-
Notifications
You must be signed in to change notification settings - Fork 794
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Target Directories from Ransomware plugin are broken #4000
Comments
The problem started when we updated the plugin build script to generate the config schema based on the options model. Before this, the schemas were generated manually. Now the build script uses pydantic's model_json_schema to generate the schema. The ransomware target directory options are nullable types. The manually generated schema modeled this by using Pydantic issue discussing |
Potential solutions:
|
Sounds like #1 is perhaps the best approach. There may be other reasons in the future we would want a custom schema. Let's just make sure the build script prints a visible warning (use colors if possible) that warns when the schema is not regenerated. |
|
Describe the bug
Some package updates happened in the UI, possibly leading to target directories being shown as options in the Ransomware plugin. This could be happening in other plugins as well.
To Reproduce
Steps to reproduce the behavior:
Expected behavior
It should be an input, not an option.
Screenshots
It seems that it has something to do with how the field is represented in the options. We have Optional field with a default value of None. If we remove the Optional part then:

If we leave the Optional part and add a different default value:

I am guessing Optional means Option? 😄
Machine version (please complete the following information):
The text was updated successfully, but these errors were encountered: