Implements Phases 1-8 of the TFTSR implementation plan. Rust backend (Tauri 2.x, src-tauri/): - Multi-provider AI: OpenAI-compatible, Anthropic, Gemini, Mistral, Ollama - PII detection engine: 11 regex patterns with overlap resolution - SQLCipher AES-256 encrypted database with 10 versioned migrations - 28 Tauri IPC commands for triage, analysis, document, and system ops - Ollama: hardware probe, model recommendations, pull/delete with events - RCA and blameless post-mortem Markdown document generators - PDF export via printpdf - Audit log: SHA-256 hash of every external data send - Integration stubs for Confluence, ServiceNow, Azure DevOps (v0.2) Frontend (React 18 + TypeScript + Vite, src/): - 9 pages: full triage workflow NewIssue→LogUpload→Triage→Resolution→RCA→Postmortem→History+Settings - 7 components: ChatWindow, TriageProgress, PiiDiffViewer, DocEditor, HardwareReport, ModelSelector, UI primitives - 3 Zustand stores: session, settings (persisted), history - Type-safe tauriCommands.ts matching Rust backend types exactly - 8 IT domain system prompts (Linux, Windows, Network, K8s, DB, Virt, HW, Obs) DevOps: - .woodpecker/test.yml: rustfmt, clippy, cargo test, tsc, vitest on every push - .woodpecker/release.yml: linux/amd64 + linux/arm64 builds, Gogs release upload Verified: - cargo check: zero errors - tsc --noEmit: zero errors - vitest run: 13/13 unit tests passing Co-Authored-By: Claude Sonnet 4.6 (1M context) <noreply@anthropic.com>
92 lines
2.3 KiB
JavaScript
92 lines
2.3 KiB
JavaScript
import {promisify} from 'node:util';
|
|
import {
|
|
validateIpcMethod,
|
|
handleEpipeError,
|
|
handleSerializationError,
|
|
disconnect,
|
|
} from './validation.js';
|
|
import {startSendMessage, endSendMessage} from './outgoing.js';
|
|
import {handleSendStrict, waitForStrictResponse} from './strict.js';
|
|
|
|
// Like `[sub]process.send()` but promise-based.
|
|
// We do not `await subprocess` during `.sendMessage()` nor `.getOneMessage()` since those methods are transient.
|
|
// Users would still need to `await subprocess` after the method is done.
|
|
// Also, this would prevent `unhandledRejection` event from being emitted, making it silent.
|
|
export const sendMessage = ({anyProcess, channel, isSubprocess, ipc}, message, {strict = false} = {}) => {
|
|
const methodName = 'sendMessage';
|
|
validateIpcMethod({
|
|
methodName,
|
|
isSubprocess,
|
|
ipc,
|
|
isConnected: anyProcess.connected,
|
|
});
|
|
|
|
return sendMessageAsync({
|
|
anyProcess,
|
|
channel,
|
|
methodName,
|
|
isSubprocess,
|
|
message,
|
|
strict,
|
|
});
|
|
};
|
|
|
|
const sendMessageAsync = async ({anyProcess, channel, methodName, isSubprocess, message, strict}) => {
|
|
const wrappedMessage = handleSendStrict({
|
|
anyProcess,
|
|
channel,
|
|
isSubprocess,
|
|
message,
|
|
strict,
|
|
});
|
|
const outgoingMessagesState = startSendMessage(anyProcess, wrappedMessage, strict);
|
|
try {
|
|
await sendOneMessage({
|
|
anyProcess,
|
|
methodName,
|
|
isSubprocess,
|
|
wrappedMessage,
|
|
message,
|
|
});
|
|
} catch (error) {
|
|
disconnect(anyProcess);
|
|
throw error;
|
|
} finally {
|
|
endSendMessage(outgoingMessagesState);
|
|
}
|
|
};
|
|
|
|
// Used internally by `cancelSignal`
|
|
export const sendOneMessage = async ({anyProcess, methodName, isSubprocess, wrappedMessage, message}) => {
|
|
const sendMethod = getSendMethod(anyProcess);
|
|
|
|
try {
|
|
await Promise.all([
|
|
waitForStrictResponse(wrappedMessage, anyProcess, isSubprocess),
|
|
sendMethod(wrappedMessage),
|
|
]);
|
|
} catch (error) {
|
|
handleEpipeError({error, methodName, isSubprocess});
|
|
handleSerializationError({
|
|
error,
|
|
methodName,
|
|
isSubprocess,
|
|
message,
|
|
});
|
|
throw error;
|
|
}
|
|
};
|
|
|
|
// [sub]process.send() promisified, memoized
|
|
const getSendMethod = anyProcess => {
|
|
if (PROCESS_SEND_METHODS.has(anyProcess)) {
|
|
return PROCESS_SEND_METHODS.get(anyProcess);
|
|
}
|
|
|
|
const sendMethod = promisify(anyProcess.send.bind(anyProcess));
|
|
PROCESS_SEND_METHODS.set(anyProcess, sendMethod);
|
|
return sendMethod;
|
|
};
|
|
|
|
const PROCESS_SEND_METHODS = new WeakMap();
|