ЕСОЗ - публічна документація
RC_[UPD]Mark in error Device request
Purpose
This WS is designed to mark in error previously created Device request in case it was entered in error.
Specification
Authorization
Verify the validity of access token
in case of error - return 401 (“Invalid access token”) in case of validation fails
Verify that token is not expired
in case of error - return 401 (“Invalid access token”)
Check user scopes in order to perform this action (scope = 'device_request:mark_in_error')
return 403 (“Your scope does not allow to access this resource. Missing allowances: device_request:mark_in_error”) in case of invalid scope(s)
If BLOCK_UNVERIFIED_PARTY_USERS is true, then check party's data match following condition: verification_status != NOT_VERIFIED or (verification_status = NOT_VERIFIED and updated_at > current_date - UNVERIFIED_PARTY_PERIOD_DAYS_ALLOWED):
in case not match - return 403 ("Access denied. Party is not verified")
If BLOCK_DECEASED_PARTY_USERS is true, check that party is not deceased (party_verification record does not equal to: dracs_death_verification_status = VERIFIED and dracs_death_verification_reason = MANUAL_CONFIRMED):
in case of error - return 403 ("Access denied. Party is deceased")
Validations
Validate request
Return 422 with the list of validation errors in case validation fails
Validate legal entity
Check legal entity type: it has to be in me_allowed_transactions_le_types config parameter, has status = active and nhs_verified = true
in case of error return 409 "Action is not allowed for the legal entity"
Validate digital signature
Validate request is signed
in case of error - return 400 (“Invalid signed content”)
Check DS is valid and not expired
Validate that DS belongs to the user
Check that DRFO from DS and party.tax_id matches
in case of error - return 422 (“Does not match the signer drfo“)
Validate user
Marking in error a Device Request is allowed for a user if he has one of the following active and approved employee that:
is an Employee from legal entity where Device Request is created
in case of error - return 409 ("Only an employee from legal entity where device request is created can mark it in error")
Validate transition
Get current device request status
Check that status != “entered_in_error”
in case of error - return 409 error ('Device request in status entered_in_error cannot be marked in error')
For more information look at Device request status model
Validate status reason
Validate $.status_reason.code is a value from device_request_mark_in_error_reasons dictionary
in case of error - return 422 ("value is not allowed in enum")
Validate status
The target status value must be submitted in the order of display in the signed content (media storage)
Validate $.status is entered_in_error
in case of error - return 422 ("value is not allowed in enum")
Validate content
Signed content must match with device request in DB in order to be marked in error
Render device request from DB
Exclude $status from signed content
Compare rendered device request and signed content
In case both object doesn't match - return 422 ('Signed content doesn't match with previously created device request')
Service logic
Save signed content to media storage
Update device request status to entered-in-error (update also updated_at, updated_by)
Get person's authentication_method according to logic:
If inform_with exists in device request and is not empty, check:
Authentication method exists in person_authentication_methods table in MPI DB (with is_active=true), is active (ended_at > now() or null)
Get value of
THIRD_PERSON_CONFIDANT_PERSON_RELATIONSHIP_CHECK
config parameter, if it is set totrue
- for authentication method with type = THIRD_PERSON check that person from value is an approved confidant for a person from device request – exists active and approved confidant person relationship between person from request and confidant_person_id from authentication method value (using following logic Check confidant person relationship withperson_id
= person from request andconfidant_person_id
= value from auth method - expected:ok, :approved
response)in case any validation failed - do not send SMS to person
else - get authentication_method from inform_with
If inform_with does not exist in device request or is empty - get default authentication_method of person from MPI using logic Determination of a default authentication method and return person's active auth_methods
If authentication_method == OTP or THIRD_PERSON (with OTP),:
Check if sms notifications are enabled and generate template:
if device_request has a program specified
check that the specified program has setting
request_notification_disabled
set in false or the setting is absentif device_request is for assistive device (device_request.code OR at least one classification type of device_request.code_reference is in dictionary configuration “assistive_devices”) generate SMS text with template
MARK_IN_ERROR_ASSISTIVE_DEVICE_REQUEST_SMS_TEMPLATE
else generate text SMS with template
MARK_IN_ERROR_DEVICE_REQUEST_SMS_TEMPLATE
if device_request has no program specified
if device_request is for assistive device (device_request.code OR at least one classification type of device_request.code_reference is in dictionary configuration “assistive_devices”)
check that
ASSISTIVE_DEVICE_REQUESTS_SMS_ENABLED
is set in truegenerate text SMS with template
MARK_IN_ERROR_ASSISTIVE_DEVICE_REQUEST_SMS_TEMPLATE
else check config parameter
DEVICE_REQUESTS_SMS_ENABLED
is set in truegenerate text SMS with template
MARK_IN_ERROR_DEVICE_REQUEST_SMS_TEMPLATE
Send SMS
Save internal information to corresponding DB
Send
StatusChangeEvent
to the Event Manager
ЕСОЗ - публічна документація