Implements Phases 1-8 of the TFTSR implementation plan. Rust backend (Tauri 2.x, src-tauri/): - Multi-provider AI: OpenAI-compatible, Anthropic, Gemini, Mistral, Ollama - PII detection engine: 11 regex patterns with overlap resolution - SQLCipher AES-256 encrypted database with 10 versioned migrations - 28 Tauri IPC commands for triage, analysis, document, and system ops - Ollama: hardware probe, model recommendations, pull/delete with events - RCA and blameless post-mortem Markdown document generators - PDF export via printpdf - Audit log: SHA-256 hash of every external data send - Integration stubs for Confluence, ServiceNow, Azure DevOps (v0.2) Frontend (React 18 + TypeScript + Vite, src/): - 9 pages: full triage workflow NewIssue→LogUpload→Triage→Resolution→RCA→Postmortem→History+Settings - 7 components: ChatWindow, TriageProgress, PiiDiffViewer, DocEditor, HardwareReport, ModelSelector, UI primitives - 3 Zustand stores: session, settings (persisted), history - Type-safe tauriCommands.ts matching Rust backend types exactly - 8 IT domain system prompts (Linux, Windows, Network, K8s, DB, Virt, HW, Obs) DevOps: - .woodpecker/test.yml: rustfmt, clippy, cargo test, tsc, vitest on every push - .woodpecker/release.yml: linux/amd64 + linux/arm64 builds, Gogs release upload Verified: - cargo check: zero errors - tsc --noEmit: zero errors - vitest run: 13/13 unit tests passing Co-Authored-By: Claude Sonnet 4.6 (1M context) <noreply@anthropic.com>
90 lines
2.2 KiB
JavaScript
90 lines
2.2 KiB
JavaScript
import {once, on} from 'node:events';
|
|
import {validateIpcMethod, disconnect, getStrictResponseError} from './validation.js';
|
|
import {getIpcEmitter, isConnected} from './forward.js';
|
|
import {addReference, removeReference} from './reference.js';
|
|
|
|
// Like `[sub]process.on('message')` but promise-based
|
|
export const getEachMessage = ({anyProcess, channel, isSubprocess, ipc}, {reference = true} = {}) => loopOnMessages({
|
|
anyProcess,
|
|
channel,
|
|
isSubprocess,
|
|
ipc,
|
|
shouldAwait: !isSubprocess,
|
|
reference,
|
|
});
|
|
|
|
// Same but used internally
|
|
export const loopOnMessages = ({anyProcess, channel, isSubprocess, ipc, shouldAwait, reference}) => {
|
|
validateIpcMethod({
|
|
methodName: 'getEachMessage',
|
|
isSubprocess,
|
|
ipc,
|
|
isConnected: isConnected(anyProcess),
|
|
});
|
|
|
|
addReference(channel, reference);
|
|
const ipcEmitter = getIpcEmitter(anyProcess, channel, isSubprocess);
|
|
const controller = new AbortController();
|
|
const state = {};
|
|
stopOnDisconnect(anyProcess, ipcEmitter, controller);
|
|
abortOnStrictError({
|
|
ipcEmitter,
|
|
isSubprocess,
|
|
controller,
|
|
state,
|
|
});
|
|
return iterateOnMessages({
|
|
anyProcess,
|
|
channel,
|
|
ipcEmitter,
|
|
isSubprocess,
|
|
shouldAwait,
|
|
controller,
|
|
state,
|
|
reference,
|
|
});
|
|
};
|
|
|
|
const stopOnDisconnect = async (anyProcess, ipcEmitter, controller) => {
|
|
try {
|
|
await once(ipcEmitter, 'disconnect', {signal: controller.signal});
|
|
controller.abort();
|
|
} catch {}
|
|
};
|
|
|
|
const abortOnStrictError = async ({ipcEmitter, isSubprocess, controller, state}) => {
|
|
try {
|
|
const [error] = await once(ipcEmitter, 'strict:error', {signal: controller.signal});
|
|
state.error = getStrictResponseError(error, isSubprocess);
|
|
controller.abort();
|
|
} catch {}
|
|
};
|
|
|
|
const iterateOnMessages = async function * ({anyProcess, channel, ipcEmitter, isSubprocess, shouldAwait, controller, state, reference}) {
|
|
try {
|
|
for await (const [message] of on(ipcEmitter, 'message', {signal: controller.signal})) {
|
|
throwIfStrictError(state);
|
|
yield message;
|
|
}
|
|
} catch {
|
|
throwIfStrictError(state);
|
|
} finally {
|
|
controller.abort();
|
|
removeReference(channel, reference);
|
|
|
|
if (!isSubprocess) {
|
|
disconnect(anyProcess);
|
|
}
|
|
|
|
if (shouldAwait) {
|
|
await anyProcess;
|
|
}
|
|
}
|
|
};
|
|
|
|
const throwIfStrictError = ({error}) => {
|
|
if (error) {
|
|
throw error;
|
|
}
|
|
};
|