-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add Reporting Periods Page #36
Conversation
Terraform Summary
Hint: If "Terraform Format & Style" failed, run OutputValidation Output
Plan OutputTerraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
+ create
~ update in-place
- destroy
-/+ destroy and then create replacement
+/- create replacement and then destroy
Terraform will perform the following actions:
# aws_ecs_service.console will be updated in-place
~ resource "aws_ecs_service" "console" {
id = "arn:aws:ecs:us-west-2:357150818708:service/cpfreporter/cpfreporter-console"
name = "cpfreporter-console"
tags = {}
~ task_definition = "arn:aws:ecs:us-west-2:357150818708:task-definition/cpfreporter-console:4" -> (known after apply)
# (15 unchanged attributes hidden)
# (3 unchanged blocks hidden)
}
# aws_ecs_task_definition.console must be replaced
+/- resource "aws_ecs_task_definition" "console" {
~ arn = "arn:aws:ecs:us-west-2:357150818708:task-definition/cpfreporter-console:4" -> (known after apply)
~ arn_without_revision = "arn:aws:ecs:us-west-2:357150818708:task-definition/cpfreporter-console" -> (known after apply)
~ container_definitions = (sensitive value) # forces replacement
~ id = "cpfreporter-console" -> (known after apply)
~ revision = 4 -> (known after apply)
- tags = {} -> null
# (9 unchanged attributes hidden)
# (1 unchanged block hidden)
}
# aws_s3_object.lambda_artifact-graphql must be replaced
+/- resource "aws_s3_object" "lambda_artifact-graphql" {
+ acl = (known after apply)
~ bucket_key_enabled = false -> (known after apply)
+ checksum_crc32 = (known after apply)
+ checksum_crc32c = (known after apply)
+ checksum_sha1 = (known after apply)
+ checksum_sha256 = (known after apply)
~ content_type = "binary/octet-stream" -> (known after apply)
~ etag = "cdc7cea800bbbfd5af27087abe30bb6f-6" -> "34e00d4ff69d6cf8edc59159f1a63e74"
~ id = "graphql.ec23298f57ffe85396f1fa0fbb0d7922.zip" -> (known after apply)
~ key = "graphql.ec23298f57ffe85396f1fa0fbb0d7922.zip" -> "graphql.34e00d4ff69d6cf8edc59159f1a63e74.zip" # forces replacement
+ kms_key_id = (known after apply)
- metadata = {} -> null
~ source_hash = "ec23298f57ffe85396f1fa0fbb0d7922" -> "34e00d4ff69d6cf8edc59159f1a63e74"
~ storage_class = "STANDARD" -> (known after apply)
- tags = {} -> null
~ version_id = "J4VOamDhVW574bxvbRR_IHC_A09E7ANo" -> (known after apply)
# (5 unchanged attributes hidden)
}
# aws_s3_object.origin_dist_artifact["200.html"] will be updated in-place
~ resource "aws_s3_object" "origin_dist_artifact" {
~ etag = "b88c3365f84d7075ba43d48b303be1f6" -> "a36c2b19a6a9c50e471fe53051800c5e"
id = "dist/200.html"
~ source_hash = "b88c3365f84d7075ba43d48b303be1f6" -> "a36c2b19a6a9c50e471fe53051800c5e"
tags = {}
~ version_id = "IZ3ufZjd6YFOMGxv1JzPEEmU7YDRNQlZ" -> (known after apply)
# (10 unchanged attributes hidden)
}
# aws_s3_object.origin_dist_artifact["build-manifest.json"] will be updated in-place
~ resource "aws_s3_object" "origin_dist_artifact" {
~ etag = "ef8a18bff41fd5b6c36c99a268563720" -> "6e8d9cb8cfd434dcd92775fe33ea0f33"
id = "dist/build-manifest.json"
~ source_hash = "ef8a18bff41fd5b6c36c99a268563720" -> "6e8d9cb8cfd434dcd92775fe33ea0f33"
tags = {}
~ version_id = "HI8aWpi_7nx71vpcqE7G_pPQBh2TZBMb" -> (known after apply)
# (10 unchanged attributes hidden)
}
# aws_s3_object.origin_dist_artifact["chunk-references.json"] will be updated in-place
~ resource "aws_s3_object" "origin_dist_artifact" {
~ etag = "b37688391482d4c9ca35da2d7fe41da5" -> "861bfdef0d3b879d10629be6fac234b5"
id = "dist/chunk-references.json"
~ source_hash = "b37688391482d4c9ca35da2d7fe41da5" -> "861bfdef0d3b879d10629be6fac234b5"
tags = {}
~ version_id = "0Us.2bLmORoua124N8MYvErBYX4DP4BW" -> (known after apply)
# (10 unchanged attributes hidden)
}
# aws_s3_object.origin_dist_artifact["index.html"] will be updated in-place
~ resource "aws_s3_object" "origin_dist_artifact" {
~ etag = "b88c3365f84d7075ba43d48b303be1f6" -> "a36c2b19a6a9c50e471fe53051800c5e"
id = "dist/index.html"
~ source_hash = "b88c3365f84d7075ba43d48b303be1f6" -> "a36c2b19a6a9c50e471fe53051800c5e"
tags = {}
~ version_id = "p4hrlxg7Hu6xA3A3cgTrq_BsPvekyU2q" -> (known after apply)
# (10 unchanged attributes hidden)
}
# aws_s3_object.origin_dist_artifact["static/js/358.abc86593.chunk.js"] will be destroyed
# (because key ["static/js/358.abc86593.chunk.js"] is not in for_each map)
- resource "aws_s3_object" "origin_dist_artifact" {
- bucket = "cpfreporter-origin-357150818708-us-west-2" -> null
- bucket_key_enabled = false -> null
- content_type = "text/javascript" -> null
- etag = "ff19f78459d9bd93a2b242483930720b" -> null
- force_destroy = false -> null
- id = "dist/static/js/358.abc86593.chunk.js" -> null
- key = "dist/static/js/358.abc86593.chunk.js" -> null
- metadata = {} -> null
- server_side_encryption = "AES256" -> null
- source = "/home/runner/work/cpf-reporter/cpf-reporter/web/dist/static/js/358.abc86593.chunk.js" -> null
- source_hash = "ff19f78459d9bd93a2b242483930720b" -> null
- storage_class = "STANDARD" -> null
- tags = {} -> null
- tags_all = {
- "env" = "staging"
- "management" = "terraform"
- "owner" = "grants"
- "repo" = "cpf-reporter"
- "service" = "cpf-reporter"
- "usage" = "workload"
} -> null
- version_id = "7uauVJW9JEV9SRSPF_wspzzK31A7PQ6v" -> null
}
# aws_s3_object.origin_dist_artifact["static/js/358.abc86593.chunk.js.LICENSE.txt"] will be destroyed
# (because key ["static/js/358.abc86593.chunk.js.LICENSE.txt"] is not in for_each map)
- resource "aws_s3_object" "origin_dist_artifact" {
- bucket = "cpfreporter-origin-357150818708-us-west-2" -> null
- bucket_key_enabled = false -> null
- content_type = "text/plain" -> null
- etag = "44c92a2e2086755c7f2972bde204ca02" -> null
- force_destroy = false -> null
- id = "dist/static/js/358.abc86593.chunk.js.LICENSE.txt" -> null
- key = "dist/static/js/358.abc86593.chunk.js.LICENSE.txt" -> null
- metadata = {} -> null
- server_side_encryption = "AES256" -> null
- source = "/home/runner/work/cpf-reporter/cpf-reporter/web/dist/static/js/358.abc86593.chunk.js.LICENSE.txt" -> null
- source_hash = "44c92a2e2086755c7f2972bde204ca02" -> null
- storage_class = "STANDARD" -> null
- tags = {} -> null
- tags_all = {
- "env" = "staging"
- "management" = "terraform"
- "owner" = "grants"
- "repo" = "cpf-reporter"
- "service" = "cpf-reporter"
- "usage" = "workload"
} -> null
- version_id = "wY2iMl.zZTadHx6RCUcydxrpknTAauCR" -> null
}
# aws_s3_object.origin_dist_artifact["static/js/477.2ba1adfc.chunk.js"] will be destroyed
# (because key ["static/js/477.2ba1adfc.chunk.js"] is not in for_each map)
- resource "aws_s3_object" "origin_dist_artifact" {
- bucket = "cpfreporter-origin-357150818708-us-west-2" -> null
- bucket_key_enabled = false -> null
- content_type = "text/javascript" -> null
- etag = "4c090ce9c84eb03a9ff85f2598e6d30f" -> null
- force_destroy = false -> null
- id = "dist/static/js/477.2ba1adfc.chunk.js" -> null
- key = "dist/static/js/477.2ba1adfc.chunk.js" -> null
- metadata = {} -> null
- server_side_encryption = "AES256" -> null
- source = "/home/runner/work/cpf-reporter/cpf-reporter/web/dist/static/js/477.2ba1adfc.chunk.js" -> null
- source_hash = "4c090ce9c84eb03a9ff85f2598e6d30f" -> null
- storage_class = "STANDARD" -> null
- tags = {} -> null
- tags_all = {
- "env" = "staging"
- "management" = "terraform"
- "owner" = "grants"
- "repo" = "cpf-reporter"
- "service" = "cpf-reporter"
- "usage" = "workload"
} -> null
- version_id = "9gaZRnZOpHQnodW1y1y6oWPgs1YISQpF" -> null
}
# aws_s3_object.origin_dist_artifact["static/js/477.2ba1adfc.chunk.js.LICENSE.txt"] will be destroyed
# (because key ["static/js/477.2ba1adfc.chunk.js.LICENSE.txt"] is not in for_each map)
- resource "aws_s3_object" "origin_dist_artifact" {
- bucket = "cpfreporter-origin-357150818708-us-west-2" -> null
- bucket_key_enabled = false -> null
- content_type = "text/plain" -> null
- etag = "2498881cb4526335bc5aa2f1fc16bb63" -> null
- force_destroy = false -> null
- id = "dist/static/js/477.2ba1adfc.chunk.js.LICENSE.txt" -> null
- key = "dist/static/js/477.2ba1adfc.chunk.js.LICENSE.txt" -> null
- metadata = {} -> null
- server_side_encryption = "AES256" -> null
- source = "/home/runner/work/cpf-reporter/cpf-reporter/web/dist/static/js/477.2ba1adfc.chunk.js.LICENSE.txt" -> null
- source_hash = "2498881cb4526335bc5aa2f1fc16bb63" -> null
- storage_class = "STANDARD" -> null
- tags = {} -> null
- tags_all = {
- "env" = "staging"
- "management" = "terraform"
- "owner" = "grants"
- "repo" = "cpf-reporter"
- "service" = "cpf-reporter"
- "usage" = "workload"
} -> null
- version_id = "0RZgb7KmktQC68DIs7OPLapV9pVxU_aW" -> null
}
# aws_s3_object.origin_dist_artifact["static/js/504.d1f9a630.chunk.js"] will be created
+ resource "aws_s3_object" "origin_dist_artifact" {
+ acl = (known after apply)
+ bucket = "cpfreporter-origin-357150818708-us-west-2"
+ bucket_key_enabled = (known after apply)
+ checksum_crc32 = (known after apply)
+ checksum_crc32c = (known after apply)
+ checksum_sha1 = (known after apply)
+ checksum_sha256 = (known after apply)
+ content_type = "text/javascript"
+ etag = "cb5744ee815de61b61ef4e31bd49a77a"
+ force_destroy = false
+ id = (known after apply)
+ key = "dist/static/js/504.d1f9a630.chunk.js"
+ kms_key_id = (known after apply)
+ server_side_encryption = "AES256"
+ source = "/home/runner/work/cpf-reporter/cpf-reporter/web/dist/static/js/504.d1f9a630.chunk.js"
+ source_hash = "cb5744ee815de61b61ef4e31bd49a77a"
+ storage_class = (known after apply)
+ tags_all = {
+ "env" = "staging"
+ "management" = "terraform"
+ "owner" = "grants"
+ "repo" = "cpf-reporter"
+ "service" = "cpf-reporter"
+ "usage" = "workload"
}
+ version_id = (known after apply)
}
# aws_s3_object.origin_dist_artifact["static/js/504.d1f9a630.chunk.js.LICENSE.txt"] will be created
+ resource "aws_s3_object" "origin_dist_artifact" {
+ acl = (known after apply)
+ bucket = "cpfreporter-origin-357150818708-us-west-2"
+ bucket_key_enabled = (known after apply)
+ checksum_crc32 = (known after apply)
+ checksum_crc32c = (known after apply)
+ checksum_sha1 = (known after apply)
+ checksum_sha256 = (known after apply)
+ content_type = "text/plain"
+ etag = "db6b18301fc763e7ad4cf43d579a2390"
+ force_destroy = false
+ id = (known after apply)
+ key = "dist/static/js/504.d1f9a630.chunk.js.LICENSE.txt"
+ kms_key_id = (known after apply)
+ server_side_encryption = "AES256"
+ source = "/home/runner/work/cpf-reporter/cpf-reporter/web/dist/static/js/504.d1f9a630.chunk.js.LICENSE.txt"
+ source_hash = "db6b18301fc763e7ad4cf43d579a2390"
+ storage_class = (known after apply)
+ tags_all = {
+ "env" = "staging"
+ "management" = "terraform"
+ "owner" = "grants"
+ "repo" = "cpf-reporter"
+ "service" = "cpf-reporter"
+ "usage" = "workload"
}
+ version_id = (known after apply)
}
# aws_s3_object.origin_dist_artifact["static/js/57.bc58867e.chunk.js"] will be created
+ resource "aws_s3_object" "origin_dist_artifact" {
+ acl = (known after apply)
+ bucket = "cpfreporter-origin-357150818708-us-west-2"
+ bucket_key_enabled = (known after apply)
+ checksum_crc32 = (known after apply)
+ checksum_crc32c = (known after apply)
+ checksum_sha1 = (known after apply)
+ checksum_sha256 = (known after apply)
+ content_type = "text/javascript"
+ etag = "d920bd51c27cdaa42482d2196bcf620c"
+ force_destroy = false
+ id = (known after apply)
+ key = "dist/static/js/57.bc58867e.chunk.js"
+ kms_key_id = (known after apply)
+ server_side_encryption = "AES256"
+ source = "/home/runner/work/cpf-reporter/cpf-reporter/web/dist/static/js/57.bc58867e.chunk.js"
+ source_hash = "d920bd51c27cdaa42482d2196bcf620c"
+ storage_class = (known after apply)
+ tags_all = {
+ "env" = "staging"
+ "management" = "terraform"
+ "owner" = "grants"
+ "repo" = "cpf-reporter"
+ "service" = "cpf-reporter"
+ "usage" = "workload"
}
+ version_id = (known after apply)
}
# aws_s3_object.origin_dist_artifact["static/js/57.bc58867e.chunk.js.LICENSE.txt"] will be created
+ resource "aws_s3_object" "origin_dist_artifact" {
+ acl = (known after apply)
+ bucket = "cpfreporter-origin-357150818708-us-west-2"
+ bucket_key_enabled = (known after apply)
+ checksum_crc32 = (known after apply)
+ checksum_crc32c = (known after apply)
+ checksum_sha1 = (known after apply)
+ checksum_sha256 = (known after apply)
+ content_type = "text/plain"
+ etag = "406ecf0d41f22ef13cd249dc3bd0e9cd"
+ force_destroy = false
+ id = (known after apply)
+ key = "dist/static/js/57.bc58867e.chunk.js.LICENSE.txt"
+ kms_key_id = (known after apply)
+ server_side_encryption = "AES256"
+ source = "/home/runner/work/cpf-reporter/cpf-reporter/web/dist/static/js/57.bc58867e.chunk.js.LICENSE.txt"
+ source_hash = "406ecf0d41f22ef13cd249dc3bd0e9cd"
+ storage_class = (known after apply)
+ tags_all = {
+ "env" = "staging"
+ "management" = "terraform"
+ "owner" = "grants"
+ "repo" = "cpf-reporter"
+ "service" = "cpf-reporter"
+ "usage" = "workload"
}
+ version_id = (known after apply)
}
# aws_s3_object.origin_dist_artifact["static/js/766.425b18b0.chunk.js"] will be created
+ resource "aws_s3_object" "origin_dist_artifact" {
+ acl = (known after apply)
+ bucket = "cpfreporter-origin-357150818708-us-west-2"
+ bucket_key_enabled = (known after apply)
+ checksum_crc32 = (known after apply)
+ checksum_crc32c = (known after apply)
+ checksum_sha1 = (known after apply)
+ checksum_sha256 = (known after apply)
+ content_type = "text/javascript"
+ etag = "fbd0fd5f8254ec9637adfebd084ffbac"
+ force_destroy = false
+ id = (known after apply)
+ key = "dist/static/js/766.425b18b0.chunk.js"
+ kms_key_id = (known after apply)
+ server_side_encryption = "AES256"
+ source = "/home/runner/work/cpf-reporter/cpf-reporter/web/dist/static/js/766.425b18b0.chunk.js"
+ source_hash = "fbd0fd5f8254ec9637adfebd084ffbac"
+ storage_class = (known after apply)
+ tags_all = {
+ "env" = "staging"
+ "management" = "terraform"
+ "owner" = "grants"
+ "repo" = "cpf-reporter"
+ "service" = "cpf-reporter"
+ "usage" = "workload"
}
+ version_id = (known after apply)
}
# aws_s3_object.origin_dist_artifact["static/js/766.425b18b0.chunk.js.LICENSE.txt"] will be created
+ resource "aws_s3_object" "origin_dist_artifact" {
+ acl = (known after apply)
+ bucket = "cpfreporter-origin-357150818708-us-west-2"
+ bucket_key_enabled = (known after apply)
+ checksum_crc32 = (known after apply)
+ checksum_crc32c = (known after apply)
+ checksum_sha1 = (known after apply)
+ checksum_sha256 = (known after apply)
+ content_type = "text/plain"
+ etag = "db6b18301fc763e7ad4cf43d579a2390"
+ force_destroy = false
+ id = (known after apply)
+ key = "dist/static/js/766.425b18b0.chunk.js.LICENSE.txt"
+ kms_key_id = (known after apply)
+ server_side_encryption = "AES256"
+ source = "/home/runner/work/cpf-reporter/cpf-reporter/web/dist/static/js/766.425b18b0.chunk.js.LICENSE.txt"
+ source_hash = "db6b18301fc763e7ad4cf43d579a2390"
+ storage_class = (known after apply)
+ tags_all = {
+ "env" = "staging"
+ "management" = "terraform"
+ "owner" = "grants"
+ "repo" = "cpf-reporter"
+ "service" = "cpf-reporter"
+ "usage" = "workload"
}
+ version_id = (known after apply)
}
# aws_s3_object.origin_dist_artifact["static/js/857.f1bf4106.chunk.js"] will be created
+ resource "aws_s3_object" "origin_dist_artifact" {
+ acl = (known after apply)
+ bucket = "cpfreporter-origin-357150818708-us-west-2"
+ bucket_key_enabled = (known after apply)
+ checksum_crc32 = (known after apply)
+ checksum_crc32c = (known after apply)
+ checksum_sha1 = (known after apply)
+ checksum_sha256 = (known after apply)
+ content_type = "text/javascript"
+ etag = "6f19cd804c80eef19fae558b4b613d66"
+ force_destroy = false
+ id = (known after apply)
+ key = "dist/static/js/857.f1bf4106.chunk.js"
+ kms_key_id = (known after apply)
+ server_side_encryption = "AES256"
+ source = "/home/runner/work/cpf-reporter/cpf-reporter/web/dist/static/js/857.f1bf4106.chunk.js"
+ source_hash = "6f19cd804c80eef19fae558b4b613d66"
+ storage_class = (known after apply)
+ tags_all = {
+ "env" = "staging"
+ "management" = "terraform"
+ "owner" = "grants"
+ "repo" = "cpf-reporter"
+ "service" = "cpf-reporter"
+ "usage" = "workload"
}
+ version_id = (known after apply)
}
# aws_s3_object.origin_dist_artifact["static/js/857.f1bf4106.chunk.js.LICENSE.txt"] will be created
+ resource "aws_s3_object" "origin_dist_artifact" {
+ acl = (known after apply)
+ bucket = "cpfreporter-origin-357150818708-us-west-2"
+ bucket_key_enabled = (known after apply)
+ checksum_crc32 = (known after apply)
+ checksum_crc32c = (known after apply)
+ checksum_sha1 = (known after apply)
+ checksum_sha256 = (known after apply)
+ content_type = "text/plain"
+ etag = "d825a6f2004b3fd31ff641844be018f4"
+ force_destroy = false
+ id = (known after apply)
+ key = "dist/static/js/857.f1bf4106.chunk.js.LICENSE.txt"
+ kms_key_id = (known after apply)
+ server_side_encryption = "AES256"
+ source = "/home/runner/work/cpf-reporter/cpf-reporter/web/dist/static/js/857.f1bf4106.chunk.js.LICENSE.txt"
+ source_hash = "d825a6f2004b3fd31ff641844be018f4"
+ storage_class = (known after apply)
+ tags_all = {
+ "env" = "staging"
+ "management" = "terraform"
+ "owner" = "grants"
+ "repo" = "cpf-reporter"
+ "service" = "cpf-reporter"
+ "usage" = "workload"
}
+ version_id = (known after apply)
}
# aws_s3_object.origin_dist_artifact["static/js/917.07d83fe6.chunk.js"] will be created
+ resource "aws_s3_object" "origin_dist_artifact" {
+ acl = (known after apply)
+ bucket = "cpfreporter-origin-357150818708-us-west-2"
+ bucket_key_enabled = (known after apply)
+ checksum_crc32 = (known after apply)
+ checksum_crc32c = (known after apply)
+ checksum_sha1 = (known after apply)
+ checksum_sha256 = (known after apply)
+ content_type = "text/javascript"
+ etag = "e53ad483f990b20652794ad6053094f2"
+ force_destroy = false
+ id = (known after apply)
+ key = "dist/static/js/917.07d83fe6.chunk.js"
+ kms_key_id = (known after apply)
+ server_side_encryption = "AES256"
+ source = "/home/runner/work/cpf-reporter/cpf-reporter/web/dist/static/js/917.07d83fe6.chunk.js"
+ source_hash = "e53ad483f990b20652794ad6053094f2"
+ storage_class = (known after apply)
+ tags_all = {
+ "env" = "staging"
+ "management" = "terraform"
+ "owner" = "grants"
+ "repo" = "cpf-reporter"
+ "service" = "cpf-reporter"
+ "usage" = "workload"
}
+ version_id = (known after apply)
}
# aws_s3_object.origin_dist_artifact["static/js/917.07d83fe6.chunk.js.LICENSE.txt"] will be created
+ resource "aws_s3_object" "origin_dist_artifact" {
+ acl = (known after apply)
+ bucket = "cpfreporter-origin-357150818708-us-west-2"
+ bucket_key_enabled = (known after apply)
+ checksum_crc32 = (known after apply)
+ checksum_crc32c = (known after apply)
+ checksum_sha1 = (known after apply)
+ checksum_sha256 = (known after apply)
+ content_type = "text/plain"
+ etag = "f8dc5b59d9eb01e0996ba3b4ae93ebb9"
+ force_destroy = false
+ id = (known after apply)
+ key = "dist/static/js/917.07d83fe6.chunk.js.LICENSE.txt"
+ kms_key_id = (known after apply)
+ server_side_encryption = "AES256"
+ source = "/home/runner/work/cpf-reporter/cpf-reporter/web/dist/static/js/917.07d83fe6.chunk.js.LICENSE.txt"
+ source_hash = "f8dc5b59d9eb01e0996ba3b4ae93ebb9"
+ storage_class = (known after apply)
+ tags_all = {
+ "env" = "staging"
+ "management" = "terraform"
+ "owner" = "grants"
+ "repo" = "cpf-reporter"
+ "service" = "cpf-reporter"
+ "usage" = "workload"
}
+ version_id = (known after apply)
}
# aws_s3_object.origin_dist_artifact["static/js/ReportingPeriodsPage.ae13997f.chunk.js"] will be created
+ resource "aws_s3_object" "origin_dist_artifact" {
+ acl = (known after apply)
+ bucket = "cpfreporter-origin-357150818708-us-west-2"
+ bucket_key_enabled = (known after apply)
+ checksum_crc32 = (known after apply)
+ checksum_crc32c = (known after apply)
+ checksum_sha1 = (known after apply)
+ checksum_sha256 = (known after apply)
+ content_type = "text/javascript"
+ etag = "88ba71a941700c3f88fa4891cd53ac6c"
+ force_destroy = false
+ id = (known after apply)
+ key = "dist/static/js/ReportingPeriodsPage.ae13997f.chunk.js"
+ kms_key_id = (known after apply)
+ server_side_encryption = "AES256"
+ source = "/home/runner/work/cpf-reporter/cpf-reporter/web/dist/static/js/ReportingPeriodsPage.ae13997f.chunk.js"
+ source_hash = "88ba71a941700c3f88fa4891cd53ac6c"
+ storage_class = (known after apply)
+ tags_all = {
+ "env" = "staging"
+ "management" = "terraform"
+ "owner" = "grants"
+ "repo" = "cpf-reporter"
+ "service" = "cpf-reporter"
+ "usage" = "workload"
}
+ version_id = (known after apply)
}
# aws_s3_object.origin_dist_artifact["static/js/ReportingPeriodsPage.ae13997f.chunk.js.LICENSE.txt"] will be created
+ resource "aws_s3_object" "origin_dist_artifact" {
+ acl = (known after apply)
+ bucket = "cpfreporter-origin-357150818708-us-west-2"
+ bucket_key_enabled = (known after apply)
+ checksum_crc32 = (known after apply)
+ checksum_crc32c = (known after apply)
+ checksum_sha1 = (known after apply)
+ checksum_sha256 = (known after apply)
+ content_type = "text/plain"
+ etag = "f5f55de2a92d07d053bb65b442fc8140"
+ force_destroy = false
+ id = (known after apply)
+ key = "dist/static/js/ReportingPeriodsPage.ae13997f.chunk.js.LICENSE.txt"
+ kms_key_id = (known after apply)
+ server_side_encryption = "AES256"
+ source = "/home/runner/work/cpf-reporter/cpf-reporter/web/dist/static/js/ReportingPeriodsPage.ae13997f.chunk.js.LICENSE.txt"
+ source_hash = "f5f55de2a92d07d053bb65b442fc8140"
+ storage_class = (known after apply)
+ tags_all = {
+ "env" = "staging"
+ "management" = "terraform"
+ "owner" = "grants"
+ "repo" = "cpf-reporter"
+ "service" = "cpf-reporter"
+ "usage" = "workload"
}
+ version_id = (known after apply)
}
# aws_s3_object.origin_dist_artifact["static/js/UploadTemplatePage.f0023861.chunk.js"] will be created
+ resource "aws_s3_object" "origin_dist_artifact" {
+ acl = (known after apply)
+ bucket = "cpfreporter-origin-357150818708-us-west-2"
+ bucket_key_enabled = (known after apply)
+ checksum_crc32 = (known after apply)
+ checksum_crc32c = (known after apply)
+ checksum_sha1 = (known after apply)
+ checksum_sha256 = (known after apply)
+ content_type = "text/javascript"
+ etag = "58c1e3c745b082d57d71d09dd8f89640"
+ force_destroy = false
+ id = (known after apply)
+ key = "dist/static/js/UploadTemplatePage.f0023861.chunk.js"
+ kms_key_id = (known after apply)
+ server_side_encryption = "AES256"
+ source = "/home/runner/work/cpf-reporter/cpf-reporter/web/dist/static/js/UploadTemplatePage.f0023861.chunk.js"
+ source_hash = "58c1e3c745b082d57d71d09dd8f89640"
+ storage_class = (known after apply)
+ tags_all = {
+ "env" = "staging"
+ "management" = "terraform"
+ "owner" = "grants"
+ "repo" = "cpf-reporter"
+ "service" = "cpf-reporter"
+ "usage" = "workload"
}
+ version_id = (known after apply)
}
# aws_s3_object.origin_dist_artifact["static/js/UploadTemplatePage.f0023861.chunk.js.LICENSE.txt"] will be created
+ resource "aws_s3_object" "origin_dist_artifact" {
+ acl = (known after apply)
+ bucket = "cpfreporter-origin-357150818708-us-west-2"
+ bucket_key_enabled = (known after apply)
+ checksum_crc32 = (known after apply)
+ checksum_crc32c = (known after apply)
+ checksum_sha1 = (known after apply)
+ checksum_sha256 = (known after apply)
+ content_type = "text/plain"
+ etag = "9af098a0eeaad13a23ce12d7172813ee"
+ force_destroy = false
+ id = (known after apply)
+ key = "dist/static/js/UploadTemplatePage.f0023861.chunk.js.LICENSE.txt"
+ kms_key_id = (known after apply)
+ server_side_encryption = "AES256"
+ source = "/home/runner/work/cpf-reporter/cpf-reporter/web/dist/static/js/UploadTemplatePage.f0023861.chunk.js.LICENSE.txt"
+ source_hash = "9af098a0eeaad13a23ce12d7172813ee"
+ storage_class = (known after apply)
+ tags_all = {
+ "env" = "staging"
+ "management" = "terraform"
+ "owner" = "grants"
+ "repo" = "cpf-reporter"
+ "service" = "cpf-reporter"
+ "usage" = "workload"
}
+ version_id = (known after apply)
}
# aws_s3_object.origin_dist_artifact["static/js/app.20ac78cc.js"] will be destroyed
# (because key ["static/js/app.20ac78cc.js"] is not in for_each map)
- resource "aws_s3_object" "origin_dist_artifact" {
- bucket = "cpfreporter-origin-357150818708-us-west-2" -> null
- bucket_key_enabled = false -> null
- content_type = "text/javascript" -> null
- etag = "9b032a75ee1b63654d67bfe941118ad1" -> null
- force_destroy = false -> null
- id = "dist/static/js/app.20ac78cc.js" -> null
- key = "dist/static/js/app.20ac78cc.js" -> null
- metadata = {} -> null
- server_side_encryption = "AES256" -> null
- source = "/home/runner/work/cpf-reporter/cpf-reporter/web/dist/static/js/app.20ac78cc.js" -> null
- source_hash = "9b032a75ee1b63654d67bfe941118ad1" -> null
- storage_class = "STANDARD" -> null
- tags = {} -> null
- tags_all = {
- "env" = "staging"
- "management" = "terraform"
- "owner" = "grants"
- "repo" = "cpf-reporter"
- "service" = "cpf-reporter"
- "usage" = "workload"
} -> null
- version_id = "cDuPZ5FC8ZiTMsEvXlKN5ca6BAN5gz96" -> null
}
# aws_s3_object.origin_dist_artifact["static/js/app.20ac78cc.js.LICENSE.txt"] will be destroyed
# (because key ["static/js/app.20ac78cc.js.LICENSE.txt"] is not in for_each map)
- resource "aws_s3_object" "origin_dist_artifact" {
- bucket = "cpfreporter-origin-357150818708-us-west-2" -> null
- bucket_key_enabled = false -> null
- content_type = "text/plain" -> null
- etag = "32ee71aff25006c81492755925194994" -> null
- force_destroy = false -> null
- id = "dist/static/js/app.20ac78cc.js.LICENSE.txt" -> null
- key = "dist/static/js/app.20ac78cc.js.LICENSE.txt" -> null
- metadata = {} -> null
- server_side_encryption = "AES256" -> null
- source = "/home/runner/work/cpf-reporter/cpf-reporter/web/dist/static/js/app.20ac78cc.js.LICENSE.txt" -> null
- source_hash = "32ee71aff25006c81492755925194994" -> null
- storage_class = "STANDARD" -> null
- tags = {} -> null
- tags_all = {
- "env" = "staging"
- "management" = "terraform"
- "owner" = "grants"
- "repo" = "cpf-reporter"
- "service" = "cpf-reporter"
- "usage" = "workload"
} -> null
- version_id = "ncU047_XgYm6Vzp9MCcTSCAyIv9pZzqC" -> null
}
# aws_s3_object.origin_dist_artifact["static/js/app.54f5b5f7.js"] will be created
+ resource "aws_s3_object" "origin_dist_artifact" {
+ acl = (known after apply)
+ bucket = "cpfreporter-origin-357150818708-us-west-2"
+ bucket_key_enabled = (known after apply)
+ checksum_crc32 = (known after apply)
+ checksum_crc32c = (known after apply)
+ checksum_sha1 = (known after apply)
+ checksum_sha256 = (known after apply)
+ content_type = "text/javascript"
+ etag = "ffa6b9edfc6666d2e66907cb9c062095"
+ force_destroy = false
+ id = (known after apply)
+ key = "dist/static/js/app.54f5b5f7.js"
+ kms_key_id = (known after apply)
+ server_side_encryption = "AES256"
+ source = "/home/runner/work/cpf-reporter/cpf-reporter/web/dist/static/js/app.54f5b5f7.js"
+ source_hash = "ffa6b9edfc6666d2e66907cb9c062095"
+ storage_class = (known after apply)
+ tags_all = {
+ "env" = "staging"
+ "management" = "terraform"
+ "owner" = "grants"
+ "repo" = "cpf-reporter"
+ "service" = "cpf-reporter"
+ "usage" = "workload"
}
+ version_id = (known after apply)
}
# aws_s3_object.origin_dist_artifact["static/js/app.54f5b5f7.js.LICENSE.txt"] will be created
+ resource "aws_s3_object" "origin_dist_artifact" {
+ acl = (known after apply)
+ bucket = "cpfreporter-origin-357150818708-us-west-2"
+ bucket_key_enabled = (known after apply)
+ checksum_crc32 = (known after apply)
+ checksum_crc32c = (known after apply)
+ checksum_sha1 = (known after apply)
+ checksum_sha256 = (known after apply)
+ content_type = "text/plain"
+ etag = "8d0c60a3ca38489c1bb3fd646469d4db"
+ force_destroy = false
+ id = (known after apply)
+ key = "dist/static/js/app.54f5b5f7.js.LICENSE.txt"
+ kms_key_id = (known after apply)
+ server_side_encryption = "AES256"
+ source = "/home/runner/work/cpf-reporter/cpf-reporter/web/dist/static/js/app.54f5b5f7.js.LICENSE.txt"
+ source_hash = "8d0c60a3ca38489c1bb3fd646469d4db"
+ storage_class = (known after apply)
+ tags_all = {
+ "env" = "staging"
+ "management" = "terraform"
+ "owner" = "grants"
+ "repo" = "cpf-reporter"
+ "service" = "cpf-reporter"
+ "usage" = "workload"
}
+ version_id = (known after apply)
}
# aws_s3_object.origin_dist_artifact["static/js/runtime-app.29fe59d2.js"] will be destroyed
# (because key ["static/js/runtime-app.29fe59d2.js"] is not in for_each map)
- resource "aws_s3_object" "origin_dist_artifact" {
- bucket = "cpfreporter-origin-357150818708-us-west-2" -> null
- bucket_key_enabled = false -> null
- content_type = "text/javascript" -> null
- etag = "66ac9cb1d76edbf486166c876fbbc171" -> null
- force_destroy = false -> null
- id = "dist/static/js/runtime-app.29fe59d2.js" -> null
- key = "dist/static/js/runtime-app.29fe59d2.js" -> null
- metadata = {} -> null
- server_side_encryption = "AES256" -> null
- source = "/home/runner/work/cpf-reporter/cpf-reporter/web/dist/static/js/runtime-app.29fe59d2.js" -> null
- source_hash = "66ac9cb1d76edbf486166c876fbbc171" -> null
- storage_class = "STANDARD" -> null
- tags = {} -> null
- tags_all = {
- "env" = "staging"
- "management" = "terraform"
- "owner" = "grants"
- "repo" = "cpf-reporter"
- "service" = "cpf-reporter"
- "usage" = "workload"
} -> null
- version_id = "Yoc7cj4W93gUGZJXcYU7s5FLTPxSonNO" -> null
}
# aws_s3_object.origin_dist_artifact["static/js/runtime-app.743f4d7b.js"] will be created
+ resource "aws_s3_object" "origin_dist_artifact" {
+ acl = (known after apply)
+ bucket = "cpfreporter-origin-357150818708-us-west-2"
+ bucket_key_enabled = (known after apply)
+ checksum_crc32 = (known after apply)
+ checksum_crc32c = (known after apply)
+ checksum_sha1 = (known after apply)
+ checksum_sha256 = (known after apply)
+ content_type = "text/javascript"
+ etag = "a9854d4259de2e57a35ef4354f57c30c"
+ force_destroy = false
+ id = (known after apply)
+ key = "dist/static/js/runtime-app.743f4d7b.js"
+ kms_key_id = (known after apply)
+ server_side_encryption = "AES256"
+ source = "/home/runner/work/cpf-reporter/cpf-reporter/web/dist/static/js/runtime-app.743f4d7b.js"
+ source_hash = "a9854d4259de2e57a35ef4354f57c30c"
+ storage_class = (known after apply)
+ tags_all = {
+ "env" = "staging"
+ "management" = "terraform"
+ "owner" = "grants"
+ "repo" = "cpf-reporter"
+ "service" = "cpf-reporter"
+ "usage" = "workload"
}
+ version_id = (known after apply)
}
# module.lambda_function-graphql.aws_lambda_function.this[0] will be updated in-place
~ resource "aws_lambda_function" "this" {
id = "cpfreporter-graphql"
~ last_modified = "2023-12-08T09:58:46.000+0000" -> (known after apply)
~ qualified_arn = "arn:aws:lambda:us-west-2:357150818708:function:cpfreporter-graphql:22" -> (known after apply)
~ qualified_invoke_arn = "arn:aws:apigateway:us-west-2:lambda:path/2015-03-31/functions/arn:aws:lambda:us-west-2:357150818708:function:cpfreporter-graphql:22/invocations" -> (known after apply)
~ s3_key = "graphql.ec23298f57ffe85396f1fa0fbb0d7922.zip" -> "graphql.34e00d4ff69d6cf8edc59159f1a63e74.zip"
tags = {}
~ version = "22" -> (known after apply)
# (19 unchanged attributes hidden)
~ environment {
~ variables = {
~ "DD_COMMIT_SHA" = "6b480e15c7234af6a63c1e0d249b087204de892d" -> "eb0f89523c604a855c47253abbc94d764372d3e1"
~ "DD_TAGS" = "git.commit.sha:6b480e15c7234af6a63c1e0d249b087204de892d,git.repository_url:github.com/usdigitalresponse/cpf-reporter" -> "git.commit.sha:eb0f89523c604a855c47253abbc94d764372d3e1,git.repository_url:github.com/usdigitalresponse/cpf-reporter"
~ "DD_VERSION" = "6b480e15c7234af6a63c1e0d249b087204de892d" -> "eb0f89523c604a855c47253abbc94d764372d3e1"
# (15 unchanged elements hidden)
}
}
# (4 unchanged blocks hidden)
}
# module.lambda_function-graphql.aws_lambda_permission.current_version_triggers["APIGateway"] must be replaced
-/+ resource "aws_lambda_permission" "current_version_triggers" {
~ id = "APIGateway" -> (known after apply)
~ qualifier = "22" # forces replacement -> (known after apply) # forces replacement
+ statement_id_prefix = (known after apply)
# (5 unchanged attributes hidden)
}
Plan: 20 to add, 6 to change, 10 to destroy. Pusher: @TylerHendrickson, Action: |
QA Summary
Test CoverageCoverage report for
|
St | File | % Stmts | % Branch | % Funcs | % Lines | Uncovered Line #s |
---|---|---|---|---|---|---|
🟡 | All files | 70.42 | 33.33 | 70.17 | 70.42 | |
🟢 | directives/requireAuth | 100 | 100 | 100 | 100 | |
🟢 | requireAuth.ts | 100 | 100 | 100 | 100 | |
🟡 | directives/skipAuth | 50 | 100 | 0 | 50 | |
🟡 | skipAuth.ts | 50 | 100 | 0 | 50 | 13 |
🔴 | functions | 0 | 100 | 0 | 0 | |
🔴 | graphql.ts | 0 | 100 | 0 | 0 | 13-20 |
🔴 | graphql | 0 | 100 | 100 | 0 | |
🔴 | agencies.sdl.ts | 0 | 100 | 100 | 0 | 1 |
🔴 | inputTemplates.sdl.ts | 0 | 100 | 100 | 0 | 1 |
🔴 | organizations.sdl.ts | 0 | 100 | 100 | 0 | 1 |
🔴 | outputTemplates.sdl.ts | 0 | 100 | 100 | 0 | 1 |
🔴 | reportingPeriods.sdl.ts | 0 | 100 | 100 | 0 | 1 |
🔴 | roles.sdl.ts | 0 | 100 | 100 | 0 | 1 |
🔴 | users.sdl.ts | 0 | 100 | 100 | 0 | 1 |
🔴 | lib | 40.74 | 50 | 57.14 | 40.74 | |
🟢 | auth.ts | 83.33 | 100 | 66.66 | 83.33 | 15 |
🔴 | db.ts | 31.25 | 50 | 50 | 31.25 | 15-35,45,47 |
🟢 | logger.ts | 100 | 100 | 100 | 100 | |
🔴 | tracer.ts | 0 | 100 | 100 | 0 | 5-14 |
🟡 | services/agencies | 70.58 | 0 | 83.33 | 70.58 | |
🟢 | agencies.scenarios.ts | 100 | 100 | 100 | 100 | |
🟡 | agencies.ts | 68.75 | 0 | 83.33 | 68.75 | 40-48 |
🟢 | services/inputTemplates | 92.3 | 100 | 83.33 | 92.3 | |
🟢 | inputTemplates.scenarios.ts | 100 | 100 | 100 | 100 | |
🟢 | inputTemplates.ts | 91.66 | 100 | 83.33 | 91.66 | 47 |
🟢 | services/organizations | 92.3 | 100 | 83.33 | 92.3 | |
🟢 | organizations.scenarios.ts | 100 | 100 | 100 | 100 | |
🟢 | organizations.ts | 91.66 | 100 | 83.33 | 91.66 | 47 |
🟢 | services/outputTemplates | 92.3 | 100 | 83.33 | 92.3 | |
🟢 | outputTemplates.scenarios.ts | 100 | 100 | 100 | 100 | |
🟢 | outputTemplates.ts | 91.66 | 100 | 83.33 | 91.66 | 43 |
🟡 | services/reportingPeriods | 80 | 100 | 62.5 | 80 | |
🟢 | reportingPeriods.scenarios.ts | 100 | 100 | 100 | 100 | |
🟡 | reportingPeriods.ts | 78.57 | 100 | 62.5 | 78.57 | 43-53 |
🟢 | services/roles | 92.3 | 100 | 83.33 | 92.3 | |
🟢 | roles.scenarios.ts | 100 | 100 | 100 | 100 | |
🟢 | roles.ts | 91.66 | 100 | 83.33 | 91.66 | 40 |
🟡 | services/users | 75 | 100 | 55.55 | 75 | |
🟢 | users.scenarios.ts | 100 | 100 | 100 | 100 | |
🟡 | users.ts | 73.33 | 100 | 55.55 | 73.33 | 40-49 |
Coverage report for web
suite
St | File | % Stmts | % Branch | % Funcs | % Lines | Uncovered Line #s |
---|---|---|---|---|---|---|
🔴 | All files | 23.84 | 25 | 21.42 | 22.32 | |
🔴 | src | 15.38 | 0 | 50 | 15.38 | |
🔴 | App.tsx | 0 | 0 | 0 | 0 | 3-32 |
🟢 | Routes.tsx | 100 | 100 | 100 | 100 | |
🔴 | entry.client.tsx | 0 | 0 | 100 | 0 | 10-22 |
🔴 | src/components/Agency/Agencies | 0 | 100 | 0 | 0 | |
🔴 | Agencies.tsx | 0 | 100 | 0 | 0 | 9-21 |
🔴 | src/components/Agency/AgenciesCell | 0 | 100 | 0 | 0 | |
🔴 | AgenciesCell.tsx | 0 | 100 | 0 | 0 | 8-39 |
🔴 | src/components/Agency/Agency | 0 | 0 | 0 | 0 | |
🔴 | Agency.tsx | 0 | 0 | 0 | 0 | 10-78 |
🔴 | src/components/Agency/AgencyCell | 0 | 100 | 0 | 0 | |
🔴 | AgencyCell.tsx | 0 | 100 | 0 | 0 | 7-27 |
🔴 | src/components/Agency/AgencyForm | 0 | 0 | 0 | 0 | |
🔴 | AgencyForm.tsx | 0 | 0 | 0 | 0 | 24-39 |
🔴 | src/components/Agency/EditAgencyCell | 0 | 100 | 0 | 0 | |
🔴 | EditAgencyCell.tsx | 0 | 100 | 0 | 0 | 10-58 |
🔴 | src/components/Agency/NewAgency | 0 | 100 | 0 | 0 | |
🔴 | NewAgency.tsx | 0 | 100 | 0 | 0 | 9-35 |
🔴 | src/components/Organization/EditOrganizationCell | 0 | 100 | 0 | 0 | |
🔴 | EditOrganizationCell.tsx | 0 | 100 | 0 | 0 | 13-62 |
🔴 | src/components/Organization/NewOrganization | 0 | 100 | 0 | 0 | |
🔴 | NewOrganization.tsx | 0 | 100 | 0 | 0 | 9-35 |
🔴 | src/components/Organization/Organization | 0 | 0 | 0 | 0 | |
🔴 | Organization.tsx | 0 | 0 | 0 | 0 | 10-70 |
🔴 | src/components/Organization/OrganizationCell | 0 | 100 | 0 | 0 | |
🔴 | OrganizationCell.tsx | 0 | 100 | 0 | 0 | 7-27 |
🔴 | src/components/Organization/OrganizationForm | 0 | 0 | 0 | 0 | |
🔴 | OrganizationForm.tsx | 0 | 0 | 0 | 0 | 27-41 |
🔴 | src/components/Organization/Organizations | 0 | 100 | 0 | 0 | |
🔴 | Organizations.tsx | 0 | 100 | 0 | 0 | 9-21 |
🔴 | src/components/Organization/OrganizationsCell | 0 | 100 | 0 | 0 | |
🔴 | OrganizationsCell.tsx | 0 | 100 | 0 | 0 | 8-37 |
🟡 | src/components/ReportingPeriodCell | 55 | 0 | 55.55 | 47.05 | |
🟢 | ReportingPeriodCell.mock.ts | 100 | 100 | 100 | 100 | |
🔴 | ReportingPeriodCell.stories.tsx | 0 | 0 | 0 | 0 | 6-32 |
🟢 | ReportingPeriodCell.tsx | 100 | 100 | 100 | 100 | |
🟡 | src/components/ReportingPeriodsCell | 57.14 | 28.57 | 60 | 50 | |
🟢 | ReportingPeriodsCell.mock.ts | 100 | 100 | 100 | 100 | |
🔴 | ReportingPeriodsCell.stories.tsx | 0 | 0 | 0 | 0 | 6-32 |
🟢 | ReportingPeriodsCell.tsx | 100 | 66.66 | 100 | 100 | 63-66 |
🟡 | src/layouts/ScaffoldLayout | 50 | 100 | 0 | 50 | |
🟡 | ScaffoldLayout.tsx | 50 | 100 | 0 | 50 | 10 |
🟢 | src/lib | 100 | 100 | 100 | 100 | |
🟢 | formatters.tsx | 100 | 100 | 100 | 100 | |
🔴 | src/pages/Agency/AgenciesPage | 0 | 100 | 0 | 0 | |
🔴 | AgenciesPage.tsx | 0 | 100 | 0 | 0 | 7-11 |
🔴 | src/pages/Agency/AgencyPage | 0 | 100 | 0 | 0 | |
🔴 | AgencyPage.tsx | 0 | 100 | 0 | 0 | 7-8 |
🔴 | src/pages/Agency/EditAgencyPage | 0 | 100 | 0 | 0 | |
🔴 | EditAgencyPage.tsx | 0 | 100 | 0 | 0 | 7-8 |
🔴 | src/pages/Agency/NewAgencyPage | 0 | 100 | 0 | 0 | |
🔴 | NewAgencyPage.tsx | 0 | 100 | 0 | 0 | 3-4 |
🔴 | src/pages/FatalErrorPage | 0 | 0 | 0 | 0 | |
🔴 | FatalErrorPage.tsx | 0 | 0 | 0 | 0 | 15 |
🔴 | src/pages/NotFoundPage | 0 | 100 | 0 | 0 | |
🔴 | NotFoundPage.tsx | 0 | 100 | 0 | 0 | 2 |
🔴 | src/pages/Organization/EditOrganizationPage | 0 | 100 | 0 | 0 | |
🔴 | EditOrganizationPage.tsx | 0 | 100 | 0 | 0 | 7-8 |
🔴 | src/pages/Organization/NewOrganizationPage | 0 | 100 | 0 | 0 | |
🔴 | NewOrganizationPage.tsx | 0 | 100 | 0 | 0 | 3-4 |
🔴 | src/pages/Organization/OrganizationPage | 0 | 100 | 0 | 0 | |
🔴 | OrganizationPage.tsx | 0 | 100 | 0 | 0 | 7-8 |
🔴 | src/pages/Organization/OrganizationsPage | 0 | 100 | 0 | 0 | |
🔴 | OrganizationsPage.tsx | 0 | 100 | 0 | 0 | 7-8 |
🟡 | src/pages/ReportingPeriodsPage | 50 | 100 | 100 | 50 | |
🔴 | ReportingPeriodsPage.stories.tsx | 0 | 100 | 100 | 0 | 5-13 |
🟢 | ReportingPeriodsPage.tsx | 100 | 100 | 100 | 100 | |
🟡 | src/pages/UploadTemplatePage | 50 | 100 | 50 | 50 | |
🔴 | UploadTemplatePage.stories.tsx | 0 | 100 | 100 | 0 | 5-13 |
🟡 | UploadTemplatePage.tsx | 75 | 100 | 50 | 75 | 9 |
Pusher: @TylerHendrickson, Action: pull_request_target
, Workflow: Continuous Integration
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good
This adds the Reporting Periods page, which includes three new models for the schema: InputTemplate, OutputTemplate, and ReportingPeriod.
I generated the SDL I needed for this to work, which included some models that didn't have SDL yet (roles and users).