$TXT Created by E at DEVELP.VACO.DOMAIN.EXT (KIDS) on Thursday, 12/07/23 at 14:24 ============================================================================= Run Date: JAN 26, 2024 Designation: MAG*3*348 Package : MAG - IMAGING Priority: Mandatory Version : 3 SEQ #252 Status: Released Compliance Date: FEB 26, 2024 ============================================================================= Associated patches: (v)MAG*3*119 <<= must be installed BEFORE `MAG*3*348' (v)MAG*3*221 <<= must be installed BEFORE `MAG*3*348' (v)MAG*3*301 <<= must be installed BEFORE `MAG*3*348' (v)MAG*3*303 <<= must be installed BEFORE `MAG*3*348' Subject: VISTA IMAGING EXCHANGE (VIX) ENHANCEMENTS Category: - Routine - Other Description: ============ This patch addresses the following issues and new capabilities: Unless noted otherwise, each change applies to VIX and CVIX. 1. Enhancement (IMAG-4240) Digital Imaging and Communications in Medicine (DICOM) Service Class Provider (SCP) Improvements. 2. Defect (IMAG-4241) Consolidate Text Integration Utility (TIU) Note Steps to Prevent Failures. 3. Enhancement (IMAG-4222) Installation and configuration changes and improvements. 4. Enhancement (IMAG-4219) Commercial off-the-shelf (COTS) package updates for VA Technical Reference Manual (TRM) compliance. 5. Defect (IMAG-4245) Concurrent requests for images within the same study are slow. 6. Enhancement (IMAG-4246) Improve Performance and Resiliency of Apache Tomcat Functionality. 7. Defect (IMAG-4256) Fix login for the transaction log tracer tool to accept basic authentication. 8. Defect (IMAG-4265) Add start and end date time and last button to the VIX transaction log page. 9. Enhancement (IMAG-4270) Reduce primary drive disk space required for Tomcat Java logs and VIX Transaction logs. 10. Enhancement (IMAG-4271) Add broader Secure Token Service (STS) support for all VIX web services. 11. Defect (IMAG-4272) Additional validation for security tokens. 12. Defect (IMAG-4273) Shorten file names for Java log downloads. 13. Enhancement (IMAG-4280, INC14152257) Support YBR_FULL color images. 14. Enhancement (IMAG-4281) Implement HTTP compression support using gzip for data exchanged over federation services. 15. Enhancement (IMAG-4282) Add series description to the study restservices. 16. Enhancement (IMAG-4308) Enable caching of sessions for MUSE queries. 17. Defect (IMAG-4312) Only query for MUSE artifacts when requested. 18. Defect (IMAG-4315) Ax claims queries against CVIX erroneously query central office hosts. 19. Defect (IMAG-4337) Prevent VistA fallback behavior for site 200CRNR. 20. Enhancement(IMAG-4346) Change database implementation for transaction log. 21. Enhancement (IMAG-4362) Turn off Listener Tool. 22. Enhancement (IMAG-4363) Change the User Guides browser tab title. 23. Defect (IMAG-4366) Fix DICOM SCP startup of port listener. 24. Defect (IMAG-4365) MUSE can be erroneously queried for images. 25. Enhancement (IMAG-4348) Directly serve PDFs from the VIX Viewer. 26. Enhancement (IMAG-4368) Update VIX caching of authorization attempt failures to be configurable. 27. Defect (IMAG-4453) Support array type handling for Remote Procedure Calls (RPCs) used with new style broker connections. 28. Enhancement (IMAG-4465) Improved cache expiration configuration. Patch Components: ----------------- N/A Files & Fields Associated: File Name (Number) Field Name (Number) New/Modified/Deleted ------------------ ------------------- -------------------- N/A Forms Associated: Form Name File Number New/Modified/Deleted --------- ----------- -------------------- N/A Mail Groups Associated: Mail Group Name New/Modified/Deleted --------------- -------------------- N/A Options Associated: Option Name Type New/Modified/Deleted ----------- ---- -------------------- N/A Protocols Associated: Protocol Name New/Modified/Deleted ------------- -------------------- N/A Security Keys Associated: Security Key Name ----------------- N/A Templates Associated: Template Name Type File Name (Number) New/Modified/Deleted ------------- ---- ------------------ -------------------- N/A Remote Procedures Associated: Remote Procedure Name New/Modified/Deleted --------------------- -------------------- MAG DOD GET STUDIES IEN MODIFIED Parameter Definitions Associated: Parameter Name New/Modified/Deleted -------------- -------------------- MAG PRECACHE RAD REG ENABLED NEW Additional Information: ----------------------- Blood Bank Team Coordination: N/A New Service Requests (NSRs): N/A Patient Safety Issues (PSIs): N/A Defect Tracking System Ticket(s) & Overview: (IMAG numbers are from VA Jira) 1. Enhancement (IMAG-4240) Digital Imaging and Communications in Medicine (DICOM) Service Class Provider (SCP) Improvements. A. Make DICOM SCP Report generation optional by caller. Problem: -------- Some Query Retrieve (Q/R) devices reject exams based on values in the generated reports. Resolution: ----------- The DICOM SCP report generation can now be disabled in configuration. B. Improve DICOM SCP handling. Problem: -------- In case of a resource that fails to respond to the DICOM SCP service it can become inoperable without a restart. Resolution: ----------- A cancellation exception provoked by an unresponsive connection is now handled correctly and will not result in a service exception. DICOM SCPconnections now timeout if the data source is unresponsive for 30 seconds, preventing the cancellation exception from occurring if a VIX is non-responsive. C. DICOM SCP fails to generate a report for a patient not registered at Station 200. Problem: -------- DICOM SCP fails to generate a report for a patient not registered at Station 200. Resolution: ----------- DICOM SCP now uses the ICN as the patient identified instead of the SSN and omits the date of patient. Now DICOM SCP generates reports for a patient not registered at Station 200. D. Allow patients unknown to the local VistA to be queried through VIX. Problem: -------- DICOM SCP did not allow for patients unknown to the local VistA to be queried through VIX. Resolution: ----------- VIX DICOM SCP can now be configured the remotePatientResolution property in ScpConfiguration.Config,to resolve patients through CVIX if the patient identifier was unknown at the local VistA. E. Effectively remove default image timeout. Problem: -------- If the DICOM SCP receives multiple C-MOVES for large studies, C-STOREs for images far enough in the queue will be timed out without any attempt to download. Resolution: ----------- The default image timeout has been effectively removed, allowing C-STOREs to process in the order they were received without timeout. To protect against potential memory exhaustion, a configurable bounded queue, controlled by imageQueueSize in ScpConfiguration.Config with a default of 10,000, of pending image requests has been implemented. F. Log error if the DICOM SCP configuration file is invalid. Problem: -------- The DICOM SCP configuration file (ScpConfiguration.Config) can be in an invalid state that is not readily apparent. Resolution: ----------- Now when the DICOM SCP configuration file is invalid, an error is logged in a log file. G. Allow DICOM SCP to be configured to send keep alives for long running C-MOVES. Problem: -------- DICOM SCP C-MOVES were timing out after a period of time determined by the calling PACS. Resolution: ----------- Now, the DICOM SCP is configurable to send a DICOM Message Service Element (DIMSE) with a status of pending when the VIX completes a download of an image relevant to the C-MOVE. H. Fixed bug preventing usage of cached metadata. Problem: -------- Cached metadata for DICOM SCP was not able to be read from the file system. Resolution: ----------- DICOM SCP now reads its file system cache if available and if the data is more recent than the configured time limit to expire (cacheMetaHoursToLive in ScpConfiguration.Config). I. Fix DICOM SCP startup of port listener. Problem: -------- The DICOM SCP startup instantiated a port listener through the Laurel Bridge library twice causing a potential deadlock with the library. Resolution: ----------- Now the DICOM SCP startup instantiates a single port listener through the Laurel Bridge library. J. Faster DICOM SCP data transfer. Problem: -------- Bandwidth between VIX serving exams for the DICOM SCP has been observed to be quite limited. Resolution: ----------- Added pre-caching mechanism that improves data transfer speeds. DICOM SCP now has a new fast data transfer configuration (isFdtEnabled that defaults to true) and a configurable port for the fast data transfer listener (fdtPort). K. Automatically remove site 200 from the backlist. Problem: -------- During initial DICOM SCP rollout, DoD metadata retrieval times were causing issues for PACS C-FINDs so 200 was added to the default blacklist. Since, image retrieval times have been improved, and other fallback preventions have been added to prevent the C-FIND issues, and it is no longer desirable to have 200 in the blacklist. Resolution: ----------- Now site 200 is automatically removed from the blacklist if present and the default SCP configuration (ScpConfiguration.Config) does not include site 200. 2. Enhancement (IMAG-4241) Consolidate Text Integration Utility (TIU) Note Steps to Prevent Failures. Problem: -------- iMedConsentWeb (ICW) has an interface to CVIX (Centralized VistA Imaging Exchange) for TIU note creation and consent file ingestion which had separate calls to create the note and ingest the consent file which in some cases resulted in file creation failures where ICW could not remove the note. This led to cases with notes without any consent file in the VistA system. Resolution: ----------- The separate calls between ICW and CVIX to create the note and ingest the consent file have been consolidated into one step in a new endpoint to allow proper clean-up if there is a failure. Now, failures result in the removal of the association of the consent file and the note completely. 3. Enhancement (IMAG-4222) Installation and configuration changes and improvements. A. Fix IllegalAccessException error message after installation. Problem: -------- Configuration files were logging warnings and errors for an IllegalAccessException during file initialization with VIX installations. Resolution: ----------- Fixed the IllegalAccessException error logged during configuration file initialization with VIX installations. B. Resolve access to the path is denied errors during installation. Problem: -------- Prior to this change, occasionally during installation the VIX Installer encountered an access to the path is denied error preventing installation from completing. Resolution: ----------- The VIX Installer's use of the Ionic Zip Library has been replaced with native .NET framework libraries to prevent any access to the path is denied errors from occurring during installation. C. Finish PowerShell scripts prior to service start during installation. Problem: -------- Prior to this change, the VIX/CVIX services would attempt to start before the PowerShell scripts completed. Resolution: ----------- Now the VIX Installer waits until the PowerShell scripts are finished before starting the VIX/CVIX services. D. Delete files for the VIX cache during uninstallation. Problem: -------- Prior to this change, the VIX installer during installation deleted the VIX cache files and subfolders prior to setting file permissions for the apachetomcat user. This increased installation time and often required manual deletion of the VIX cache prior to installation. Resolution: ----------- Now the VIX Installer starts the deletion of the VIX cache files and subfolders during uninstallation. This decreases installation time and limits the need for manual deletion. E. Automate .NET Framework 4.8 Installation. Problem: -------- Prior to this change, if .NET Framework 4.8 was not installed, it was necessary to manually download and install prior to installation of the VIX installer. Resolution: ----------- Now the VIX Installer automatically installs .NET Framework 4.8 if it (or a later version of) is not installed. F. Stop deprecated files from being in the installer. Problem: -------- Prior to this change, old versions of pre-requisite packages were included in the installer which increased the size of the installer file. Further the folder of the deprecated version of Laurel Bridge remained on the C: drive. Resolution: ----------- Now the VIX Installer no longer includes nor requires the deprecated pre-requisite files to be present in the installer file. Further, the VIX Installer now removes the folder of the deprecated version of Laurel Bridge once it is no longer needed. G. Update VIX Installer to include a default certificate. Problem: -------- Prior to this change, it was necessary for admins performing new installations to download a separate zip file of certificates required by the VIX Installer (this zip file contains federation.keystore and federation.truststore). Resolution: ----------- Now the VIX Installer includes a default certificate zip file (federation.zip) and no separate download of a certificate zip file is required for new installations. H. Update VIX Installer to no longer use certificates ending in the JKS file extension. Problem: -------- Prior to this change, the VIX used a JKS certificate for Tomcat communication on port 443 and the VIX Installer created this certificate file. Resolution: ----------- Now the VIX Installer no longer creates nor references any certificate ending in the JKS file extension. The certificates have been consolidated into a federation.keystore and federation.truststore. I. Remove VIX Certificate Utility Problem: -------- The VIX Certificate Utility created certificates CVIX.jks and das.truststore formerly used on CVIX that had been deprecated. Resolution: ----------- The VIX Certificate Utility has been removed from the VIX Installer. J. Address Laurel Bridge installation items Problem: -------- Laurel Bridge had several environment variables that were not set as expected. Laurel Bridge also was expected to log DICOM SCP messages in the log folder but some servers were using a tmp\log folder. Further, if a newer version of VS C++ Redistributable was installed than included with Laurel Bridge this was logged as an error. Resolution: ----------- The VIX Installer now sets Laurel Bridge environment variables correctly. Further Laurel Bridge now consistently logs to the log folder. Now the installation of the VS C++ Redistributable is not logged as an error if unable to be installed if a newer version is already present. K. Remove extra apachetomcat user accounts Problem: -------- The VIX installer was creating more than one apachetomcat user account in C:\Users when only one apachetomcat account is required. Resolution: ----------- The VIX Installer now does not create extra apachetomcat user accounts. In MAG*3.0*348 extra apachetomcat user accounts are deleted as part of the VIX Installation. L. Update VIX Installer to improve user interface Problem: -------- The VIX installer had several pages that could benefit from improved user interface to improve user experience. Resolution: ----------- The VIX Installer now has subpage headers more accurately reflect the installation occurring on a page. Further, the Specify the location... page now shows an Update button when it is necessary to update the symbolic link to the VIX log archive folder and the VIX log archive folder already exists. 4. Enhancement (IMAG-4219) Commercial off-the-shelf (COTS) package updates for VA Technical Reference Manual (TRM) compliance. Problem: -------- COTS packages required an upgrade in accordance with the TRM. Resolution: ----------- The Java version in MAG*3.0*329 was 8u351 and upgraded to 8u371 in accordance with the TRM. The Apache Tomcat version in MAG*3.0*329 was 9.0.68 and upgraded to 9.0.75 in accordance with the TRM. The OpenSSL version used in MAG*3.0*329 was 1.1.1 and upgraded to 3.1.0 in accordance with the TRM. The .NET Framework in MAG*3.0*329 was 4.7.2 and upgraded to 4.8 in accordance with the TRM. The Log4j version in MAG*3.0*329 was 2.17.2 and upgraded to 2.20.0 in accordance with the TRM. The SQLite version in MAG*3.0*329 was 3.39.3 and upgraded to 3.41.1 in accordance with the TRM. The Aware JPEG2000 Library in MAG*3.0*329 was 3.19.2.2 and upgraded to 3.21.9 in accordance with the TRM. 5. Defect (IMAG-4245) Concurrent requests for images within the same study are slow. Problem: -------- Operating system/file system locking on the file system representation of the study metadata causing concurrent requests for images within that study to serve slowly. This is exacerbated by higher concurrency counts. Image Viewing Solution (IVS) is the primary consumer effected but this can affect any caller. Resolution: ----------- Now a configurable in memory cache ensures concurrent reads of the same file do not happen frequently enough to degrade performance. CommandConfiguration.config now has two new properties: 1) maxMemCacheStudies which determines how large the configurable cache becomes before being cleared, this value defaults to 5 which should keep memory usage low while ensuring concurrent reads of the same file do not occur and 2) simpleStudyCacheReadDelayMillis which determines how long the application waits to retry a file read if the file is being written to while being read, this value defaults to 100. 6. Enhancement (IMAG-4246) Improve Performance and Resiliency of Apache Tomcat Functionality. A. Reduce Apache Tomcat shutdown time. Problem: -------- Apache Tomcat currently takes a significant amount of time to stop (typically greater than 1 minute). Resolution: ----------- Added a new listener and modified a Tomcat configuration file by setting the "forceShutdownTimeout" value to a default of "10" seconds in the ROOT web applications "web.xml" file. Now when Tomcat is told to shutdown, a destroy is invoked to run after the forceShutdownTimeout time has elapsed. Now Apache Tomcat takes significantly less time to shutdown (less than or equal to 20 seconds). B. Detect and retry when Apache Tomcat restart partially fails. Problem: -------- Sometimes after a nightly Apache Tomcat restart the DICOM SCP and image services start in a nonfunctional state due to thread deadlock within Tomcat. Resolution: ----------- Modified the nightly restart script to ensure Tomcats DICOM SCP service is listening on Port 104 and retries the restart up to three times if not listening. 