Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[BUG] Double signature bugs #876

Closed
eophten opened this issue Nov 29, 2019 · 6 comments
Closed

[BUG] Double signature bugs #876

eophten opened this issue Nov 29, 2019 · 6 comments
Assignees
Labels
help wanted need more information More detailed information is needed.
Milestone

Comments

@eophten
Copy link

eophten commented Nov 29, 2019

On version v1.5.4. We are seeing behavior where the same signature will appear in the signatures list twice.

When pasting new signatures with lazy delete when two are present, one will be deleted. When pasting new signatures with lazy delete when one is present, a second will sometimes be added.
Double Signature
Double Signature Paste w/ Lazy Delete
Single Signature Paste w/ Lazy Delete

@CalMatar
Copy link

I have a question on this. Did you add the WKH signature manually? If so did you just add the letters and not the numbers? I have done this in the past and as I see it the system should see that as a different signature.

@exodus4d
Copy link
Owner

@eophten I think @CalMatar is right with his assumption.

Hot it works:

  • The "preview" table matches rows by the full name of a signature: WKH-190 (including numbers). This is done in JS (client side)
    • If there is a signature manually added with WKH, a new pasted WKH-190 Sig is interpreted as new, and the current WKH is flagged for delete (red row)
    • Sometimes there are two signatures with the same letters in a system e.g. WKH-190, WKH-180, so we can not just check the first 3 letters for row matching.
  • Saving the signature reader dialog, submits parsed "Scan result" (from textarea) to the server (not the content of the preview table)
    • The final validation and "row matching" is done in PHP (server side)
    • New sig rows now have a unique Id after saving them to the DB.

@exodus4d exodus4d added help wanted need more information More detailed information is needed. labels Nov 30, 2019
@eophten
Copy link
Author

eophten commented Nov 30, 2019

@exodus4d i was able to go back through our discord logging (this bug was bubbled up to me from my users), it looks like the WKH signature was added manually.

From a feature enhancement perspective, would a way to disable the manual addition of signatures? For the life of me, I cannot think of a time when I (or any other pilot) shouldn't be adding the signature from the probe scanner copy/paste directly.

If that is too heavy handed, is there a way to surface a visual cue for manually added signatures versus signature read signatures?

@eophten eophten closed this as completed Nov 30, 2019
@exodus4d
Copy link
Owner

exodus4d commented Dec 1, 2019

Adding signatures manually is fine. The issue here is, that someone forget to add the numbers to its name.
You can see the full name in the tooltip, but I agree that this is not obvious or practicable.
sigNameTooltip

We could think about a stronger validation (3 letters + dash + 3 numbers). This would solve the problem but would prevent users to add some temp/custom signatures to a system e.g. a "floating can" can no longer have a signature called "CAN".... (sry can´t find a better example :D)

@eophten
Copy link
Author

eophten commented Dec 1, 2019

Stronger validation would be great!

@exodus4d
Copy link
Owner

exodus4d commented Dec 6, 2019

Signature ID (e.g. ABC-123) now has a stronger validation:

sigName

@exodus4d exodus4d added this to the v1.5.5 milestone Dec 6, 2019
@exodus4d exodus4d self-assigned this Dec 6, 2019
@exodus4d exodus4d mentioned this issue Dec 6, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
help wanted need more information More detailed information is needed.
Projects
None yet
Development

No branches or pull requests

3 participants