Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Inter-process communication #585

Merged
merged 459 commits into from
Dec 23, 2024
Merged

Inter-process communication #585

merged 459 commits into from
Dec 23, 2024

Conversation

tmpfs
Copy link
Collaborator

@tmpfs tmpfs commented Oct 29, 2024

  • Handle errors
  • Handle timeouts
  • TypeScript definitions
    • IpcResponse
    • DocumentView
  • Support opening links in native bridge
  • Support querying GUI app status (check the file lock)
  • Support querying IPC status, ping/pong
  • Lock request can have optional address, when none lock all accounts

Closes #561 and closes #588.

@tmpfs tmpfs self-assigned this Oct 29, 2024
@tmpfs tmpfs changed the title Initial ipc crate and TCP-based channel. Inter-process communication Oct 30, 2024
tmpfs added 27 commits December 19, 2024 15:27
And send a RESET_CONTENT HTTP message over stdout in the extension
helper.
The variable must be set at compile time and debug_assertions must be
enabled.
So that RESET_CONTENT notifications only reflect the latest changes
correctly.
Write AccountEvent and WriteEvent by hand due to the typeshare
limitations.
So that the extension when responding to reset content events loads the
up to date secret information.
When serde sees a tuple enum variant with two entries but the last one
is set to skip then it encodes as an array of one item, however in the
case of WriteEvent::DeleteSecret it's a single item and the containing
array is skipped. I suspect because it is serialized using the new type
logic.
Need to reload the vault before updating the search index when
responding to external changes in the extension helper.
Needs work to debug why the channel is being closed prematurely.
Watch the identity event log for changes rather than the account events
because changes to the account events would fire earlier than changes
to the identity folder making it hard to reconcile when the new folder
password would have been saved in the identity folder.

By watching the identity folder event log instead we know that we can
reload the identity folder to access the new folder password which is
required to make watching work well when new secrets are created within
a new folder.
The notify-types crate has already been updated to use web-time but we
need a new release on crates.io to be able to remove the dependency on
instant from the dependency tree.
@tmpfs tmpfs merged commit fdd01d7 into main Dec 23, 2024
3 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Integrate prometheus with the self hosted server IPC Framework
1 participant