Skip to content

UAT Release 6.1#5278

Merged
JamesPayer merged 229 commits intobcgov:testfrom
asanchezr:uat-release-6.1
Apr 9, 2026
Merged

UAT Release 6.1#5278
JamesPayer merged 229 commits intobcgov:testfrom
asanchezr:uat-release-6.1

Conversation

@asanchezr
Copy link
Copy Markdown
Collaborator

No description provided.

Herrera and others added 30 commits February 24, 2026 16:11
…n the user wants to edit it again, the edit button doesn't work
PSP_PIMS | Development Sprint: S118.00 | Design Sprint: 117 | Date: 2026-Feb-25
- Dropped sequences:
  - PIMS_ACQUISITION_ACTIVITY_ID_SEQ
  - PIMS_ACQUISITION_ACTIVITY_INSTANCE_ID_SEQ
  - PIMS_ACQUISITION_FILE_PERSON_ID_SEQ
  - PIMS_ACQUISITION_PAYEE_ID_SEQ
  - PIMS_ACT_INST_PROP_ACQ_FILE_ID_SEQ
  - PIMS_ACT_INST_PROP_RSRCH_FILE_ID_SEQ
  - PIMS_ACTIVITY_INSTANCE_DOCUMENT_ID_SEQ
  - PIMS_ACTIVITY_INSTANCE_ID_SEQ
  - PIMS_ACTIVITY_INSTANCE_NOTE_ID_SEQ
  - PIMS_ACTIVITY_MODEL_ID_SEQ
  - PIMS_ACTIVITY_MODEL_TASK_ID_SEQ
  - PIMS_ACTIVITY_SERVICE_FILE_ID_SEQ
  - PIMS_ACTIVITY_TASK_ID_SEQ
  - PIMS_ACTIVITY_TEMPLATE_DOCUMENT_ID_SEQ
  - PIMS_ACTIVITY_TEMPLATE_ID_SEQ
  - PIMS_ASSET_EVALUATION_ID_SEQs
  - PIMS_BUILDING_CONSTRUCTION_TYPE_ID_SEQ
  - PIMS_BUILDING_EVALUATION_ID_SEQ
  - PIMS_BUILDING_FISCAL_ID_SEQ
  - PIMS_BUILDING_ID_SEQ
  - PIMS_BUILDING_OCCUPANT_TYPE_ID_SEQ
  - PIMS_BUILDING_PREDOMINATE_USE_ID_SEQ
  - PIMS_FILE_ENTITY_ID_SEQ
  - PIMS_FILE_ENTITY_PERMISSIONS_ID_SEQ
  - PIMS_FORM_ID_SEQ
  - PIMS_GL_ACCOUNT_ID_SEQ
  - PIMS_INTEREST_HOLDER_PROPERTY_ID_SEQ
  - PIMS_LEASE_ACTIVITY_ID_SEQ
  - PIMS_LEASE_ACTIVITY_INSTANCE_ID_SEQ
  - PIMS_LEASE_ACTIVITY_PERIOD_ID_SEQ
  - PIMS_LEASE_PAYMENT_FORECAST_ID_SEQ
  - PIMS_LEASE_PAYMENT_PERIOD_ID_SEQ
  - PIMS_LEASE_STAKEHOLDER_COMP_REQ_ID_SEQ
  - PIMS_LEASE_TERM_ID_SEQ
  - PIMS_MANAGEMENT_FILE_ACTIVITY_ID_SEQ
  - PIMS_OWNER_REPRESENTATIVE_ID_SEQ
  - PIMS_OWNER_SOLICITOR_ID_SEQ
  - PIMS_PRODUCT_BUSINESS_FUNCTION_ID_SEQ
  - PIMS_PRODUCT_COST_ID_SEQ
  - PIMS_PRODUCT_WORK_ACTIVITY_ID_SEQ
  - PIMS_PROJECT_NUMBER_SEQ
  - PIMS_PROJECT_ORGANIZATION_ID_SEQ
  - PIMS_PROJECT_PROPERTY_ID_SEQ
  - PIMS_PROJECT_TEAM_ID_SEQ
  - PIMS_PROJECT_WORKFLOW_MODEL_ID_SEQ
  - PIMS_PROP_PROP_ADJACENT_LAND_TYPE_ID_SEQ
  - PIMS_PROPERTY_EVALUATION_ID_SEQ
  - PIMS_PROPERTY_PROPERTY_SERVICE_FILE_ID_SEQ
  - PIMS_PROPERTY_SERVICE_FILE_ID_SEQ
  - PIMS_PROPERTY_STRUCTURE_ID_SEQ
  - PIMS_PROPERTY_TAX_ID_SEQ
  - PIMS_RESEARCH_ACTIVITY_INSTANCE_ID_SEQ
  - PIMS_RESPONSIBILITY_CENTRE_ID_SEQ
  - PIMS_STRUCTURE_ID_SEQ
  - PIMS_TASK_ID_SEQ
  - PIMS_TASK_TEMPLATE_ACTIVITY_MODEL_ID_SEQ
  - PIMS_TASK_TEMPLATE_ID_SEQ
  - PIMS_USER_TASK_ID_SEQ
  - PIMS_WORKFLOW_MODEL_ID_SEQ
…and related logic for improved clarity and consistency
…enhance error handling, and improve span management across various components
…servability

PSP-11187 Add bomb errors to our user tracking (FE) - Do Not Merge for 6.0 release
# Conflicts:
#	source/frontend/src/features/mapSideBar/acquisition/AcquisitionContainer.tsx
devinleighsmith and others added 22 commits April 1, 2026 07:32
psp-11362 limit document global search visibility based on file/regio…
Increase the timeout values of several CI tasks
…fications-Keycloak

PSP-11331 permissions notifications keycloak
Run scripts to add notification claims in Alter Up master.sql transaction
…-AcquisitionFile

PSP-11333: When saving a property that is in the MOTT Inventory but lacks of spatial data, the property is saved within the file but it doesn't navigate back to the View form
@asanchezr asanchezr self-assigned this Apr 9, 2026
Comment on lines +52 to +142
runs-on: ubuntu-22.04
needs: ci-cd-start-notification
outputs:
deps_changed: ${{ steps.detect.outputs.deps_changed }}
steps:
- uses: actions/checkout@34e114876b0b11c390a56381ad16ebd13914f8d5 # v4.3.1
with:
fetch-depth: 0

- name: Detect dependency changes since last successful run
id: detect
env:
GH_TOKEN: ${{ github.token }}
run: |
RUNS=$(gh run list \
--workflow "${{ env.WORKFLOW_NAME }}" \
--status success \
--limit 1 \
--json headSha)

LAST_SHA=$(echo "$RUNS" | jq -r '.[0].headSha // empty')

if [ -z "$LAST_SHA" ]; then
echo "No previous successful run found — using HEAD~1"
LAST_SHA=$(git rev-parse HEAD~1)
fi

echo "Last successful run SHA: $LAST_SHA"
echo "Current SHA: $(git rev-parse HEAD)"

tracked_files=$(git ls-files \
'**/package.json' \
'**/package-lock.json' \
'**/*.csproj' \
'**/*.props')

deps_changed=false

extract_node_deps() {
jq '{
dependencies: (.dependencies // {}),
devDependencies: (.devDependencies // {})
}' -S
}

extract_itemgroups() {
sed -n '/<ItemGroup>/,/<\/ItemGroup>/p' | grep '<PackageReference' | sed 's/^ *//'
}

for file in $tracked_files; do
echo "Checking $file"

old_raw=$(git show "$LAST_SHA:$file" 2>/dev/null || true)
new_raw=$(git show "HEAD:$file" 2>/dev/null || true)

if [[ -z "$old_raw" || -z "$new_raw" ]]; then
echo "Skipping $file (missing in one revision)"
continue
fi

############################################
# package.json and package-lock.json
############################################
if [[ "$file" == *package.json || "$file" == *package-lock.json ]]; then
old=$(echo "$old_raw" | extract_node_deps)
new=$(echo "$new_raw" | extract_node_deps)
############################################
# .csproj / .props
############################################
elif [[ "$file" == *.csproj || "$file" == *.props ]]; then
old=$(echo "$old_raw" | extract_itemgroups)
new=$(echo "$new_raw" | extract_itemgroups)
fi

############################################
# Show diff
############################################
diff_output=$(diff -u <(echo "$old") <(echo "$new") || true)

if [[ -n "$diff_output" ]]; then
deps_changed=true
echo ""
echo "=============================="
echo "Semantic diff for $file"
echo "=============================="
echo "$diff_output"
fi
done
echo "deps_changed=$deps_changed" >> "$GITHUB_OUTPUT"

