Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(auth-admin): Add automaticDelegationGrant to ids admin #16864

Merged
merged 3 commits into from
Nov 21, 2024

Conversation

GunnlaugurG
Copy link
Member

@GunnlaugurG GunnlaugurG commented Nov 14, 2024

What

Add CRUD for automaticDelegationGrant to the ids admin

Why

So these settings can be modified in the dashboard

Screenshots / Gifs

Attach Screenshots / Gifs to help reviewers understand the scope of the pull request

Checklist:

  • I have performed a self-review of my own code
  • I have made corresponding changes to the documentation
  • My changes generate no new warnings
  • I have added tests that prove my fix is effective or that my feature works
  • Formatting passes locally with my changes
  • I have rebased against main before asking for a review

Summary by CodeRabbit

Release Notes

  • New Features

    • Introduced a new permission control option, automaticDelegationGrant, enhancing user interface and functionality in the permissions management section.
    • Added localization support for automaticDelegationGrant and its description for improved user experience.
    • Expanded access control schema with the new automaticDelegationGrant property.
  • Bug Fixes

    • Deprecated existing fields in the permissions schema to streamline future updates and guide users towards new delegation types.
  • Documentation

    • Updated message definitions to reflect new permission options.

These changes aim to improve clarity and usability in managing permissions within the application.

@GunnlaugurG GunnlaugurG requested review from a team as code owners November 14, 2024 11:59
Copy link
Contributor

coderabbitai bot commented Nov 14, 2024

Walkthrough

The pull request introduces a new target named dev in the project.json file for the services-auth-admin-api application, allowing for easier command execution. Additionally, a new boolean property automaticDelegationGrant is added to several classes and components, enhancing delegation management. Existing delegation-related fields are marked as deprecated, indicating a transition to the new structure. The changes span localization, schema updates, and UI modifications, ensuring a cohesive integration of the new property across the application.

Changes

File Change Summary
apps/services/auth/admin-api/project.json Added new target dev with command to run the application.
libs/api/domains/auth-admin/src/lib/scope/dto/patch-scope.input.ts Added automaticDelegationGrant field (nullable boolean) and deprecated existing delegation fields with notes.
libs/auth-api-lib/src/lib/resources/admin/dto/admin-patch-scope.dto.ts Added automaticDelegationGrant property (optional boolean) and deprecated existing delegation fields with notes.
libs/portals/admin/ids-admin/src/lib/messages.ts Added two new messages: automaticDelegationGrant and automaticDelegationGrantDescription for localization.
libs/portals/admin/ids-admin/src/screens/Permission/EditPermission.schema.ts Added automaticDelegationGrant property (booleanCheckbox) to accessControlSchema.
libs/portals/admin/ids-admin/src/screens/Permission/Permission.graphql Added automaticDelegationGrant field to AuthAdminScopeEnvironmentFragment.
libs/portals/admin/ids-admin/src/screens/Permission/components/PermissionAccessControl.tsx Added automaticDelegationGrant to state management and UI, including a new checkbox for it.

Possibly related PRs

Suggested labels

automerge

Suggested reviewers

  • Herdismaria
  • GunnlaugurG

Thank you for using CodeRabbit. We offer it for free to the OSS community and would appreciate your support in helping us grow. If you find it useful, would you consider giving us a shout-out on your favorite social media?

❤️ Share
🪧 Tips

Chat

There are 3 ways to chat with CodeRabbit:

  • Review comments: Directly reply to a review comment made by CodeRabbit. Example:
    • I pushed a fix in commit <commit_id>, please review it.
    • Generate unit testing code for this file.
    • Open a follow-up GitHub issue for this discussion.
  • Files and specific lines of code (under the "Files changed" tab): Tag @coderabbitai in a new review comment at the desired location with your query. Examples:
    • @coderabbitai generate unit testing code for this file.
    • @coderabbitai modularize this function.
  • PR comments: Tag @coderabbitai in a new PR comment to ask questions about the PR branch. For the best results, please provide a very specific query, as very limited context is provided in this mode. Examples:
    • @coderabbitai gather interesting stats about this repository and render them as a table. Additionally, render a pie chart showing the language distribution in the codebase.
    • @coderabbitai read src/utils.ts and generate unit testing code.
    • @coderabbitai read the files in the src/scheduler package and generate a class diagram using mermaid and a README in the markdown format.
    • @coderabbitai help me debug CodeRabbit configuration file.

Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments.

CodeRabbit Commands (Invoked using PR comments)

  • @coderabbitai pause to pause the reviews on a PR.
  • @coderabbitai resume to resume the paused reviews.
  • @coderabbitai review to trigger an incremental review. This is useful when automatic reviews are disabled for the repository.
  • @coderabbitai full review to do a full review from scratch and review all the files again.
  • @coderabbitai summary to regenerate the summary of the PR.
  • @coderabbitai resolve resolve all the CodeRabbit review comments.
  • @coderabbitai configuration to show the current CodeRabbit configuration for the repository.
  • @coderabbitai help to get help.

Other keywords and placeholders

  • Add @coderabbitai ignore anywhere in the PR description to prevent this PR from being reviewed.
  • Add @coderabbitai summary to generate the high-level summary at a specific location in the PR description.
  • Add @coderabbitai anywhere in the PR title to generate the title automatically.

Documentation and Community

  • Visit our Documentation for detailed information on how to use CodeRabbit.
  • Join our Discord Community to get help, request features, and share feedback.
  • Follow us on X/Twitter for updates and announcements.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🧹 Outside diff range and nitpick comments (5)
libs/portals/admin/ids-admin/src/screens/Permission/EditPermission.schema.ts (1)

Line range hint 1-89: Well-structured and reusable schema implementation.

The schema implementation follows best practices for reusability and type safety:

  • Clear separation of concerns with distinct schemas
  • Effective TypeScript usage with proper type exports
  • Shared utilities for common functionality
  • Proper tree-shaking support through specific imports

Consider documenting the purpose and usage of automaticDelegationGrant in a comment above the schema to help other developers understand its role in access control.

libs/auth-api-lib/src/lib/resources/admin/dto/admin-patch-scope.dto.ts (2)

85-90: Consider documenting the relationship with delegation types.

While the deprecated properties clearly indicate migration to addedDelegationTypes/removedDelegationTypes, it would be helpful to document how automaticDelegationGrant interacts with these arrays.

Add a description to the @ApiPropertyOptional decorator:

 @ApiPropertyOptional({
   example: false,
+  description: 'Controls automatic delegation behavior when used with addedDelegationTypes',
 })
 automaticDelegationGrant?: boolean

Also applies to: 41-77


Add automaticDelegationGrant to superUserScopeFields for security

Based on the codebase analysis:

  • The automaticDelegationGrant property controls delegation behavior in the scope DTO
  • The superUserScopeFields array exists but is currently empty
  • There are delegation-related security patterns in the codebase (like delegationTypeSuperUserFilter) that restrict certain delegation operations to superusers only

For consistency with the existing security patterns and to prevent potential security risks, the automaticDelegationGrant property should be added to superUserScopeFields.

🔗 Analysis chain

Line range hint 116-124: Consider security implications.

If automaticDelegationGrant controls sensitive delegation behavior, consider adding it to superUserScopeFields to restrict its modification.


Let me gather more information about the automaticDelegationGrant property and its usage.


Let me check one more thing about the delegation-related security patterns in the codebase.

🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Check if similar properties are restricted in other DTOs

# Search for properties with "delegation" in their name that are restricted
rg -i "delegation.*superuser|restricted" --type ts

Length of output: 12443


Script:

#!/bin/bash
# Search for automaticDelegationGrant usage and related security patterns
ast-grep --pattern 'automaticDelegationGrant'

# Also check for any delegation-related security patterns in the DTO
rg -A 5 -B 5 "superUserScopeFields|automaticDelegationGrant" libs/auth-api-lib/src/lib/resources/admin/dto/

Length of output: 2178


Script:

#!/bin/bash
# Check for delegation-related security patterns and usage
rg -A 5 "delegationType.*super|delegation.*security" --type ts

# Also check the implementation of the scope service
ast-grep --pattern 'class AdminScopeService'

Length of output: 111

libs/portals/admin/ids-admin/src/screens/Permission/components/PermissionAccessControl.tsx (2)

25-29: Add TypeScript type definitions for destructured properties.

Consider adding explicit TypeScript interface/type definitions for the selectedPermission object to improve type safety and documentation.

interface SelectedPermission {
  isAccessControlled: boolean;
  grantToAuthenticatedUser: boolean;
  automaticDelegationGrant: boolean;
}

80-92: Use self-closing tag for consistency.

Replace ></Checkbox> with /> as it's a self-closing component with no children.

-        ></Checkbox>
+        />
📜 Review details

Configuration used: .coderabbit.yaml
Review profile: CHILL

📥 Commits

Reviewing files that changed from the base of the PR and between 3835de5 and eee3d08.

📒 Files selected for processing (7)
  • apps/services/auth/admin-api/project.json (4 hunks)
  • libs/api/domains/auth-admin/src/lib/scope/dto/patch-scope.input.ts (1 hunks)
  • libs/auth-api-lib/src/lib/resources/admin/dto/admin-patch-scope.dto.ts (1 hunks)
  • libs/portals/admin/ids-admin/src/lib/messages.ts (1 hunks)
  • libs/portals/admin/ids-admin/src/screens/Permission/EditPermission.schema.ts (1 hunks)
  • libs/portals/admin/ids-admin/src/screens/Permission/Permission.graphql (1 hunks)
  • libs/portals/admin/ids-admin/src/screens/Permission/components/PermissionAccessControl.tsx (3 hunks)
✅ Files skipped from review due to trivial changes (1)
  • apps/services/auth/admin-api/project.json
🧰 Additional context used
📓 Path-based instructions (6)
libs/api/domains/auth-admin/src/lib/scope/dto/patch-scope.input.ts (1)

Pattern libs/**/*: "Confirm that the code adheres to the following:

  • Reusability of components and hooks across different NextJS apps.
  • TypeScript usage for defining props and exporting types.
  • Effective tree-shaking and bundling practices."
libs/auth-api-lib/src/lib/resources/admin/dto/admin-patch-scope.dto.ts (1)

Pattern libs/**/*: "Confirm that the code adheres to the following:

  • Reusability of components and hooks across different NextJS apps.
  • TypeScript usage for defining props and exporting types.
  • Effective tree-shaking and bundling practices."
libs/portals/admin/ids-admin/src/lib/messages.ts (1)

Pattern libs/**/*: "Confirm that the code adheres to the following:

  • Reusability of components and hooks across different NextJS apps.
  • TypeScript usage for defining props and exporting types.
  • Effective tree-shaking and bundling practices."
libs/portals/admin/ids-admin/src/screens/Permission/EditPermission.schema.ts (1)

Pattern libs/**/*: "Confirm that the code adheres to the following:

  • Reusability of components and hooks across different NextJS apps.
  • TypeScript usage for defining props and exporting types.
  • Effective tree-shaking and bundling practices."
libs/portals/admin/ids-admin/src/screens/Permission/Permission.graphql (1)

Pattern libs/**/*: "Confirm that the code adheres to the following:

  • Reusability of components and hooks across different NextJS apps.
  • TypeScript usage for defining props and exporting types.
  • Effective tree-shaking and bundling practices."
libs/portals/admin/ids-admin/src/screens/Permission/components/PermissionAccessControl.tsx (1)

Pattern libs/**/*: "Confirm that the code adheres to the following:

  • Reusability of components and hooks across different NextJS apps.
  • TypeScript usage for defining props and exporting types.
  • Effective tree-shaking and bundling practices."
🔇 Additional comments (9)
libs/portals/admin/ids-admin/src/screens/Permission/Permission.graphql (1)

26-26: Verify TypeScript type generation.

Since this GraphQL schema change will affect generated TypeScript types, we should verify that the types are properly generated and used across the codebase.

✅ Verification successful

TypeScript types are properly generated and used across the codebase

The verification shows that:

  • The GraphQL codegen is properly configured for the ids-admin module in libs/portals/admin/ids-admin/src/
  • The automaticDelegationGrant field is correctly used in TypeScript interfaces across multiple files
  • The field is properly integrated in relevant components and DTOs
🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Check for TypeScript interfaces using the new field
# and verify GraphQL type generation configuration

# Check for TypeScript interfaces using automaticDelegationGrant
rg -t ts "automaticDelegationGrant.*?:" libs/

# Check GraphQL codegen configuration
fd "codegen.*yml|graphql.*config.*" -x cat {}

Length of output: 27390

libs/api/domains/auth-admin/src/lib/scope/dto/patch-scope.input.ts (2)

50-52: LGTM! The new field follows the established patterns.

The automaticDelegationGrant field is properly implemented with correct typing and GraphQL decorators, maintaining consistency with other boolean fields in the class.


Line range hint 1-62: Consider completing the transition to the new delegation types system.

The codebase appears to be transitioning from boolean flags to a more flexible string-based delegation types system (addedDelegationTypes and removedDelegationTypes). Consider whether automaticDelegationGrant should also be represented as a delegation type instead of a boolean flag to maintain consistency with this new approach.

Let's verify the usage of delegation types in the codebase:

libs/portals/admin/ids-admin/src/screens/Permission/EditPermission.schema.ts (1)

58-58: LGTM! Property addition follows established patterns.

The new automaticDelegationGrant property is correctly integrated into the accessControlSchema using the consistent booleanCheckbox type.

libs/auth-api-lib/src/lib/resources/admin/dto/admin-patch-scope.dto.ts (1)

85-90: LGTM! Property follows established patterns.

The new automaticDelegationGrant property is well-structured with appropriate decorators and typing.

libs/portals/admin/ids-admin/src/screens/Permission/components/PermissionAccessControl.tsx (3)

31-39: LGTM! Well-structured state management.

The state management is properly implemented with TypeScript types and follows React best practices.


81-82: Verify translation keys for the new checkbox.

Ensure that the message keys m.automaticDelegationGrant and m.automaticDelegationGrantDescription are properly defined in the translations file.

#!/bin/bash
# Search for the translation keys in messages.ts
rg "automaticDelegationGrant.*=" libs/portals/admin/ids-admin/src/lib/messages.ts

46-49: Verify checkEnvironmentsSync utility implementation.

Ensure that the checkEnvironmentsSync utility correctly handles the new automaticDelegationGrant property across environments.

✅ Verification successful

The checkEnvironmentsSync utility correctly handles the automaticDelegationGrant property

The utility implementation in checkEnvironmentsSync.ts is type-safe and uses a generic type parameter that ensures all provided property names exist in the environment objects. It correctly compares values across environments using lodash/isEqual for deep equality checks. The automaticDelegationGrant property is properly handled alongside other properties in PermissionAccessControl.tsx.

🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Search for checkEnvironmentsSync implementation and its tests
rg -A 10 "export.*checkEnvironmentsSync"
rg -A 10 "describe.*checkEnvironmentsSync"

Length of output: 177


Script:

#!/bin/bash
# Search for checkEnvironmentsSync with broader pattern
rg -l "checkEnvironmentsSync"

# Search for files containing automaticDelegationGrant
rg -l "automaticDelegationGrant"

# Search for utility functions related to environment sync
rg -l "environmentSync|envSync"

Length of output: 2450


Script:

#!/bin/bash
# Check the implementation of checkEnvironmentsSync utility
cat libs/portals/admin/ids-admin/src/utils/checkEnvironmentsSync.ts

# Check how it's used in PermissionAccessControl
cat libs/portals/admin/ids-admin/src/screens/Permission/components/PermissionAccessControl.tsx

Length of output: 4159

libs/portals/admin/ids-admin/src/lib/messages.ts (1)

797-805: LGTM! Well-structured i18n messages.

The new messages for the automaticDelegationGrant feature are properly formatted, follow the established naming conventions, and provide clear, user-friendly text that accurately describes the feature's purpose.

@datadog-island-is
Copy link

datadog-island-is bot commented Nov 14, 2024

Datadog Report

All test runs 07156a6 🔗

14 Total Test Services: 0 Failed, 14 Passed
🔻 Test Sessions change in coverage: 2 decreased, 1 increased (+0.01%), 25 no change

Test Services
This report shows up to 10 services
Service Name Failed Known Flaky New Flaky Passed Skipped Total Time Code Coverage Change Test Service View
api 0 0 0 4 0 4.23s 1 no change Link
api-domains-auth-admin 0 0 0 18 0 15.36s 1 no change Link
application-system-api 0 0 0 112 2 3m 28.17s 1 no change Link
application-template-api-modules 0 0 0 113 0 2m 34.05s 1 no change Link
auth-api-lib 0 0 0 20 0 32.07s 1 no change Link
portals-admin-ids-admin 0 0 0 2 0 9.77s 1 no change Link
services-auth-admin-api 0 0 0 130 0 3m 32.08s 1 no change Link
services-auth-delegation-api 0 0 0 262 0 3m 27.04s 1 decreased (-0.18%) Link
services-auth-ids-api 0 0 0 152 0 1m 8.25s 1 no change Link
services-auth-personal-representative 0 0 0 59 0 1m 28.53s 1 no change Link

🔻 Code Coverage Decreases vs Default Branch (2)

  • services-auth-delegation-api - jest 51.74% (-0.18%) - Details
  • services-user-profile - jest 52.52% (-0.06%) - Details

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

📜 Review details

Configuration used: .coderabbit.yaml
Review profile: CHILL

📥 Commits

Reviewing files that changed from the base of the PR and between eee3d08 and 12d986b.

📒 Files selected for processing (1)
  • apps/services/auth/admin-api/project.json (1 hunks)
🧰 Additional context used
📓 Path-based instructions (1)
apps/services/auth/admin-api/project.json (2)

Pattern apps/services/**/*: "Confirm that the code adheres to the following:

  • NestJS architecture, including modules, services, and controllers.
  • Dependency injection patterns and service encapsulation.
  • Integration and unit testing coverage and practices."

Pattern apps/**/*: "Confirm that the code adheres to the following:

  • NextJS best practices, including file structure, API routes, and static generation methods.
  • Efficient state management and server-side rendering techniques.
  • Optimal use of TypeScript for component and utility type safety."

apps/services/auth/admin-api/project.json Show resolved Hide resolved
Copy link

codecov bot commented Nov 14, 2024

Codecov Report

Attention: Patch coverage is 66.66667% with 1 line in your changes missing coverage. Please review.

Project coverage is 35.62%. Comparing base (75764d9) to head (3963111).
Report is 1 commits behind head on main.

Files with missing lines Patch % Lines
.../auth-admin/src/lib/scope/dto/patch-scope.input.ts 50.00% 1 Missing ⚠️
Additional details and impacted files

Impacted file tree graph

@@           Coverage Diff            @@
##             main   #16864    +/-   ##
========================================
  Coverage   35.62%   35.62%            
========================================
  Files        6914     6914            
  Lines      145987   146135   +148     
  Branches    41446    41543    +97     
========================================
+ Hits        52008    52061    +53     
- Misses      93979    94074    +95     
Flag Coverage Δ
air-discount-scheme-backend 47.88% <ø> (ø)
air-discount-scheme-web 0.00% <ø> (ø)
api 3.34% <ø> (ø)
api-catalogue-services 77.85% <ø> (ø)
api-domains-air-discount-scheme 37.08% <ø> (ø)
api-domains-assets 26.71% <ø> (ø)
api-domains-auth-admin 48.49% <50.00%> (+<0.01%) ⬆️
api-domains-communications 39.58% <ø> (ø)
api-domains-criminal-record 47.56% <ø> (ø)
api-domains-driving-license 44.50% <ø> (ø)
api-domains-education 30.57% <ø> (ø)
api-domains-health-insurance 34.43% <ø> (ø)
api-domains-mortgage-certificate 34.74% <ø> (ø)
api-domains-payment-schedule 41.31% <ø> (ø)
application-api-files 62.42% <ø> (ø)
application-core 71.11% <ø> (ø)
application-system-api 38.72% <ø> (+<0.01%) ⬆️
application-template-api-modules 27.71% <ø> (-0.02%) ⬇️
application-templates-accident-notification 28.98% <ø> (ø)
application-templates-car-recycling 3.12% <ø> (ø)
application-templates-criminal-record 25.87% <ø> (ø)
application-templates-driving-license 18.14% <ø> (ø)
application-templates-estate 12.15% <ø> (ø)
application-templates-example-payment 24.80% <ø> (ø)
application-templates-financial-aid 15.77% <ø> (ø)
application-templates-general-petition 23.07% <ø> (ø)
application-templates-inheritance-report 6.55% <ø> (ø)
application-templates-marriage-conditions 15.04% <ø> (ø)
application-templates-mortgage-certificate 43.45% <ø> (ø)
application-templates-parental-leave 29.92% <ø> (ø)
application-types 6.57% <ø> (ø)
application-ui-components 1.27% <ø> (ø)
application-ui-shell 20.57% <ø> (ø)
auth-admin-web 2.43% <ø> (ø)
auth-nest-tools 31.10% <ø> (ø)
auth-react 21.85% <ø> (ø)
auth-shared 75.00% <ø> (ø)
clients-charge-fjs-v2 24.11% <ø> (ø)
clients-driving-license 40.28% <ø> (ø)
clients-driving-license-book 43.50% <ø> (ø)
clients-financial-statements-inao 49.06% <ø> (ø)
clients-license-client 1.26% <ø> (ø)
clients-middlewares 73.33% <ø> (+0.33%) ⬆️
clients-regulations 42.36% <ø> (ø)
clients-rsk-company-registry 29.76% <ø> (ø)
clients-rsk-personal-tax-return 38.00% <ø> (ø)
clients-smartsolutions 12.77% <ø> (ø)
clients-syslumenn 49.23% <ø> (ø)
clients-zendesk 50.61% <ø> (ø)
cms 0.41% <ø> (ø)
cms-translations 38.91% <ø> (ø)
content-search-index-manager 95.65% <ø> (ø)
content-search-toolkit 8.14% <ø> (ø)
contentful-apps 4.69% <ø> (ø)
dokobit-signing 62.76% <ø> (ø)
email-service 60.57% <ø> (ø)
feature-flags 90.62% <ø> (ø)
file-storage 45.80% <ø> (ø)
financial-aid-backend 51.29% <ø> (ø)
financial-aid-shared 17.81% <ø> (ø)
icelandic-names-registry-backend 54.34% <ø> (ø)
infra-nest-server 48.37% <ø> (ø)
infra-tracing 43.24% <ø> (ø)
island-ui-core 28.88% <ø> (ø)
judicial-system-api 19.86% <ø> (ø)
judicial-system-audit-trail 68.86% <ø> (ø)
judicial-system-backend 55.60% <ø> (ø)
judicial-system-formatters 79.35% <ø> (ø)
judicial-system-message 67.05% <ø> (ø)
judicial-system-message-handler 48.08% <ø> (ø)
judicial-system-scheduler 70.79% <ø> (ø)
judicial-system-types 43.31% <ø> (ø)
judicial-system-web 27.16% <ø> (ø)
license-api 42.67% <ø> (ø)
localization 10.15% <ø> (ø)
logging 48.43% <ø> (ø)
message-queue 68.05% <ø> (-0.74%) ⬇️
nest-audit 68.20% <ø> (ø)
nest-aws 53.04% <ø> (ø)
nest-config 78.00% <ø> (ø)
nest-core 43.54% <ø> (ø)
nest-feature-flags 51.09% <ø> (ø)
nest-problem 45.82% <ø> (ø)
nest-sequelize 94.44% <ø> (ø)
nest-swagger 51.71% <ø> (ø)
nova-sms 62.09% <ø> (ø)
portals-admin-regulations-admin 1.85% <ø> (ø)
portals-core 15.90% <ø> (ø)
regulations 16.78% <ø> (ø)
residence-history 85.00% <ø> (ø)
services-auth-admin-api 52.51% <100.00%> (+<0.01%) ⬆️
services-auth-delegation-api 57.52% <100.00%> (-0.01%) ⬇️
services-auth-ids-api 52.11% <100.00%> (+0.02%) ⬆️
services-auth-public-api 48.91% <100.00%> (+0.01%) ⬆️
services-sessions 65.46% <ø> (ø)
services-university-gateway 49.25% <ø> (-0.09%) ⬇️
services-user-notification 46.77% <ø> (ø)
services-user-profile 56.72% <ø> (-0.10%) ⬇️
shared-components 26.91% <ø> (ø)
shared-form-fields 31.26% <ø> (ø)
shared-mocking 60.89% <ø> (ø)
shared-pii 92.85% <ø> (ø)
shared-problem 87.50% <ø> (ø)
shared-utils 27.69% <ø> (ø)
skilavottord-ws 24.14% <ø> (ø)
web 1.75% <ø> (ø)

Flags with carried forward coverage won't be shown. Click here to find out more.

Files with missing lines Coverage Δ
...c/lib/resources/admin/dto/admin-patch-scope.dto.ts 100.00% <100.00%> (ø)
.../auth-admin/src/lib/scope/dto/patch-scope.input.ts 56.25% <50.00%> (-0.42%) ⬇️

... and 11 files with indirect coverage changes


Continue to review full report in Codecov by Sentry.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update 75764d9...3963111. Read the comment docs.

---- 🚨 Try these New Features:

Copy link
Member

@magnearun magnearun left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM!

@GunnlaugurG GunnlaugurG added the deprecated:automerge (Disabled) Merge this PR as soon as all checks pass label Nov 21, 2024
@kodiakhq kodiakhq bot merged commit 05f9988 into main Nov 21, 2024
264 checks passed
@kodiakhq kodiakhq bot deleted the feat/automatic-delectaion-grant branch November 21, 2024 15:53
jonnigs pushed a commit that referenced this pull request Nov 26, 2024
* automatic declegation grant to ids (all layers)

* chore: nx format:write update dirty files

---------

Co-authored-by: andes-it <builders@andes.is>
Co-authored-by: kodiakhq[bot] <49736102+kodiakhq[bot]@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
deprecated:automerge (Disabled) Merge this PR as soon as all checks pass
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants