Capturing these details from sprint planning for future reference:
- We will likely introduce an Attestations endpoint to get the latest attestations text, along with a unique id associated with t...
When I deploy my sandbox, it creates several log groups. When I run `cdk destroy "Sandbox/*"`, then deploy again, I would expect a clean deploy without extraneous resources in my AWS environment. I...
Yeah I think so - the more we can abstract the complexity here away into a single place, the better. And then, if a comment is still needed, we can add one in one place.
Yeah, I'm anticipating that we will update the key structure and use the inverted key so that we can support both exchanging ssn->provider_id as well as provider_id->ssn
We could, though they are different because we are expecting different behaviors there:
`data.pop(X, None)` will not produce a `KeyError` in the event that `X` is not in `data`, but `del data[X]` ...
<img width="365" alt="image" src="https://github.com/user-attachments/assets/7d98d0d7-f7bb-417f-8efa-b38f1d278a3b" />
Steps to reproduce-
1. Log in as Board ED
2. Go to `/aslp/Licensing`
3....
## UI Bug
<img width="365" alt="image" src="https://github.com/user-attachments/assets/7d98d0d7-f7bb-417f-8efa-b38f1d278a3b" />
Steps to reproduce-
1. Log in as Board ED
2. Go to `/aslp/L...
This detail is great in explaining how it is working, but I still don't understand why we need to avoid creating that dependency. Does it create a circular dependency between stacks? Could we make ...
Wouldn't we want to instead (or additionally) test a permission structure like the below (all false)?
Perhaps (1) create user with no permissions, (2) add permissions, (3) patch user with someth...