scan-images:
Comment on lines 143 to +215
@@ -63,104 +168,93 @@ jobs:
namespace: ${{ env.OPENSHIFT_TOOLS_NAMESPACE }}
- name: Docker login to OpenShift registry
run: echo "${{ env.OPENSHIFT_TOKEN }}" | docker login ${{ env.OPENSHIFT_REGISTRY }} -u unused --password-stdin
- name: Pre-deploy scan frontend (block on CRITICAL/HIGH)
- name: Scan container image
env:
IMAGE: ${{ env.OPENSHIFT_REGISTRY }}/3cd915-tools/pims-app:dev
IMAGE: ${{ env.OPENSHIFT_REGISTRY }}/3cd915-tools/${{ matrix.service.image }}:dev
run: |
docker pull "$IMAGE";
docker run --rm -v /var/run/docker.sock:/var/run/docker.sock aquasec/trivy@sha256:b7dc41ff0c3224dea024ee21bb9f6920a8af2fb343bba7139140d8fd0df1bac3 image --exit-code 1 --scanners vuln,secret,misconfig --format table --severity CRITICAL,HIGH "$IMAGE" | tee frontend_predeploy_scan.txt;
docker run --rm -v /var/run/docker.sock:/var/run/docker.sock -v "$PWD:/workspace" aquasec/trivy@sha256:b7dc41ff0c3224dea024ee21bb9f6920a8af2fb343bba7139140d8fd0df1bac3 image --scanners vuln,secret,misconfig --format sarif --severity CRITICAL,HIGH "$IMAGE" -o /workspace/frontend_predeploy_scan.sarif
- name: Upload frontend SARIF to Security tab
docker pull "$IMAGE"

docker run --rm -v /var/run/docker.sock:/var/run/docker.sock \
aquasec/trivy@sha256:b7dc41ff0c3224dea024ee21bb9f6920a8af2fb343bba7139140d8fd0df1bac3 \
image --exit-code 1 \
--scanners vuln,secret,misconfig \
--format table \
--severity CRITICAL,HIGH \
"$IMAGE" | tee ${{ matrix.service.name }}_predeploy_scan.txt

docker run --rm -v /var/run/docker.sock:/var/run/docker.sock \
-v "$PWD:/workspace" \
aquasec/trivy@sha256:b7dc41ff0c3224dea024ee21bb9f6920a8af2fb343bba7139140d8fd0df1bac3 \
image \
--scanners vuln,secret,misconfig \
--format sarif \
--severity CRITICAL,HIGH \
"$IMAGE" \
-o /workspace/${{ matrix.service.name }}_predeploy_scan.sarif
- name: Upload SARIF to Security tab
if: always()
uses: github/codeql-action/upload-sarif@aa578102511db1f4524ed59b8cc2bae4f6e88195 # v3.27.9
with:
sarif_file: frontend_predeploy_scan.sarif
category: test-frontend-predeploy
sarif_file: ${{ matrix.service.name }}_predeploy_scan.sarif
category: test-${{ matrix.service.name }}-predeploy
- name: Upload SARIF files as artifacts
if: always()
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882
with:
name: test-predeploy-sarif-${{ matrix.service.name }}
path: ${{ matrix.service.name }}_predeploy_scan.sarif
retention-days: 14
- name: Upload scan reports
if: failure()
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882
with:
name: test-predeploy-scan-${{ matrix.service.name }}
path: ${{ matrix.service.name }}_predeploy_scan.txt
retention-days: 14

deploy:
name: Retag/Deploy to OpenShift
needs: [ci-cd-start-notification, scan-images]
if: |
always() &&
(needs.scan-images.result == 'success' || needs.scan-images.result == 'skipped')
Copy link
Copy Markdown

@github-advanced-security github-advanced-security AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

CodeQL found more than 20 potential problems in the proposed changes. Check the Files changed tab for more details.

@github-actions
Copy link
Copy Markdown
Contributor

github-actions bot commented Apr 9, 2026

See CodeCov Report Here: https://app.codecov.io/github/bcgov/psp/pull/5278

@sonarqubecloud
Copy link
Copy Markdown

sonarqubecloud bot commented Apr 9, 2026

Quality Gate Failed Quality Gate failed

Failed conditions
3 Security Hotspots
82.1% Duplication on New Code (required ≤ 3%)
E Reliability Rating on New Code (required ≥ A)

See analysis details on SonarQube Cloud

Catch issues before they fail your Quality Gate with our IDE extension SonarQube for IDE

@github-actions
Copy link
Copy Markdown
Contributor

github-actions bot commented Apr 9, 2026

See CodeCov Report Here: https://app.codecov.io/github/bcgov/psp/pull/5278

Copy link
Copy Markdown
Collaborator

@JamesPayer JamesPayer left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

UAT release for 6.1

@JamesPayer JamesPayer merged commit 5c23185 into bcgov:test Apr 9, 2026
18 of 19 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

8 participants