GSA-TTS / FAC

GSA's Federal Audit Clearinghouse
Other
20 stars 5 forks source link

Search - Fix Major Program Display #4445

Closed jperson1 closed 1 week ago

jperson1 commented 2 weeks ago

Search - Fix Major Program Display

In advanced search, the major program choice does not carry over after the search has been made. The search behavior is unaffected. But a user could potentially make a search with this filter and make a new one without re-selecting the major program choice, which would be confusing.

Change:

Use the proper key in major program form fields

How to test:

  1. Verify on main that the major program choice does not carry over after making a search.
  2. Switch to this branch and run normally.
  3. Verify that the major program choice carries over properly.

PR Checklist: Submitter

PR Checklist: Reviewer

The larger the PR, the stricter we should be about these points.

Pre Merge Checklist: Merger

github-actions[bot] commented 2 weeks ago

Terraform plan for meta

No changes. Your infrastructure matches the configuration. ``` No changes. Your infrastructure matches the configuration. Terraform has compared your real infrastructure against your configuration and found no differences, so no changes are needed. Warning: Argument is deprecated with module.s3-backups.cloudfoundry_service_instance.bucket, on /tmp/terraform-data-dir/modules/s3-backups/s3/main.tf line 14, in resource "cloudfoundry_service_instance" "bucket": 14: recursive_delete = var.recursive_delete Since CF API v3, recursive delete is always done on the cloudcontroller side. This will be removed in future releases ```

:white_check_mark: Plan applied in Deploy to Development and Management Environment #858

github-actions[bot] commented 2 weeks ago

Terraform plan for dev

Plan: 1 to add, 0 to change, 1 to destroy. ```diff Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: -/+ destroy and then create replacement Terraform will perform the following actions: # module.dev.module.cors.null_resource.cors_header must be replaced -/+ resource "null_resource" "cors_header" { !~ id = "*******************" -> (known after apply) !~ triggers = { # forces replacement !~ "always_run" = "2024-11-08T19:24:07Z" -> (known after apply) } } Plan: 1 to add, 0 to change, 1 to destroy. Warning: Argument is deprecated with module.dev-backups-bucket.cloudfoundry_service_instance.bucket, on /tmp/terraform-data-dir/modules/dev-backups-bucket/s3/main.tf line 14, in resource "cloudfoundry_service_instance" "bucket": 14: recursive_delete = var.recursive_delete Since CF API v3, recursive delete is always done on the cloudcontroller side. This will be removed in future releases (and 6 more similar warnings elsewhere) ```

:white_check_mark: Plan applied in Deploy to Development and Management Environment #858

github-actions[bot] commented 1 week ago

Terraform plan for meta

Plan: 8 to add, 0 to change, 0 to destroy. ```diff Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: + create Terraform will perform the following actions: # module.environments["dev"].local_file.initialization_script will be created + resource "local_file" "initialization_script" { + content = <<-EOT #!/bin/bash # The content of this file is managed by Terraform. If you modify it, it may # be reverted the next time Terraform runs. If you want to make changes, do it # in ../meta/bootstrap-env/templates. set -e terraform init \ --backend-config=../shared/config/backend.tfvars \ --backend-config=key=terraform.tfstate.$(basename $(pwd)) EOT + content_base64sha256 = (known after apply) + content_base64sha512 = (known after apply) + content_md5 = (known after apply) + content_sha1 = (known after apply) + content_sha256 = (known after apply) + content_sha512 = (known after apply) + directory_permission = "0777" + file_permission = "0755" + filename = "./../dev/init.sh" + id = (known after apply) } # module.environments["dev"].local_file.providers-tf will be created + resource "local_file" "providers-tf" { + content = <<-EOT # The content of this file is managed by Terraform. If you modify it, it may # be reverted the next time Terraform runs. If you want to make changes, do it # in ../meta/bootstrap-env/templates. terraform { required_version = "~> 1.0" required_providers { cloudfoundry = { source = "cloudfoundry-community/cloudfoundry" version = "~>0.51.3" } } backend "s3" { # The rest of the backend parameters must be supplied when you initialize: # terraform init --backend-config=../shared/config/backend.tfvars \ # --backend-config=key=terraform.tfstate.$(basename $(pwd)) # # For more info, see: # https://developer.hashicorp.com/terraform/language/settings/backends/configuration#partial-configuration encrypt = "true" } } provider "cloudfoundry" { api_url = "https://api.fr.cloud.gov" user = var.cf_user password = var.cf_password } EOT + content_base64sha256 = (known after apply) + content_base64sha512 = (known after apply) + content_md5 = (known after apply) + content_sha1 = (known after apply) + content_sha256 = (known after apply) + content_sha512 = (known after apply) + directory_permission = "0777" + file_permission = "0644" + filename = "./../dev/providers-managed.tf" + id = (known after apply) } # module.environments["preview"].local_file.initialization_script will be created + resource "local_file" "initialization_script" { + content = <<-EOT #!/bin/bash # The content of this file is managed by Terraform. If you modify it, it may # be reverted the next time Terraform runs. If you want to make changes, do it # in ../meta/bootstrap-env/templates. set -e terraform init \ --backend-config=../shared/config/backend.tfvars \ --backend-config=key=terraform.tfstate.$(basename $(pwd)) EOT + content_base64sha256 = (known after apply) + content_base64sha512 = (known after apply) + content_md5 = (known after apply) + content_sha1 = (known after apply) + content_sha256 = (known after apply) + content_sha512 = (known after apply) + directory_permission = "0777" + file_permission = "0755" + filename = "./../preview/init.sh" + id = (known after apply) } # module.environments["preview"].local_file.providers-tf will be created + resource "local_file" "providers-tf" { + content = <<-EOT # The content of this file is managed by Terraform. If you modify it, it may # be reverted the next time Terraform runs. If you want to make changes, do it # in ../meta/bootstrap-env/templates. terraform { required_version = "~> 1.0" required_providers { cloudfoundry = { source = "cloudfoundry-community/cloudfoundry" version = "~>0.51.3" } } backend "s3" { # The rest of the backend parameters must be supplied when you initialize: # terraform init --backend-config=../shared/config/backend.tfvars \ # --backend-config=key=terraform.tfstate.$(basename $(pwd)) # # For more info, see: # https://developer.hashicorp.com/terraform/language/settings/backends/configuration#partial-configuration encrypt = "true" } } provider "cloudfoundry" { api_url = "https://api.fr.cloud.gov" user = var.cf_user password = var.cf_password } EOT + content_base64sha256 = (known after apply) + content_base64sha512 = (known after apply) + content_md5 = (known after apply) + content_sha1 = (known after apply) + content_sha256 = (known after apply) + content_sha512 = (known after apply) + directory_permission = "0777" + file_permission = "0644" + filename = "./../preview/providers-managed.tf" + id = (known after apply) } # module.environments["production"].local_file.initialization_script will be created + resource "local_file" "initialization_script" { + content = <<-EOT #!/bin/bash # The content of this file is managed by Terraform. If you modify it, it may # be reverted the next time Terraform runs. If you want to make changes, do it # in ../meta/bootstrap-env/templates. set -e terraform init \ --backend-config=../shared/config/backend.tfvars \ --backend-config=key=terraform.tfstate.$(basename $(pwd)) EOT + content_base64sha256 = (known after apply) + content_base64sha512 = (known after apply) + content_md5 = (known after apply) + content_sha1 = (known after apply) + content_sha256 = (known after apply) + content_sha512 = (known after apply) + directory_permission = "0777" + file_permission = "0755" + filename = "./../production/init.sh" + id = (known after apply) } # module.environments["production"].local_file.providers-tf will be created + resource "local_file" "providers-tf" { + content = <<-EOT # The content of this file is managed by Terraform. If you modify it, it may # be reverted the next time Terraform runs. If you want to make changes, do it # in ../meta/bootstrap-env/templates. terraform { required_version = "~> 1.0" required_providers { cloudfoundry = { source = "cloudfoundry-community/cloudfoundry" version = "~>0.51.3" } } backend "s3" { # The rest of the backend parameters must be supplied when you initialize: # terraform init --backend-config=../shared/config/backend.tfvars \ # --backend-config=key=terraform.tfstate.$(basename $(pwd)) # # For more info, see: # https://developer.hashicorp.com/terraform/language/settings/backends/configuration#partial-configuration encrypt = "true" } } provider "cloudfoundry" { api_url = "https://api.fr.cloud.gov" user = var.cf_user password = var.cf_password } EOT + content_base64sha256 = (known after apply) + content_base64sha512 = (known after apply) + content_md5 = (known after apply) + content_sha1 = (known after apply) + content_sha256 = (known after apply) + content_sha512 = (known after apply) + directory_permission = "0777" + file_permission = "0644" + filename = "./../production/providers-managed.tf" + id = (known after apply) } # module.environments["staging"].local_file.initialization_script will be created + resource "local_file" "initialization_script" { + content = <<-EOT #!/bin/bash # The content of this file is managed by Terraform. If you modify it, it may # be reverted the next time Terraform runs. If you want to make changes, do it # in ../meta/bootstrap-env/templates. set -e terraform init \ --backend-config=../shared/config/backend.tfvars \ --backend-config=key=terraform.tfstate.$(basename $(pwd)) EOT + content_base64sha256 = (known after apply) + content_base64sha512 = (known after apply) + content_md5 = (known after apply) + content_sha1 = (known after apply) + content_sha256 = (known after apply) + content_sha512 = (known after apply) + directory_permission = "0777" + file_permission = "0755" + filename = "./../staging/init.sh" + id = (known after apply) } # module.environments["staging"].local_file.providers-tf will be created + resource "local_file" "providers-tf" { + content = <<-EOT # The content of this file is managed by Terraform. If you modify it, it may # be reverted the next time Terraform runs. If you want to make changes, do it # in ../meta/bootstrap-env/templates. terraform { required_version = "~> 1.0" required_providers { cloudfoundry = { source = "cloudfoundry-community/cloudfoundry" version = "~>0.51.3" } } backend "s3" { # The rest of the backend parameters must be supplied when you initialize: # terraform init --backend-config=../shared/config/backend.tfvars \ # --backend-config=key=terraform.tfstate.$(basename $(pwd)) # # For more info, see: # https://developer.hashicorp.com/terraform/language/settings/backends/configuration#partial-configuration encrypt = "true" } } provider "cloudfoundry" { api_url = "https://api.fr.cloud.gov" user = var.cf_user password = var.cf_password } EOT + content_base64sha256 = (known after apply) + content_base64sha512 = (known after apply) + content_md5 = (known after apply) + content_sha1 = (known after apply) + content_sha256 = (known after apply) + content_sha512 = (known after apply) + directory_permission = "0777" + file_permission = "0644" + filename = "./../staging/providers-managed.tf" + id = (known after apply) } Plan: 8 to add, 0 to change, 0 to destroy. Warning: Argument is deprecated with module.s3-backups.cloudfoundry_service_instance.bucket, on /tmp/terraform-data-dir/modules/s3-backups/s3/main.tf line 14, in resource "cloudfoundry_service_instance" "bucket": 14: recursive_delete = var.recursive_delete Since CF API v3, recursive delete is always done on the cloudcontroller side. This will be removed in future releases ```

:memo: Plan generated in Pull Request Checks #3916

github-actions[bot] commented 1 week ago

Code Coverage

Package Line Rate Branch Rate Health
. 100% 100%
api 98% 90%
audit 97% 87%
audit.cross_validation 98% 86%
audit.fixtures 84% 50%
audit.intakelib 90% 81%
audit.intakelib.checks 92% 85%
audit.intakelib.common 98% 82%
audit.intakelib.transforms 100% 94%
audit.management.commands 78% 17%
audit.migrations 100% 100%
audit.models 93% 75%
audit.templatetags 100% 100%
audit.views 61% 41%
census_historical_migration 96% 65%
census_historical_migration.migrations 100% 100%
census_historical_migration.sac_general_lib 92% 84%
census_historical_migration.transforms 95% 90%
census_historical_migration.workbooklib 68% 69%
config 78% 17%
curation 100% 100%
curation.curationlib 57% 100%
curation.migrations 100% 100%
dissemination 91% 72%
dissemination.migrations 97% 25%
dissemination.searchlib 74% 64%
dissemination.templatetags 100% 100%
djangooidc 53% 38%
djangooidc.tests 100% 94%
report_submission 93% 88%
report_submission.migrations 100% 100%
report_submission.templatetags 74% 100%
support 95% 78%
support.management.commands 96% 100%
support.migrations 100% 100%
support.models 97% 83%
tools 98% 50%
users 98% 100%
users.fixtures 100% 83%
users.management 100% 100%
users.management.commands 100% 100%
users.migrations 100% 100%
Summary 91% (17131 / 18906) 77% (2116 / 2764)