Skip to content

[API] Allow checking in other types of participants #355

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
Tracked by #266 ...
taesungh opened this issue Jan 25, 2024 · 0 comments · Fixed by #357
Closed
Tracked by #266 ...

[API] Allow checking in other types of participants #355

taesungh opened this issue Jan 25, 2024 · 0 comments · Fixed by #357
Assignees

Comments

@taesungh
Copy link
Member

Following from #268, we added an endpoint to check in hackers, but we still need to be able to check in non-hackers. In conjunction with #322 as part of #318, we'll assume for now the status of non-hackers will be updated to CONFIRMED or ATTENDING (exact TBD), so the logic is almost the same as for non-hackers. The only additional check we should need to make is that the user role is not empty.

  • Repurpose participant_manager.check_in_applicant to allow checking in non-hackers.
  • Make sure the user's role is not empty during the database query
  • Use the same existing status check (ATTENDING or CONFIRMED)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants