Skip to content

Remove unused analytics events#7142

Merged
aduth merged 1 commit intomainfrom
aduth-rm-unused-analytics-events
Oct 13, 2022
Merged

Remove unused analytics events#7142
aduth merged 1 commit intomainfrom
aduth-rm-unused-analytics-events

Conversation

@aduth
Copy link
Contributor

@aduth aduth commented Oct 13, 2022

🛠 Summary of changes

Removes analytics events which are no longer used. These were last referenced prior to #7110.

I put together a small script to try to find any other unused, these were the only ones.

cat app/services/analytics_events.rb | perl -n -e '/def ([a-z_]+)/ && print "$1\n"' | while read LINE; do
  count=$(grep --recursive -o $LINE app | wc -l)
  if [ "$count" -eq "1" ]; then
    echo $LINE
  fi
done

📜 Testing Plan

Automated tests should pass.

changelog: Internal, Analytics, Remove unused analytics events
@aduth
Copy link
Contributor Author

aduth commented Oct 13, 2022

I put together a small script to try to find any other unused, these were the only ones.

It'd be nice to have some automated check as part of continuous integration, but I think this one ain't it. It's pretty slow to run, and inefficient. Ideally we'd do a single pass over all the app files, vs. this script which runs over them all for each analytics method.

@aduth aduth merged commit 64149e6 into main Oct 13, 2022
@aduth aduth deleted the aduth-rm-unused-analytics-events branch October 13, 2022 14:34
@zachmargolis
Copy link
Contributor

Removes analytics events which are no longer used. These were last referenced prior to #7110.

Just to confirm I also grepped for the string names in identity-devops to make sure they weren't being used as part of any dashboards, they seem not to be.

And neither of these are good candidates for the previous_event_name right? Like there are no new events that corelate to these since we got rid of the modal?

@aduth
Copy link
Contributor Author

aduth commented Oct 13, 2022

Just to confirm I also grepped for the string names in identity-devops to make sure they weren't being used as part of any dashboards, they seem not to be.

And neither of these are good candidates for the previous_event_name right? Like there are no new events that corelate to these since we got rid of the modal?

Thanks for checking. These methods were part of FSMv2, so they'd have never been live for real users in production, hence I'm not sure if we'd care to set up previous_event_names since we have no analytics data we'd want to maintain. FSMv2 worked a bit differently in treating the "confirm" (modal) as a distinct step. In the production implementation, the effective equivalent events to these are "Frontend: IdV: show personal key modal" and "IdV: personal key submitted".

'IdV: personal key submitted' => {},
'Frontend: IdV: show personal key modal' => {},

@mdiarra3 mdiarra3 mentioned this pull request Oct 17, 2022
mdiarra3 added a commit that referenced this pull request Oct 17, 2022
* LG-7446 Create "Cancel" Links and Supporting Cancellation Code for Identity Proofing Process (1 of n) (#7124)

* Create concern to render 404 if

The IdentityConfig.store.inherited_proofing_enabled returns false in
preparation for use in the Inherited Proofing (IP) cancellations controller
that needs to be created. Eventually, this code may get thrown away
once IP goes live; however, this makes for less lines of code that
need to be removed once/if it does.

changelog: Improvements, Upcoming Features, LG-7446 Create Inherited Proofing Cancellation Links and Process

* Add skeleton InheritedProofingCancellationsController

Specs to be added in subsequent PR when controller actions
are fleshed out.

* Add InheritedProofingCancellationsController views and i18n

* Add routes for InheritedProofingCancellationsController actions

* Satisfy Brakeman violations

Specifically, the "Render path contains parameter value" violation.

This commit whitelists the flow steps expected and raises an error
if params[:step] is not found in the whitelist.

Confidence: Weak
Category: Dynamic Render Path
Check: Render
Message: Render path contains parameter value
Code: render(action => ButtonComponent.new(:action =>
  (lambda do  button_to(idv_inherited_proofing_cancel_path(:step => params[:step]),
  { **tag_options }, &block)  end), :method => :put, :big => true, :wide => true,
  :outline => true).with_content(t("inherited_proofing.cancel.actions.keep_going")), {})
File: app/views/idv/inherited_proofing_cancellations/new.html.erb
Line: 23

Confidence: Weak
Category: Dynamic Render Path
Check: Render
Message: Render path contains parameter value
Code: render(action => SpinnerButtonComponent.new(:action =>
  (lambda do  button_to(idv_inherited_proofing_cancel_path(:step => params[:step],
  :location => "cancel"), { **tag_options }, &block)  end), :method => :delete,
  :big => true, :wide => true, :outline => true,
  :form => ({ :data => ({ :form_steps_wait => "" }) }))
  .with_content(CancellationsPresenter.new(:sp_name =>
  decorated_session.sp_name, :url_options => url_options).exit_action_text), {})
File: app/views/idv/inherited_proofing_cancellations/new.html.erb
Line: 44

* Remove unused analytics events (#7142)

changelog: Internal, Analytics, Remove unused analytics events

* Remove JavaScript optimization from asset pipeline (#7136)

changelog: Internal, Build Tooling, Remove redundant JavaScript optimization step

* Remove unused support for proc methods in frontend logger (#7143)

changelog: Internal, Analytics, Remove unused feature support in frontend logger

Last usages removed in #7110

* Ensure all UserMailer emails do not use plaintext emails as parameters (#7106)

* Ensure all UserMailer emails have matching User and EmailAddress parameters and plaintext emails are not used as parameters

changelog: Internal, Email, Ensure all UserMailer emails have matching User and EmailAddress parameters and plaintext emails are not used as parameters

Co-authored-by: Zach Margolis <zachmargolis@users.noreply.github.com>

* fix mailer previews

Co-authored-by: Zach Margolis <zachmargolis@users.noreply.github.com>

* Prepare to drop unused registration_logs columns (LG-6317) (#7131)

- Make registration_logs.submitted_at nullable, stop writing it
- Ignore other columns

changelog: Internal, Logging, Stop writing extra registration_logs timestamps

* LG-7251 Update SAML SP request flow to POST internally instead of GET (#6894)

* Update SAML SP request flow to POST internally instead of GET

* Add route for internal SAML auth POST requests

* changelog: Improvements, Service Provider Authentication, Update SAML Authentication Flow

* Add feature flag for SAML internal POST update, tests for the flag

* Allow longer wait delay for in-person feature specs (#7145)

**Why**: Clicking "Continue" from the "prepare" step will wait for a client-side logging event before continuing to the "State ID" step, which often cannot complete before the 0.5 second tolerance allowed by default in local development environments.

changelog: Internal, Automated Testing, Improve reliability of feature specs

* LG-7702: record the issuer of the SP requesting idv in the profile. (#7125)

* LG-7702: record the issuer of the SP requesting idv in the profile.

changelog: Internal, Identity Verification, Track the agency requesting identity verification.

* record the initiating sp as an association
* use the issuer as the foreign key

* changelog: Improvements, In-Person Proofing, updates translations in french and spanish (#7139)

* LG-7446 Create "Cancel" Links and Supporting Cancellation Code for Identity Proofing Process (2 of n) (#7144)

* Segregate Inherited Proofing routes

changelog: Improvements, Upcoming Features, LG-7446 Create Inherited Proofing Cancellation Links and Process

* Rename concern to avoid whitelist in naming

- Flow step whitelist should be compared as strings
so this was changed as well.
- ...not Symbols, because they will be compared against
params[:step] which will be a String value.
- Remove unnecessary code

* Add InheritedProofingCancellationsController specs

Co-authored-by: Gene M. Angelo, Jr <web.gma@gmail.com>
Co-authored-by: Andrew Duthie <andrew.duthie@gsa.gov>
Co-authored-by: Mitchell Henke <mitchell.henke@gsa.gov>
Co-authored-by: Zach Margolis <zachmargolis@users.noreply.github.com>
Co-authored-by: Julia Allen <51330839+julialeague@users.noreply.github.com>
Co-authored-by: Doug Price <douglas.price@gsa.gov>
Co-authored-by: Matt Gardner <wilburnforce@gmail.com>
This was referenced Oct 20, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants