Feb 24, 2023

Summary

  • Improved validation for ITF type "survivor", adding a check for blank "claimantSsn" parameter for the /validate and /intent-to-file endpoints when the type parameter is "survivor".
  • Note that this validation does not apply to the /type endpoint, which finds the active ITF record for the specified type, as the normal use cases for that endpoint would include ITF type "survivor" without supplying a "claimantSsn" parameter.
  • Note that both /intent-to-file and /validate POSTs for type "survivor" but without a "claimantSsn" parameter respond with HTTP 422 Unprocessable entity.

Related issue(s)

Testing done

  • Tested the /validate endpoint to confirm it returns an appropriate error for type "survivor" with no "claimantSsn" parameter supplied.
  • Tested the /intent-to-file endpoint to confirm it returns an appropriate error for type "survivor" with no "claimantSsn" parameter supplied.
  • Tested the /type endpoint to confirm it returns appropriate results for type "survivor" with no "claimantSsn" parameter supplied.
  • Updated and added rspec tests for new cases.

What areas of the site does it impact?

  • vets-api Intent To File endpoint validation.

Acceptance criteria

  • I fixed|updated|added unit tests and integration tests for each feature (if applicable).
  • No error nor warning in the console.
  • Events are being sent to the appropriate logging solution
  • Documentation has been updated (link to documentation)
  • No sensitive information (i.e. PII/credentials/internal URLs/etc.) is captured in logging, hardcoded, or specs
  • Feature/bug has a monitor built into Datadog or Grafana (if applicable)
  • If app impacted requires authentication, did you login to a local build and verify all authenticated routes work as expected
  • I added a screenshot of the developed feature

@mchristiansonVA mchristiansonVA added Lighthouse lighthouse claimsApi modules/claims_api labels Feb 24, 2023
@mchristiansonVA mchristiansonVA self-assigned this Feb 24, 2023
@va-vfs-bot va-vfs-bot temporarily deployed to API-24364_Improve_validation_for_survivor/main/main February 24, 2023 22:07 Inactive
@va-vfs-bot va-vfs-bot temporarily deployed to API-24364_Improve_validation_for_survivor/main/main February 27, 2023 19:07 Inactive
@mchristiansonVA mchristiansonVA marked this pull request as ready for review February 27, 2023 19:15
@mchristiansonVA mchristiansonVA requested review from a team as code owners February 27, 2023 19:15
@va-vfs-bot va-vfs-bot temporarily deployed to API-24364_Improve_validation_for_survivor/main/main February 28, 2023 19:52 Inactive
@va-vfs-bot va-vfs-bot temporarily deployed to API-24364_Improve_validation_for_survivor/main/main February 28, 2023 20:09 Inactive
Copy link
Contributor

@stiehlrod stiehlrod left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM. Tested in Sandbox with and without claimant SSN

@mchristiansonVA mchristiansonVA merged commit 994cd9f into master Mar 2, 2023
@mchristiansonVA mchristiansonVA deleted the API-24364_Improve_validation_for_survivor branch March 2, 2023 18:52
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
claimsApi modules/claims_api Lighthouse lighthouse
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants