Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(new-login): epic enabling new flows for simplified enterprise login (WPB-14364) #3309

Open
wants to merge 10 commits into
base: develop
Choose a base branch
from

Conversation

yamilmedina
Copy link
Contributor

@yamilmedina yamilmedina commented Feb 25, 2025

EpicWPB-14364 [Android] Implement Enterprise SSO Login UX Flows


PR Submission Checklist for internal contributors

  • The PR Title

    • conforms to the style of semantic commits messages¹ supported in Wire's Github Workflow²
    • contains a reference JIRA issue number like SQPIT-764
    • answers the question: If merged, this PR will: ... ³
  • The PR Description

    • is free of optional paragraphs and you have filled the relevant parts to the best of your ability

What's new in this PR?

Compiled epic PR divided in previously created.

Solutions

All can be seen retroactively on each small PR.

Testing

Test Coverage (Optional)

  • I have added automated test to this contribution

PR Post Submission Checklist for internal contributors (Optional)

  • Wire's Github Workflow has automatically linked the PR to a JIRA issue

PR Post Merge Checklist for internal contributors

  • If any soft of configuration variable was introduced by this PR, it has been added to the relevant documents and the CI jobs have been updated.

References
  1. https://sparkbox.com/foundry/semantic_commit_messages
  2. https://github.com/wireapp/.github#usage
  3. E.g. feat(conversation-list): Sort conversations by most emojis in the title #SQPIT-764.

yamilmedina and others added 10 commits January 24, 2025 11:42
* feat: base for get domain registration

* feat: add tests and skeleton for the new endpoint

* feat: test coverage for endpoint errors
* feat: add use case to observe valid sessions

* revert name changes

* fix detekt

* revert name changes
…#3275)

* feat: map login flow result

* feat: map login flow result

* fix: adjust domain modeling for login paths

* feat: mappers, tests and data layer for getting domaing registration

* feat: extract domain, better naming for use case, and tests

* feat: datadog ready and better naming for result

* chore: fix test

* feat: rearrange and docs

* chore: test improv/cov for field
…owForDomainUseCase (WPB-15520) (#3289)

* refactor: returns specialized result and error handling

* refactor: returns specialized result and error handling

* refactor: adjust to specs already in use

* refactor: adjust to specs already in use test

* refactor: serverlinks ready for client navigation usage

* refactor: serverlinks ready for client navigation usage

* chore: add more tests
…WPB-15966) (#3287)

* feat: create use case to observe current user server config

* chore: cleanup code for not needed funtions

* feat: use case to get the login context based on api version and proxy

* feat: load login context based on api and proxy

* feat: detekt

* feat: address pr comments

* chore: fix test

* chore: fix test

* chore: add more tests

* chore: add more tests
* feat: error handling simplified, not needed case

* feat: loggable friendly for metrics and troubleshooting
Copy link
Contributor

github-actions bot commented Feb 25, 2025

Test Results

3 553 tests  +25   3 443 ✅ +25   6m 30s ⏱️ +17s
  610 suites + 7     110 💤 ± 0 
  610 files   + 7       0 ❌ ± 0 

Results for commit b2f67cb. ± Comparison against base commit e422297.

♻️ This comment has been updated with latest results.

Copy link
Contributor

🐰 Bencher Report

Branchepic/new-sso-login-flow
Testbedubuntu-latest

⚠️ WARNING: No Threshold found!

Without a Threshold, no Alerts will ever be generated.

Click here to create a new Threshold
For more information, see the Threshold documentation.
To only post results if a Threshold exists, set the --ci-only-thresholds flag.

Click to view all benchmark results
BenchmarkLatencymicroseconds (µs)
com.wire.kalium.benchmarks.logic.CoreLogicBenchmark.createObjectInFiles📈 view plot
⚠️ NO THRESHOLD
679.38 µs
com.wire.kalium.benchmarks.logic.CoreLogicBenchmark.createObjectInMemory📈 view plot
⚠️ NO THRESHOLD
601,105.60 µs
com.wire.kalium.benchmarks.persistence.MessagesNoPragmaTuneBenchmark.messageInsertionBenchmark📈 view plot
⚠️ NO THRESHOLD
1,361,128.96 µs
com.wire.kalium.benchmarks.persistence.MessagesNoPragmaTuneBenchmark.queryMessagesBenchmark📈 view plot
⚠️ NO THRESHOLD
27,681.78 µs
🐰 View full continuous benchmarking report in Bencher

@codecov-commenter
Copy link

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 50.72%. Comparing base (0e9130f) to head (b2f67cb).
Report is 2 commits behind head on develop.

Additional details and impacted files
@@             Coverage Diff             @@
##           develop    #3309      +/-   ##
===========================================
+ Coverage    50.69%   50.72%   +0.03%     
===========================================
  Files         1611     1633      +22     
  Lines        58162    58397     +235     
  Branches      5249     5261      +12     
===========================================
+ Hits         29485    29623     +138     
- Misses       26649    26745      +96     
- Partials      2028     2029       +1     

see 65 files with indirect coverage changes


Continue to review full report in Codecov by Sentry.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update 0e9130f...b2f67cb. Read the comment docs.

@datadog-wireapp
Copy link

Datadog Report

Branch report: epic/new-sso-login-flow
Commit report: 0877163
Test service: kalium-jvm

✅ 0 Failed, 3443 Passed, 110 Skipped, 1m 2.21s Total Time

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants