-
Notifications
You must be signed in to change notification settings - Fork 13
Findings Summary Report #5140
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Findings Summary Report #5140
Conversation
We've been asked for something like this forever. We've had the code for over a year. This is a "v1." Perhaps we only generate it for Feds. Pushing it as a "what if," so we can discuss it.
This has been requested for a long time. We had most of the logic. Performant enough with a few thousand results.
Terraform plan for meta No changes. Your infrastructure matches the configuration.
✅ Plan applied in Deploy to Development and Meta Environments #1050 |
Terraform plan for dev Plan: 1 to add, 0 to change, 1 to destroy.Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
-/+ destroy and then create replacement
Terraform will perform the following actions:
# module.dev.module.cors.null_resource.cors_header must be replaced
-/+ resource "null_resource" "cors_header" {
!~ id = "******************" -> (known after apply)
!~ triggers = { # forces replacement
!~ "always_run" = "2025-07-29T14:56:26Z" -> (known after apply)
}
}
Plan: 1 to add, 0 to change, 1 to destroy. ✅ Plan applied in Deploy to Development and Meta Environments #1050 |
backend/dissemination/report_generation/findings_summary_report.py
Outdated
Show resolved
Hide resolved
backend/dissemination/report_generation/findings_summary_report.py
Outdated
Show resolved
Hide resolved
backend/dissemination/management/commands/delete_and_regenerate_dissemination_from_intake.py
Show resolved
Hide resolved
I believe, based on unit testing and manual testing, that this will protect the code in question. These are both cases where I almost want a bare `except: pass`, but I've chosen not to. We'll need to keep our eyes on this, but it looks good.
This pull request is not up to date with main. Please merge main into this brach or rebase this branch onto main. This PR should not be approved until all status checks pass. If you see this message, please rerun all status checks before merging. |
|
Findings Summary Report Generation
No issue?
Changes:
Testing
users_userpermission
table)Screenshot:
PR Checklist: Submitter
main
into your branch shortly before creating the PR. (You should also be mergingmain
into your branch regularly during development.)git status | grep migrations
. If there are any results, you probably need to add them to the branch for the PR. Your PR should have only one new migration file for each of the component apps, except in rare circumstances; you may need to delete some and re-runpython manage.py makemigrations
to reduce the number to one. (Also, unless in exceptional circumstances, your PR should not delete any migration files.)PR Checklist: Reviewer
make docker-clean; make docker-first-run && docker compose up
; then rundocker compose exec web /bin/bash -c "python manage.py test"
The larger the PR, the stricter we should be about these points.
Pre Merge Checklist: Merger
-/+ resource "null_resource" "cors_header"
should be destroying and recreating its self and~ resource "cloudfoundry_app" "clamav_api"
might be updating itssha256
for thefac-file-scanner
andfac-av-${ENV}
by default.main
.