7. Defect (IMAG-4256) Fix login for the transaction log tracer tool to accept basic authentication. Problem: -------- Users could not use basic authentication with the transaction log tracer tool. Resolution: ----------- Fixed a bug and now users can use basic authentication with the transaction log tracer tool (VixLogViewTransaction.jsp). 8. Defect (IMAG-4265) Add start and end date time and last button to the VIX transaction log page. Problem: -------- The VIX transaction log page only allowed downloading the logs from today and there was no way to specify the time, only the date. Further, the transaction log endpoint always used the end of the day as the time. In addition, the VIX transaction log page did not have a back button. Resolution: ----------- The VIX transaction log page (VixLog.jsp) now has a new calendar component that allows specification of the month, date, year, and the time in 15-minute intervals. The VIX transaction log page now allows downloading logs by day and time. Further, the transaction log endpoint (ExcelTransactionLog.java) now allows for the time to be specified. The VIX transaction log page now has a back button to allow for better navigation. 9. Enhancement (IMAG-4270) Reduce primary drive disk space required for VIX Transaction log database files. Problem: -------- Java logging is verbose and produces large files requiring more disk space than available in some cases on the primary local drive. Resolution: ----------- To reduce disk space requirements on the primary local drive, the VIX Transaction logs database files are no longer required to reside on the primary drive. The VIX installer now creates a VixTxDb folder on the same drive as the VixCache folder to store the VIX Transaction logs database files. 10. Enhancement (IMAG-4271) Add broader Secure Token Service (STS) support for all VIX web services. Problem: -------- The Enterprise Precision Scanning and Indexing Automation (EPSI) team requested a VIX/CVIX change from Broker Security Exchange (BSE) tokens to STS tokens as the primary way (for them) of accessing VistA. The "securityToken" query parameter contains the full STS token in its URL which may cause potential issues with some systems. Resolution: ----------- Now C/VIX web services support a mechanism allowing STS authentication credentials to be provided in HTTP headers. Each web service currently available for authentication via security tokens at the "/token/" path prefix (e.g., "/Study/token/restservices/"), now also exposes an "/sts" path variant. This variant accepts an STS token via a HTTP header named "xxx-securityToken" (case-insensitive) and a VistA site to use for authentication of that token via an HTTP header named "xxx-authSiteNumber" (case-insensitive). 11. Defect (IMAG-4272) Additional validation for security tokens. Problem: -------- The "/token/" web service endpoints using security tokens provided by the ViewerStudyWebApp did not perform to required specifications for token validation. Resolution: ----------- The token "filter" applied to all "/token/" endpoints now validates tokens regardless of other authentication credentials provided. 12. Defect (IMAG-4273) Shorten file names for Java log downloads. Problem: -------- The Java logs page displays downloadable ZIP files with long file names that include portions of the original path and destination path in the displayed file name (i.e., ImagingArchivedLogsLink_ ImagingExchangeWebAppLogs_ImagingExchangeWebApp-yyyy-MM-dd-hh.zip). Resolution: ----------- The Java logs page now displays downloadable ZIP files with shorter file names that include only the corresponding web applications name and date (i.e., ImagingExchangeWebApp-yyyy-MM-dd-hh.zip). 13. Enhancement (IMAG-4280, INC14152257) Support YBR_FULL color images. Problem: -------- The VIX Viewer displayed all color DICOM images incorrectly when their Photometric Interpretation, DICOM Tag (0028,0004) was YBR_FULL. The Viewer rendered the image incorrectly and, in some cases, multiple times per color channel. Resolution: ----------- The VIX Viewer now converts DICOM images with a Photometric Interpretation of YBR_FULL (24 bits per pixel) to RGB (red, green and blue) colors. With this change, JLV and the VIX Viewer now correctly display both single and multi-sliced color DICOM YBR_FULL images. 14. Enhancement (IMAG-4281) Implement HTTP compression support using gzip for data exchanged over federation services. Problem: -------- The VIX and CVIX data exchange over federation services did not support HTTP compression. Resolution: ----------- The VIX and CVIX data exchange over federation services on Apache Tomcat port 8442 and 8443 now support HTTP compression using the gzip algorithm. 15. Enhancement (IMAG-4282) Add series description to the study restservices. Problem: -------- The study restservices did not return the series description field. Resolution: ----------- The study restservices now returns the series description field if the query URL parameter includeSeriesDescription is provided and set to true. 16. Enhancement (IMAG-4308) Enable caching of sessions for MUSE queries. Problem: -------- MUSE sessions did not have caching and did not have a configurable setting for the expiration time of the session. Resolution: ----------- MUSE sessions now have a configurable setting for caching (enableSessionCache) that is enabled by default. MUSE sessions now have a configuration setting for the expiration time of the session (preExpirationMinutes) which determines how long before the MUSE's own session timeouts before the VIX expires cached sessions. This defaults to two minutes. There is also a configuration setting for the date format (expirationDateFormat) to support the expiration time of the session. The three new configuration settings are added in the MuseDataSource-1.0.config file for the VIX. 17. Defect (IMAG-4312) Only query for MUSE artifacts when requested. Problem: -------- Queries against the study services may include attempts to query MUSE for artifacts when the provided filter does not specify inclusion of MUSE artifacts. Further, MUSE queries for patients without MUSE data produced a null pointer exception in the logs. Resolution: ----------- The study services now only query MUSE when the filter specifies such inclusion. In addition, MUSE queries no longer produce erroneous logging statements. 18. Defect (IMAG-4315) Ax claims queries against CVIX erroneously query central office hosts. Problem: -------- Claims queries against the AxWebApp on CVIX hosts queried "Central Office" hosts (200CORP, 200CLMS, 100) erroneously and failed. Resolution: ----------- Claims queries against the AxWebApp on CVIX hosts now exclude site numbers 200CORP, 200CLMS, and 100. 19. Defect (IMAG-4337) Prevent VistA fallback behavior for site 200CRNR. Problem: -------- CVIX and VIX currently use a VistA fallback for site 200CRNR that does not work as Station 200 does not have the data. Resolution: ----------- Now the CVIX and VIX no longer use VistA fallback behavior for site 200CRNR. 20. Enhancement (IMAG-4346) Change database implementation for transaction log. Problem: -------- Until now, the VIX transaction log database used Berkeley DB which sometimes caused cursor locks during purge and had poor performance. Resolution: ----------- Now the VIX transaction log database (VixTx.db) uses SQLite which improves performance and allows for frequent purging. A new configuration file (TransactionLoggerJdbSource-1.0.Config) replaces the prior (TransactionLoggerLocalDataSource-1.0. Config) and adds additional configuration options (useSharedCache, synchronousMode, journalMode) for SQLite performance. 21. Enhancement (IMAG-4362) Turn off Listener Tool. Problem: -------- The ListenerTool listening on port 9200 appears to no longer be used and created an additional unneeded dependency. Resolution: ----------- The ListenerTool continues to be installed but is stopped by default. The nightly services restart script no longer starts the ListenerTool. 22. Enhancement (IMAG-4363) Change the User Guides browser tab title. Problem: -------- The User Guides browser tab title was help which was not very descriptive. Resolution: ----------- The User Guides browser tab title now says VIX_Viewer_User_Guide. 23. Defect (IMAG-4366) Fix DICOM SCP startup of port listener. Problem: -------- The DICOM SCP startup instantiated a port listener through the Laurel Bridge library twice causing a potential deadlock with the library. Resolution Note: ---------------- Incident was addressed in MAG*3.0.360 that did not include an MSI and carried forward into the MAG*3.0.348 release. Resolution: ----------- Now the DICOM SCP startup instantiates a single port listener through the Laurel Bridge library. 24. Defect (IMAG-4365) MUSE can be erroneously queried for images. Problem: -------- When a user queried for images from a VIX containing "vaimage" and the image could not be located or retrieved, MUSE could be queried and return the wrong image. Resolution Note: ---------------- Incident was addressed in MAG*3.0.360 that did not include an MSI and carried forward into the MAG*3.0.348 release. Resolution: ----------- MUSE studies and images now have a "MUSEECG" suffix that VIX explicitly checks for before querying MUSE when images cannot be located. 25. Enhancement (IMAG-4348) Directly serve PDFs from the VIX Viewer. Problem: -------- Prior to this change, consumers of the VIX Viewer could not directly obtain PDFs. They could only see them in the VIX Viewer's web page. Resolution: ----------- A new web API call (servePdf) is now offered by the VIX Viewer. servePdf is documented in https://FQDN:343/vix/viewer/VVSDoc#servePdf, where FQDN is the VIX server name. When a consumer calls the studydetailsweb API with the IncludeImageDetails=true URL parameter, the results now include a pdfUrl for the study. The pdfUrl contains the URL the consumer can call to retrieve the PDF, for example {"url": "FQDN:343/vix/files/pdffiles/0000000000_499d173c-100c-44a9-a6cb-0fb81c d3f29d_SPU.pdf"}. 26. Enhancement (IMAG-4368) Update VIX caching of authorization attempt failures to be configurable. Problem: -------- The VIX caches the status of BSE login attempts for a given VistA for a fixed amount of time, which may cause issues when BSE tokens are presented incorrectly. Resolution: ----------- The caching time for BSE login attempts ("bseCacheRetentionTime") and cache purge / refresh time ("bseCacheRefreshTime") for BSE login attempts are now configurable in VistaSessionConfiguration-1.0.config. Both times now default to 0 to disable BSE login caching. 27. Defect (IMAG-4453) Support array type handling for Remote Procedure Calls (RPCs) used with new style broker connections. Problem: -------- When using the new style broker connection type for VistA, RPCs which accepted ARRAY type parameters were not correctly handled and would fail. Resolution: ----------- Added ARRAY type handling for parameters to support RPCs used with new style broker connections. 28. Enhancement (IMAG-4465) Improved cache expiration configuration. Problem: -------- The current cache expiration configuration (as specified in ImagingExchangeCache-cache.xml) does not include for seven- and thirty-day expiration times. The VixCache folder sometimes had directory contents that were not cleaned up for the seven- and thirty-day intervals. Resolution: ----------- Now the installer updates the ImagingExchangeCache-cache.xml file and adds entries for these two expiration times so now the VixCache folder reliably is cleaned up every day at 1 A.M. server time. Test Sites: ----------- * VA Pacific Islands Health Care * Veterans Health Care System of the Ozarks * Jesse Brown VAMC SNOW Change Order Number: ------------------------- * VA Pacific Islands Health Care: CHG0437208 * Veterans Health Care System of the Ozarks: CHG0437168 * Jesse Brown VAMC: CHG0437184 Software and Documentation Retrieval Instructions: --------------------------------------------------------------- The software for this patch is being released in a PackMan message. Other Software Files: This release includes software files. They can be obtained at location: /srv/vista/patches/SOFTWARE. Software files can also be obtained by accessing the URL: https://download.vista.domain.ext/index.html/SOFTWARE. File Title File Name ----------------------------------------------------------------------- VistA Imaging Exchange (VIX) Installer MAG3_0P348_VIX_SETUP.MSI Central VistA Imaging Exchange (CVIX) Installer* MAG3_0P348_CVIX_SETUP.MSI Documentation describing the new functionality is included in this release. Documentation can be found on the VA Software Documentation Library at: https://www.domain.ext/vdl/application.asp?appid=105. Documentation can also be obtained at https://download.vista.domain.ext/index.html/SOFTWARE. Documentation Title File Name ------------------------------------------------------------------------ Deployment, Installation, Backout, and Rollback Guide MAG3_0P348_DIBORG.PDF VistA Imaging Exchange (VIX) Installation Guide MAG3_0P348_VIX_INSTALLATION_GUIDE.PDF Central VistA Imaging Exchange (CVIX) Installation Guide* MAG3_0P348_CVIX_INSTALLATION_GUIDE.PDF VistA Imaging Exchange (VIX) Administration Guide MAG3_0P348_VIX_ADMIN_GUIDE.PDF CVIX Administrator s Guide and Product Operations Manual* MAG3_0P348_CVIX_POM.PDF *Note: Only the VistA patch and VIX clients for MAG*3.0*348 should be installed at medical centers. As a result, the CVIX Installer and related CVIX installation files are not provided to sites on the Network File Shares. Patch Installation: ------------------- Pre/Post Installation Overview: MAG*3.0*348 must be installed on the VistA System prior to running the new executables. This patch must be installed by the compliance date. All sites running VistA Imaging 3.0 must install the VistA portion of this patch. This patch may be loaded while the VistA Imaging System is active. The installation takes less than one minute. Pre-Installation Instructions: This patch may be installed with users on the system, although it is recommended that it be installed during non-peak hours to minimize potential disruption to users. This patch should take less than 5 minutes to install. For pre-installation instructions, please see the MAG3_0P348_VIX_INSTALLATION_GUIDE.PDF for more detail. Installation Instructions: 1. Choose the PackMan message containing this build. Then select the INSTALL/CHECK MESSAGE PackMan option to load the build. 2. From the Kernel Installation and Distribution System Menu, select theInstallation Menu. From this menu, A. Select the Verify Checksums in Transport Global option to confirm the integrity of the routines that are in the transport global. When prompted for the INSTALL NAME enter the patch name MAG*3.0*348. NOTE: Using does not bring up a Multi-Package build even if it was loaded immediately before this step. It will only bring up the last patch in the build. B. Select the Backup a Transport Global option to create a backup message of any routines exported with this patch. It does not backup any other changes such as DDs or templates. C. You may also elect to use the options: i. Print Transport Global This option allows you to view the components of the patch. ii. Compare Transport Global to Current System - This option allows you to view all changes made when this patch is installed. It compares all of the components of this patch,such as routines, DDs, templates, etc. D. Select the Install Package(s) option and choose the patch to install. i. If prompted 'Want KIDS to Rebuild Menu Trees Upon Completion of Install? NO//', answer ii. When prompted 'Want KIDS to INHIBIT LOGONs during the install? NO//',answer . iii. When prompted 'Want to DISABLE Scheduled Options, Menu Options, and Protocols? NO//', answer Patch installation takes 2 - 5 minutes. For VIX installation instructions, please see the MAG3_0P348_VIX_INSTALLATION_GUIDE.PDF for more detail. Installation Verification: Use the Install File Print option on the Utilities menu under KIDS and select MAG*3.0*348 to verify successful VistA installation. Successful VIX installation can be verified by following the instructions in the MAG3_0P348_VIX_INSTALLATION_GUIDE.PDF. Post-Installation Instructions: For post-installation instructions, please see the MAG3_0P348_VIX_INSTALLATION_GUIDE.PDF for more detail. Back-out Procedures for MAG Routines ------------------------------------ Back-out can be done only with the concurrence and participation of the development team and appropriate VA site/region personnel. The decision to back-out or rollback software can be a joint decision between the development team, VA site/region personnel, and other appropriate VA personnel. Rollback, Back Out, or Uninstalling MAG*3.0*348 MSI -------------------------------------------------- If it is necessary to uninstall the MAG*3.0*348 VIX MSI, use the Uninstall option from Windows Control Panel to uninstall: "VIX Service Installation Wizard 30.348.5.8227". Then install the previous version of VIX, which was included in MAG*3.0*329. To back out the VIX and replace it with the prior version, please see the MAG3_0P348_VIX_INSTALLATION_GUIDE.PDF for more detail. The versions should be validated during uninstall, rollback or back-out if necessary. Routine Information: ==================== The second line of each of these routines now looks like: ;;3.0;IMAGING;**[Patch List]**;Mar 19, 2002;Build 6;Apr 19, 2013 The checksums below are new checksums, and can be checked with CHECK1^XTSUMBLD. Routine Name: MAGDQR20 Before: B81382507 After: B87736084 **119,301,348** Routine Name: MAGDQR21 Before:B172485019 After:B194419260 **83,104,123,119,221,348** Routine list of preceding patches: 221, 301 ============================================================================= User Information: Entered By : Date Entered : NOV 21, 2022 Completed By: Date Completed: JAN 25, 2024 Released By : Date Released : JAN 26, 2024 ============================================================================= Packman Mail Message: ===================== $END TXT