From 06345099eba80fa995c19a50d17b6b6718528c08 Mon Sep 17 00:00:00 2001 From: Eli Ribble Date: Fri, 3 Apr 2026 03:41:26 +0000 Subject: [PATCH] Add permission mock in compliance flow --- .../rmo/district-compliance-evidence.html | 6 +- .../rmo/district-compliance-permission.html | 368 ++++++++++++++++++ rmo/compliance.go | 16 + rmo/routes.go | 1 + 4 files changed, 388 insertions(+), 3 deletions(-) create mode 100644 html/template/rmo/district-compliance-permission.html diff --git a/html/template/rmo/district-compliance-evidence.html b/html/template/rmo/district-compliance-evidence.html index 4255670a..2dd6c47d 100644 --- a/html/template/rmo/district-compliance-evidence.html +++ b/html/template/rmo/district-compliance-evidence.html @@ -220,12 +220,12 @@
- + Back - +
diff --git a/html/template/rmo/district-compliance-permission.html b/html/template/rmo/district-compliance-permission.html new file mode 100644 index 00000000..cf92ac11 --- /dev/null +++ b/html/template/rmo/district-compliance-permission.html @@ -0,0 +1,368 @@ +{{ template "rmo/layout/base.html" . }} + +{{ define "title" }}Property Access{{ end }} +{{ define "extraheader" }} + +{{ end }} +{{ define "content" }} +
+ +
+
+ {{ .District.Name }} logo +

{{ .District.Name }}

+
+
+ {{ .District.OfficePhone }} +
+
+ + +
+
+ Step 5 of 10 +
+
+
+
+
+ + +
+

Property access permission

+ +

+ Granting access allows our technicians to inspect and potentially treat + mosquito sources more quickly, helping protect you and your neighbors. +

+ +
+ +
+ + + +
+
+ + +
+
+ + +
+
+ + +
+ +
+ + +
+ +
+ +
+ + +
+
+ + +
+
+ + +
+ + +
+
+ + +
+
+ + +
+
+ + +
+ +
+ + +
+
+ + +
+
+ + +
+
+ + +
+
+

+ We understand. Your cooperation is voluntary, + but mosquito breeding sources can affect the health and comfort + of the entire community. +

+

+ To help us review this situation and avoid unnecessary + escalation, we strongly encourage you to: +

+
    +
  • Provide detailed photos of the area
  • +
  • Share your contact information
  • +
  • Include any context that may be helpful
  • +
+

+ + This allows our team to assess whether the concern has been + addressed or if additional steps may be necessary. + +

+
+
+
+ + +
+ + Back + + +
+
+
+
+ + +{{ end }} diff --git a/rmo/compliance.go b/rmo/compliance.go index e2dcd2de..84933a2e 100644 --- a/rmo/compliance.go +++ b/rmo/compliance.go @@ -69,3 +69,19 @@ func getDistrictComplianceEvidence(w http.ResponseWriter, r *http.Request) { }, ) } + +func getDistrictCompliancePermission(w http.ResponseWriter, r *http.Request) { + district, err := districtBySlug(r) + if err != nil { + respondError(w, "Failed to lookup organization", err, http.StatusBadRequest) + return + } + html.RenderOrError( + w, + "rmo/district-compliance-permission.html", + ContentNuisance{ + District: newContentDistrict(district), + URL: makeContentURL(nil), + }, + ) +} diff --git a/rmo/routes.go b/rmo/routes.go index cba8e667..8eef5fac 100644 --- a/rmo/routes.go +++ b/rmo/routes.go @@ -20,6 +20,7 @@ func Router(r *mux.Router) { r.HandleFunc("/district/{slug}/compliance/address", getDistrictComplianceAddress).Methods("GET") r.HandleFunc("/district/{slug}/compliance/concern", getDistrictComplianceConcern).Methods("GET") r.HandleFunc("/district/{slug}/compliance/evidence", getDistrictComplianceEvidence).Methods("GET") + r.HandleFunc("/district/{slug}/compliance/permission", getDistrictCompliancePermission).Methods("GET") r.HandleFunc("/district/{slug}/nuisance", getNuisanceDistrict).Methods("GET") //r.HandleFunc("/district/{slug}/nuisance-submit-complete", renderMock(mockNuisanceSubmitCompleteT)).Methods("GET") //r.HandleFunc("/district/{slug}/status", renderMock(mockStatusT)).Methods("GET")