Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Patch Subject: Importer Non-DICOM/Unregistered Exams Description: ============ Associated Patches: =================== This patch must be installed after MAG*3.0*206. Subject: UNABLE TO IMPORT NON-DICOM STUDIES TO UNREGISTERED EXAMS ======== Category: OTHER ========= Description: ============ MAG*3.0*217 addresses the following two issues: The Importer is failing when importing a non-DICOM image to an unregistered exam. During Windows 10 Testing, the Importer was not able to perform any Direct Imports and is erroring out. Patch Components: ================= This patch includes software and documentation files. This document, MAG3_0P 217_Patch_Description.pdf, provides an overview, explains the changes, and outlines the installation for this patch. MAG3_0P217_README.txt, if present, is an informative file associated with the patch. Software: ========= Table 1: Software & Documentation Files ======================================= File Name Description ========== ============ MAG3_0P217.KID Kernel Installation and Distribution System (KIDS) build for Patch 217. MAG3_0P217_ImporterIII_setup.msi Importer installation file. MAG3_0P217_ImporterIII_setup.exe Importer installation file. Documentation: ============== This document, MAG3_0217_Patch_Description.pdf, provides an overview, explains the changes, and outlines the installation for this patch. Files & Fields Associated: ========================== There are no files or fields associated with this patch. Forms Associated: ================= There are no forms associated with this patch. Mail Groups Associated: ======================= There are no mail groups associated with this patch. Options Associated: =================== There are no options associated with this patch. Protocols Associated: ===================== There are no protocols associated with this patch. Security Keys Associated: ========================= There are no security keys associated with this patch. Templates Associated: ===================== There are no templates associated with this patch. Additional Information: ======================== New Service Requests (NSRs): ============================ There are no new service requests addressed in this patch. Patient Safety Issues (PSIs): ============================= There are no patient safety issues associated with this patch. Defect Tracking System Ticket(s) & Overview: ============================================ 1. Defect 736370 (CA Ticket INC0129261) Unable to import non-DICOM studies to unregistered exams Problem: ======== The Importer is failing when importing a non-DICOM image to an unregistered exam. Study-level Failure Details: Exception Type: gov.va.med.imaging.core.interfaces.exceptions.MethodException Details Message: -1`2 error lines returned. -3`Parameter 'EXMDTE' has an invalid value.^REGISTER+17~RAMAGRP1^E`EXMDTE='null000100' During a typical import the Exam Date value is determined one of two ways. It's either generated when registering an order in VistA, or it's obtained from the DICOM header of a DICOM image. Since a non-DICOM file does not have a DICOM header the Exam Date must be obtained from the exam registration - if the order has not been registered an Exam Date is not available, the import fails and an error is generated. Resolution: =========== Do not allow Non-DICOM images to be imported against non-registered exams by not displaying unregistered exams on the list of exams to choose from when Importing. 2. Defect 738272 - Error doing a Direct Import. Importer cannot do an Import. Problem: ======== During Windows 10 testing, the Importer was not able to perform any Direct Import and the application was displaying the following error: This implementation is not part of the Windows Platform FIPS validated cryptographic algorithms. at System.Security.Cryptography.MD5CryptoServiceProvider..ctor() at ImagingClient.Infrastructure.Utilities.StringUtilities.GetHashValue(String value) at ImagingClient.Infrastructure.Utilities.StringUtilities.GetHashForStringArr ay(String[] array) at DicomImporter.ViewModels.MediaReadingViewModel.ReadDicomStudiesFromPath(St ring sourceRootPath, Boolean isToBeStaged, String originIndex) at DicomImporter.ViewModels.DirectImportHomeViewModel.GetStudyList(Object o, DoWorkEventArgs args) at System.ComponentModel.BackgroundWorker.OnDoWork(DoWorkEventArgs e) at System.ComponentModel.BackgroundWorker.WorkerThreadStart(Object argument) The Federal Information Processing Standard (FIPS) Publication 140-2, (FIPS PUB 140-2), is a U.S. government computer security standard used to approve cryptographic modules. The title is Security Requirements for Cryptographic Modules. Initial publication was on May 25, 2001 and was last updated December 3, 2002. Resolution: =========== By replacing the MD5CryptoServiceProvider with the SHA512CryptoServiceProvider, the Importer application will able to import images while running under the Windows 10 operating system. Test Sites: =========== The following sites are test sites for this patch: VA Southern Nevada HCS (Las Vegas) VA Pittsburgh HCS Software and Documentation Retrieval Instructions: =================================================== Software being released and/or documentation describing the new functionality introduced by this patch are available. The preferred method is to retrieve files from download.vista.domain.ext. This transmits the files from the first available server. Sites may also elect to retrieve files directly from a specific server. Sites may retrieve the software and/or documentation directly using Secure File Transfer Protocol (SFTP) from the ANONYMOUS.SOFTWARE directory at the following OI Field Offices: Location Site Hines domain.ext Salt Lake City domain.ext Documentation can also be found on the VA Software Documentation Library at: http://www4.domain.ext/vdl/ Patch Installation: =================== Supported Client Versions ========================= When MAG*3.0*217 is released, the list of supported versions of Importer will change: Supported Versions No Longer Supported 3.0.217 3.0.118 3.0.206 3.0.136 Pre/Post Installation Overview: =============================== MAG*3.0*217 must be installed on the VistA System. This patch must be installed by the compliance date. All sites running VistA Imaging 3.0 must install the KIDS portion of this patch. This patch can be loaded while the VistA Imaging System is active and users are on the system. Installing the MAG*3.0*217 KIDS only takes 2-3 minutes. Use default answers for KIDS load/install questions. Patch-Files: http://code.osehra.org/VistA.git/tree/master/Packages
- Loading branch information