Skip to content

Aux Data Cleaner logging bugfix#69

Open
ljones37oet wants to merge 18 commits intoOceanDataTools:2.xfrom
ljones37oet:dev_2.5
Open

Aux Data Cleaner logging bugfix#69
ljones37oet wants to merge 18 commits intoOceanDataTools:2.xfrom
ljones37oet:dev_2.5

Conversation

@ljones37oet
Copy link
Copy Markdown

I forgot to make data source a public property on the cleaner. It caused a crash during some debug logging in the aux_data_manager_runner.

webbpinner and others added 18 commits August 13, 2025 10:45
Adds the ability to control the visibility of event options based on the values of other event options.

This allows administrators to create more dynamic and context-aware event templates, improving the user experience and reducing the likelihood of errors.
Updates the API key route paths to use snake_case instead of kebab-case for consistency.

This change ensures that the API adheres to a consistent naming convention for route paths.
…x and Coriolix implementations

Note: initial refactor was done by CoPilot and then edited by me
insert_aux_data_from_ws now runs one connection session and raises exceptions cleanly on disconnect
The outer loop in run_aux_data_inserter is now the sole responsibility for retry logic.
inner loop = "listen for events", outer loop = "reconnect on failure"
Instead of directly interacting with the eventAuxDataTable, the events API endpoints now publish deleteEvents messages, which the aux_data_managers are listening for.
When an aux_data_manager receives a deleteEvents messages, it sends the contents to its aux_data_file_cleaner(s) which do any external clean up required and then send a delete request to the API event_aux_data endpoint

# Conflicts:
#	routes/api/v1/events.js
…en you delete framegrab aux data, it will also delete the images from the sealog files

Note: we do not use framegrab, so I didn't have a great way to test this, but it is very similar to our stillcap_ffmpeg aux data mgr, which I have tested extensively
Lint all files, alphabetize imports, remove unused functions, use built in logger
@gitguardian
Copy link
Copy Markdown

gitguardian bot commented Mar 19, 2026

⚠️ GitGuardian has uncovered 1 secret following the scan of your pull request.

Please consider investigating the findings and remediating the incidents. Failure to do so may lead to compromising the associated services or software components.

Since your pull request originates from a forked repository, GitGuardian is not able to associate the secrets uncovered with secret incidents on your GitGuardian dashboard.
Skipping this check run and merging your pull request will create secret incidents on your GitGuardian dashboard.

🔎 Detected hardcoded secret in your pull request
GitGuardian id GitGuardian status Secret Commit Filename
27597708 Triggered Generic Password 39e661f test/api_keys.test.js View secret
🛠 Guidelines to remediate hardcoded secrets
  1. Understand the implications of revoking this secret by investigating where it is used in your code.
  2. Replace and store your secret safely. Learn here the best practices.
  3. Revoke and rotate this secret.
  4. If possible, rewrite git history. Rewriting git history is not a trivial act. You might completely break other contributing developers' workflow and you risk accidentally deleting legitimate data.

To avoid such incidents in the future consider


🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants