Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fides ints 62 greenhouse harvestapi access erasure #4945

Merged
merged 30 commits into from
Jun 11, 2024

Conversation

MarcGEthyca
Copy link
Contributor

@MarcGEthyca MarcGEthyca commented Jun 3, 2024

Closes #

Description Of Changes

Added integration for Greenhouse Harvest. This integration includes access and erasure. A note about the erasure here is that we are using the Harvest API Anonymize endpoint.

Code Changes

  • Config, dataset, test, icon and fixtures

Steps to Confirm

  • Add/configure the connector in UI
  • Verify config and icon UI looks good
  • Ensure the test integration button works
  • Create an Access DSR with the identity value
  • Verify email sent by Fides with customer data is correct

Pre-Merge Checklist

Copy link

vercel bot commented Jun 3, 2024

The latest updates on your projects. Learn more about Vercel for Git ↗︎

1 Ignored Deployment
Name Status Preview Comments Updated (UTC)
fides-plus-nightly ⬜️ Ignored (Inspect) Visit Preview Jun 11, 2024 8:12pm

Copy link

cypress bot commented Jun 3, 2024

Passing run #8260 ↗︎

0 4 0 0 Flakiness 0
⚠️ You've recorded test results over your free plan limit.
Upgrade your plan to view test results.

Details:

Merge 43bef14 into e555181...
Project: fides Commit: ab810f5f06 ℹ️
Status: Passed Duration: 00:36 💡
Started: Jun 11, 2024 8:24 PM Ended: Jun 11, 2024 8:24 PM

Review all test suite changes for PR #4945 ↗︎

Copy link

codecov bot commented Jun 3, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 86.89%. Comparing base (e555181) to head (4a6d3b7).

Additional details and impacted files
@@           Coverage Diff           @@
##             main    #4945   +/-   ##
=======================================
  Coverage   86.89%   86.89%           
=======================================
  Files         346      346           
  Lines       21403    21408    +5     
  Branches     2825     2826    +1     
=======================================
+ Hits        18598    18603    +5     
  Misses       2308     2308           
  Partials      497      497           

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@MarcGEthyca MarcGEthyca self-assigned this Jun 3, 2024
@MarcGEthyca MarcGEthyca requested review from galvana June 4, 2024 14:50
Comment on lines 10 to 17
- name: domain
label: The Harvest domain. Default harvest.greenhouse.io
default_value: harvest.greenhouse.io
- name: api_key
label: The Harvest API key processed value. This can be generated by navigating from the Greenhouse main page to Configure >> Dev Center >> API Credential Management and taking note of the Harvest API key value. A colon must be appended and the resulting string encoded base64. Please see the Harvest API documentation regarding authentication for more details https://developers.greenhouse.io/harvest.html#authentication
sensitive: True
- name: greenhouse_user_id
label: Your Greenhouse USER id. This value can be seen by any Greenhouse user from the main page by examining the URL when viewing this user. From the Greenhouse main page, navigate to Configure -> Users -> Select the desired user. The URL when viewing the account will look like this https://app8.greenhouse.io/account/users/4054555008/edit where the numeric value is the Greenhouse user ID.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The label value should be the user-friendly version of domain, api_key, and greenhouse_user_id so Domain, Api Key and Greenhouse user ID. The text you have there is better suited for the description

@galvana galvana marked this pull request as ready for review June 4, 2024 15:31
@galvana galvana requested a review from a team as a code owner June 4, 2024 15:31
@galvana galvana added the run unsafe ci checks Runs fides-related CI checks that require sensitive credentials label Jun 11, 2024
direction: from
query_params:
- name: fields
value: "full_name,current_company,current_title,tags,phone_numbers,emails,social_media_links,websites,addresses,location,custom_candidate_fields,source,recruiter,coordinator,attachments,application_questions,referral_questions,notes,rejection_notes,email_addresses,activity_items,innotes,inmails,rejection_reason,scorecards_and_interviews,offers,credited_to,headline,all_offer_versions,follow_up_reminders,custom_application_fields,education,employment,candidate_stage_data,prospect_owner,custom_rejection_question_fields,touchpoints,prospect_pool_and_stage,prospect_jobs,prospect_offices,prospect_offices_and_departments,third_party_integrations"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In the future, we could make this more dynamic by using the keys of the masked_object_fields map as the query params

@galvana galvana merged commit 0f04b3f into main Jun 11, 2024
15 checks passed
@galvana galvana deleted the fides_ints_62_greenhouse_harvestapi_access_erasure branch June 11, 2024 20:15
Copy link

cypress bot commented Jun 11, 2024

Passing run #8261 ↗︎

0 4 0 0 Flakiness 0
⚠️ You've recorded test results over your free plan limit.
Upgrade your plan to view test results.

Details:

Fides ints 62 greenhouse harvestapi access erasure (#4945)
Project: fides Commit: 0f04b3fb6f
Status: Passed Duration: 00:35 💡
Started: Jun 11, 2024 8:26 PM Ended: Jun 11, 2024 8:27 PM

Review all test suite changes for PR #4945 ↗︎

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
run unsafe ci checks Runs fides-related CI checks that require sensitive credentials
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants