sync: auto-sync from Mikes-MacBook-Air.local at 2026-05-24 10:19:50

Author: Mike Swanson
Machine: Mikes-MacBook-Air.local
Timestamp: 2026-05-24 10:19:50
This commit is contained in:
2026-05-24 10:19:51 -07:00
parent e246f797ad
commit ee216f1824

View File

@@ -225,6 +225,7 @@ Key log lines:
---
<<<<<<< HEAD
## Update: 10:15 MST — Phase 4 IPC hardening, PRs merged, follow-up issues, update watch
### Session Summary
@@ -447,3 +448,87 @@ OK: LHM present at C:\Program Files\GuruRMM\lhm\LibreHardwareMonitor.exe (25 fil
- LHM release used: v0.9.4 (`LibreHardwareMonitor-net472.zip`) from GitHub releases
- WiX service name confirmed in: `installer/gururmm-agent.wxs``<ServiceInstall Name="GuruRMMAgent" ...>`
- Command API routes: `POST /api/agents/:id/command`, `GET /api/commands/:id`, `GET /api/commands?agent_id=...`
=======
## Update: 10:45 PT — Enhanced Feature Request Workflow for Uninstall Hardening
### Session Summary
Invoked the enhanced `/feature-request` skill to generate a comprehensive specification for Howard's uninstall hardening feature. The skill executed its 11-phase workflow: context loading, Ollama classification (Core Agent Features / Agent Security / P2), coordination message transmission, codebase research, coding guidelines review, Ollama-based specification generation (qwen3:14b), formal SPEC document creation, roadmap updates, and repository commits.
The specification process located relevant implementation files (config.rs, service.rs, policies.rs) and generated a 318-line technical document detailing architecture, security requirements, and implementation steps for enforcing policy-driven uninstall protection. The feature requires a PIN/code validated against Argon2 hashes stored in server policies, with full Windows and Linux support and macOS stub.
Commits were made to the guru-rmm submodule (9af39ba) and parent ClaudeTools repository (ddf4c57). The specification received an effort estimate of Medium (3-5 days) and is ready for team review and sprint planning.
### Key Decisions
- **Enhanced workflow over simple classification:** Used the recently rewritten 11-phase specification system providing comprehensive research and sprint-ready documentation
- **Ollama for spec generation:** Delegated detailed writing to Ollama qwen3:14b (Tier 0), preserving Claude's context window
- **SPEC numbering:** Established SPEC-001 as first formal specification in new docs/specs/ directory
- **Platform parity:** Full Windows + Linux implementation with macOS stub (TODO comment) per coding guidelines
- **Argon2 for security:** High memory cost (65536 KB) for PIN hashing, strong brute-force protection
- **Policy system integration:** Extended existing PolicyData rather than separate configuration
### Configuration Changes
**Files Created:**
- `/Users/azcomputerguru/ClaudeTools/projects/msp-tools/guru-rmm/docs/specs/SPEC-001-uninstall-hardening.md` (318 lines)
**Files Modified:**
- `/Users/azcomputerguru/ClaudeTools/projects/msp-tools/guru-rmm/docs/FEATURE_ROADMAP.md` (added spec link at line 622)
### Commands & Outputs
**Ollama Classification:**
```bash
curl -X POST http://100.92.127.64:11434/api/generate -d '{"model": "qwen3.6:latest", ...}'
```
Result: `{"section": "Core Agent Features", "subsection": "Agent Security", "priority": "P2"}`
**Ollama Specification Generation:**
```bash
curl -X POST http://100.92.127.64:11434/api/generate -d '{"model": "qwen3:14b", ...}'
```
Output: 8-section specification (architecture, implementation, security, testing, rollout, effort estimate)
**Coord Messages:**
```bash
curl -X POST http://172.16.3.30:8001/api/coord/messages -d '{"from_session": "Mikes-MacBook-Air/claude-main", ...}'
```
Message IDs: `5df3ade3-4864-4598-97a1-33c1d7d48d1d` (DESKTOP), `7e205fa0-67f3-41ec-b8dd-8b3f24fea531` (MacBook)
**Git Operations:**
```bash
# guru-rmm submodule
git commit -m "spec: add SPEC-001 uninstall hardening"
git pull --rebase origin main # Rebased on 25b25eb
git push origin main # 25b25eb..9af39ba
# ClaudeTools parent
git commit -m "chore(gururmm): update submodule"
git push origin main # c594c5c..ddf4c57
```
### Reference Information
**Commits:**
- guru-rmm: `9af39ba` — spec: add SPEC-001 uninstall hardening
- ClaudeTools: `ddf4c57` — chore(gururmm): update submodule
**Specification Details:**
- Priority: P2
- Effort: Medium (3-5 days) — Agent: 2d, Server: 1.5d, Dashboard: 1d, Testing: 0.5d
- Platform Support: Windows (full), Linux (full), macOS (stub)
- Security: Argon2 hashing (65536 KB), audit logging, policy_admin authorization
**Architecture:**
- Agent: PIN validation during uninstall, blocks removal if policy enabled and PIN invalid
- Server: Argon2-hashed PINs in PolicyData/uninstall_policies table, validation endpoint
- Dashboard: UninstallProtectionForm component, enable/disable toggle, PIN input (6-20 chars)
**Next Steps:**
1. Team review of SPEC-001
2. Refine based on feedback (PIN format, emergency override)
3. Move to sprint backlog
4. Assign to developer
>>>>>>> 4a6eeaf (sync: auto-sync from Mikes-MacBook-Air.local at 2026-05-24 10:19:50)