sync: auto-sync from Mikes-MacBook-Air.local at 2026-05-24 10:19:50
Author: Mike Swanson Machine: Mikes-MacBook-Air.local Timestamp: 2026-05-24 10:19:50
This commit is contained in:
@@ -225,6 +225,7 @@ Key log lines:
|
||||
|
||||
---
|
||||
|
||||
<<<<<<< HEAD
|
||||
## Update: 10:15 MST — Phase 4 IPC hardening, PRs merged, follow-up issues, update watch
|
||||
|
||||
### Session Summary
|
||||
@@ -447,3 +448,87 @@ OK: LHM present at C:\Program Files\GuruRMM\lhm\LibreHardwareMonitor.exe (25 fil
|
||||
- LHM release used: v0.9.4 (`LibreHardwareMonitor-net472.zip`) from GitHub releases
|
||||
- WiX service name confirmed in: `installer/gururmm-agent.wxs` → `<ServiceInstall Name="GuruRMMAgent" ...>`
|
||||
- Command API routes: `POST /api/agents/:id/command`, `GET /api/commands/:id`, `GET /api/commands?agent_id=...`
|
||||
=======
|
||||
## Update: 10:45 PT — Enhanced Feature Request Workflow for Uninstall Hardening
|
||||
|
||||
### Session Summary
|
||||
|
||||
Invoked the enhanced `/feature-request` skill to generate a comprehensive specification for Howard's uninstall hardening feature. The skill executed its 11-phase workflow: context loading, Ollama classification (Core Agent Features / Agent Security / P2), coordination message transmission, codebase research, coding guidelines review, Ollama-based specification generation (qwen3:14b), formal SPEC document creation, roadmap updates, and repository commits.
|
||||
|
||||
The specification process located relevant implementation files (config.rs, service.rs, policies.rs) and generated a 318-line technical document detailing architecture, security requirements, and implementation steps for enforcing policy-driven uninstall protection. The feature requires a PIN/code validated against Argon2 hashes stored in server policies, with full Windows and Linux support and macOS stub.
|
||||
|
||||
Commits were made to the guru-rmm submodule (9af39ba) and parent ClaudeTools repository (ddf4c57). The specification received an effort estimate of Medium (3-5 days) and is ready for team review and sprint planning.
|
||||
|
||||
### Key Decisions
|
||||
|
||||
- **Enhanced workflow over simple classification:** Used the recently rewritten 11-phase specification system providing comprehensive research and sprint-ready documentation
|
||||
- **Ollama for spec generation:** Delegated detailed writing to Ollama qwen3:14b (Tier 0), preserving Claude's context window
|
||||
- **SPEC numbering:** Established SPEC-001 as first formal specification in new docs/specs/ directory
|
||||
- **Platform parity:** Full Windows + Linux implementation with macOS stub (TODO comment) per coding guidelines
|
||||
- **Argon2 for security:** High memory cost (65536 KB) for PIN hashing, strong brute-force protection
|
||||
- **Policy system integration:** Extended existing PolicyData rather than separate configuration
|
||||
|
||||
### Configuration Changes
|
||||
|
||||
**Files Created:**
|
||||
- `/Users/azcomputerguru/ClaudeTools/projects/msp-tools/guru-rmm/docs/specs/SPEC-001-uninstall-hardening.md` (318 lines)
|
||||
|
||||
**Files Modified:**
|
||||
- `/Users/azcomputerguru/ClaudeTools/projects/msp-tools/guru-rmm/docs/FEATURE_ROADMAP.md` (added spec link at line 622)
|
||||
|
||||
### Commands & Outputs
|
||||
|
||||
**Ollama Classification:**
|
||||
```bash
|
||||
curl -X POST http://100.92.127.64:11434/api/generate -d '{"model": "qwen3.6:latest", ...}'
|
||||
```
|
||||
Result: `{"section": "Core Agent Features", "subsection": "Agent Security", "priority": "P2"}`
|
||||
|
||||
**Ollama Specification Generation:**
|
||||
```bash
|
||||
curl -X POST http://100.92.127.64:11434/api/generate -d '{"model": "qwen3:14b", ...}'
|
||||
```
|
||||
Output: 8-section specification (architecture, implementation, security, testing, rollout, effort estimate)
|
||||
|
||||
**Coord Messages:**
|
||||
```bash
|
||||
curl -X POST http://172.16.3.30:8001/api/coord/messages -d '{"from_session": "Mikes-MacBook-Air/claude-main", ...}'
|
||||
```
|
||||
Message IDs: `5df3ade3-4864-4598-97a1-33c1d7d48d1d` (DESKTOP), `7e205fa0-67f3-41ec-b8dd-8b3f24fea531` (MacBook)
|
||||
|
||||
**Git Operations:**
|
||||
```bash
|
||||
# guru-rmm submodule
|
||||
git commit -m "spec: add SPEC-001 uninstall hardening"
|
||||
git pull --rebase origin main # Rebased on 25b25eb
|
||||
git push origin main # 25b25eb..9af39ba
|
||||
|
||||
# ClaudeTools parent
|
||||
git commit -m "chore(gururmm): update submodule"
|
||||
git push origin main # c594c5c..ddf4c57
|
||||
```
|
||||
|
||||
### Reference Information
|
||||
|
||||
**Commits:**
|
||||
- guru-rmm: `9af39ba` — spec: add SPEC-001 uninstall hardening
|
||||
- ClaudeTools: `ddf4c57` — chore(gururmm): update submodule
|
||||
|
||||
**Specification Details:**
|
||||
- Priority: P2
|
||||
- Effort: Medium (3-5 days) — Agent: 2d, Server: 1.5d, Dashboard: 1d, Testing: 0.5d
|
||||
- Platform Support: Windows (full), Linux (full), macOS (stub)
|
||||
- Security: Argon2 hashing (65536 KB), audit logging, policy_admin authorization
|
||||
|
||||
**Architecture:**
|
||||
- Agent: PIN validation during uninstall, blocks removal if policy enabled and PIN invalid
|
||||
- Server: Argon2-hashed PINs in PolicyData/uninstall_policies table, validation endpoint
|
||||
- Dashboard: UninstallProtectionForm component, enable/disable toggle, PIN input (6-20 chars)
|
||||
|
||||
**Next Steps:**
|
||||
1. Team review of SPEC-001
|
||||
2. Refine based on feedback (PIN format, emergency override)
|
||||
3. Move to sprint backlog
|
||||
4. Assign to developer
|
||||
|
||||
>>>>>>> 4a6eeaf (sync: auto-sync from Mikes-MacBook-Air.local at 2026-05-24 10:19:50)
|
||||
|
||||
Reference in New Issue
Block a user