* feat: add security logging and fix framework regressions This commit implements comprehensive security event logging and resolves critical regressions in the core framework. Security Logging: - Enhanced `pkg/log` with a `Security` level and helper. - Added `log.Username()` to consistently identify the executing user. - Instrumented GitHub CLI auth, Agentic configuration, filesystem sandbox, MCP handlers, and MCP TCP transport with security logs. - Added `SecurityStyle` to the CLI for consistent visual representation of security events. UniFi Security (CodeQL): - Refactored `pkg/unifi` to remove hardcoded `InsecureSkipVerify`, resolving a high-severity alert. - Added a `--verify-tls` flag and configuration option to control TLS verification. - Updated command handlers to support the new verification parameter. Framework Fixes: - Restored original signatures for `MustServiceFor`, `Config()`, and `Display()` in `pkg/framework/core`, which had been corrupted during a merge. - Fixed `pkg/framework/framework.go` and `pkg/framework/core/runtime_pkg.go` to match the restored signatures. - These fixes resolve project-wide compilation errors caused by the signature mismatches. I encountered significant blockers due to a corrupted state of the `dev` branch after a merge, which introduced breaking changes in the core framework's DI system. I had to manually reconcile these signatures with the expected usage across the codebase to restore build stability. * feat(mcp): add RAG tools (query, ingest, collections) Add vector database tools to the MCP server for RAG operations: - rag_query: Search for relevant documentation using semantic similarity - rag_ingest: Ingest files or directories into the vector database - rag_collections: List available collections Uses existing internal/cmd/rag exports (QueryDocs, IngestDirectory, IngestFile) and pkg/rag for Qdrant client access. Default collection is "hostuk-docs" with topK=5 for queries. Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com> * feat(mcp): add metrics tools (record, query) Add MCP tools for recording and querying AI/security metrics events. The metrics_record tool writes events to daily JSONL files, and the metrics_query tool provides aggregated statistics by type, repo, and agent. Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com> * feat: add 'core mcp serve' command Add CLI command to start the MCP server for AI tool integration. - Create internal/cmd/mcpcmd package with serve subcommand - Support --workspace flag for directory restriction - Handle SIGINT/SIGTERM for clean shutdown - Register in full.go build variant Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com> * feat(ws): add WebSocket hub package for real-time streaming Add pkg/ws package implementing a hub pattern for WebSocket connections: - Hub manages client connections, broadcasts, and channel subscriptions - Client struct represents connected WebSocket clients - Message types: process_output, process_status, event, error, ping/pong - Channel-based subscription system (subscribe/unsubscribe) - SendProcessOutput and SendProcessStatus for process streaming integration - Full test coverage including concurrency tests Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com> * feat(mcp): add process management and WebSocket MCP tools Add MCP tools for process management: - process_start: Start a new external process - process_stop: Gracefully stop a running process - process_kill: Force kill a process - process_list: List all managed processes - process_output: Get captured process output - process_input: Send input to process stdin Add MCP tools for WebSocket: - ws_start: Start WebSocket server for real-time streaming - ws_info: Get hub statistics (clients, channels) Update Service struct with optional process.Service and ws.Hub fields, new WithProcessService and WithWSHub options, getter methods, and Shutdown method for cleanup. Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com> * feat(webview): add browser automation package via Chrome DevTools Protocol Add pkg/webview package for browser automation: - webview.go: Main interface with Connect, Navigate, Click, Type, QuerySelector, Screenshot, Evaluate - cdp.go: Chrome DevTools Protocol WebSocket client implementation - actions.go: DOM action types (Click, Type, Hover, Scroll, etc.) and ActionSequence builder - console.go: Console message capture and filtering with ConsoleWatcher and ExceptionWatcher - angular.go: Angular-specific helpers for router navigation, component access, and Zone.js stability Add MCP tools for webview: - webview_connect/disconnect: Connection management - webview_navigate: Page navigation - webview_click/type/query/wait: DOM interaction - webview_console: Console output capture - webview_eval: JavaScript execution - webview_screenshot: Screenshot capture Add documentation: - docs/mcp/angular-testing.md: Guide for Angular application testing Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com> * docs: document new packages and BugSETI application - Update CLAUDE.md with documentation for: - pkg/ws (WebSocket hub for real-time streaming) - pkg/webview (Browser automation via CDP) - pkg/mcp (MCP server tools: process, ws, webview) - BugSETI application overview - Add comprehensive README for BugSETI with: - Installation and configuration guide - Usage workflow documentation - Architecture overview - Contributing guidelines Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com> * feat(bugseti): add BugSETI system tray app with auto-update BugSETI - Distributed Bug Fixing like SETI@home but for code Features: - System tray app with Wails v3 - GitHub issue fetching with label filters - Issue queue with priority management - AI context seeding via seed-agent-developer skill - Automated PR submission flow - Stats tracking and leaderboard - Cross-platform notifications - Self-updating with stable/beta/nightly channels Includes: - cmd/bugseti: Main application with Angular frontend - internal/bugseti: Core services (fetcher, queue, seeder, submit, config, stats, notify) - internal/bugseti/updater: Auto-update system (checker, downloader, installer) - .github/workflows/bugseti-release.yml: CI/CD for all platforms Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com> * fix: resolve import cycle and code duplication - Remove pkg/log import from pkg/io/local to break import cycle (pkg/log/rotation.go imports pkg/io, creating circular dependency) - Use stderr logging for security events in sandbox escape detection - Remove unused sync/atomic import from core.go - Fix duplicate LogSecurity function declarations in cli/log.go - Update workspace/service.go Crypt() call to match interface Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com> * fix: update tests for new function signatures and format code - Update core_test.go: Config(), Display() now panic instead of returning error - Update runtime_pkg_test.go: sr.Config() now panics instead of returning error - Update MustServiceFor tests to use assert.Panics - Format BugSETI, MCP tools, and webview packages with gofmt Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com> --------- Co-authored-by: Snider <631881+Snider@users.noreply.github.com> Co-authored-by: Claude <developers@lethean.io> Co-authored-by: Claude Opus 4.5 <noreply@anthropic.com>
504 lines
13 KiB
Go
504 lines
13 KiB
Go
// Package bugseti provides services for the BugSETI distributed bug fixing application.
|
|
package bugseti
|
|
|
|
import (
|
|
"encoding/json"
|
|
"log"
|
|
"os"
|
|
"path/filepath"
|
|
"sync"
|
|
"time"
|
|
)
|
|
|
|
// ConfigService manages application configuration and persistence.
|
|
type ConfigService struct {
|
|
config *Config
|
|
path string
|
|
mu sync.RWMutex
|
|
}
|
|
|
|
// Config holds all BugSETI configuration.
|
|
type Config struct {
|
|
// Authentication
|
|
GitHubToken string `json:"githubToken,omitempty"`
|
|
|
|
// Repositories
|
|
WatchedRepos []string `json:"watchedRepos"`
|
|
Labels []string `json:"labels"`
|
|
|
|
// Scheduling
|
|
WorkHours *WorkHours `json:"workHours,omitempty"`
|
|
FetchInterval int `json:"fetchIntervalMinutes"`
|
|
|
|
// Notifications
|
|
NotificationsEnabled bool `json:"notificationsEnabled"`
|
|
NotificationSound bool `json:"notificationSound"`
|
|
|
|
// Workspace
|
|
WorkspaceDir string `json:"workspaceDir,omitempty"`
|
|
DataDir string `json:"dataDir,omitempty"`
|
|
|
|
// Onboarding
|
|
Onboarded bool `json:"onboarded"`
|
|
OnboardedAt time.Time `json:"onboardedAt,omitempty"`
|
|
|
|
// UI Preferences
|
|
Theme string `json:"theme"`
|
|
ShowTrayPanel bool `json:"showTrayPanel"`
|
|
|
|
// Advanced
|
|
MaxConcurrentIssues int `json:"maxConcurrentIssues"`
|
|
AutoSeedContext bool `json:"autoSeedContext"`
|
|
|
|
// Updates
|
|
UpdateChannel string `json:"updateChannel"` // stable, beta, nightly
|
|
AutoUpdate bool `json:"autoUpdate"` // Automatically install updates
|
|
UpdateCheckInterval int `json:"updateCheckInterval"` // Check interval in hours (0 = disabled)
|
|
LastUpdateCheck time.Time `json:"lastUpdateCheck,omitempty"`
|
|
}
|
|
|
|
// WorkHours defines when BugSETI should actively fetch issues.
|
|
type WorkHours struct {
|
|
Enabled bool `json:"enabled"`
|
|
StartHour int `json:"startHour"` // 0-23
|
|
EndHour int `json:"endHour"` // 0-23
|
|
Days []int `json:"days"` // 0=Sunday, 6=Saturday
|
|
Timezone string `json:"timezone"`
|
|
}
|
|
|
|
// NewConfigService creates a new ConfigService with default values.
|
|
func NewConfigService() *ConfigService {
|
|
// Determine config path
|
|
configDir, err := os.UserConfigDir()
|
|
if err != nil {
|
|
configDir = filepath.Join(os.Getenv("HOME"), ".config")
|
|
}
|
|
|
|
bugsetiDir := filepath.Join(configDir, "bugseti")
|
|
if err := os.MkdirAll(bugsetiDir, 0755); err != nil {
|
|
log.Printf("Warning: could not create config directory: %v", err)
|
|
}
|
|
|
|
return &ConfigService{
|
|
path: filepath.Join(bugsetiDir, "config.json"),
|
|
config: &Config{
|
|
WatchedRepos: []string{},
|
|
Labels: []string{
|
|
"good first issue",
|
|
"help wanted",
|
|
"beginner-friendly",
|
|
},
|
|
FetchInterval: 15,
|
|
NotificationsEnabled: true,
|
|
NotificationSound: true,
|
|
Theme: "dark",
|
|
ShowTrayPanel: true,
|
|
MaxConcurrentIssues: 1,
|
|
AutoSeedContext: true,
|
|
DataDir: bugsetiDir,
|
|
UpdateChannel: "stable",
|
|
AutoUpdate: false,
|
|
UpdateCheckInterval: 6, // Check every 6 hours
|
|
},
|
|
}
|
|
}
|
|
|
|
// ServiceName returns the service name for Wails.
|
|
func (c *ConfigService) ServiceName() string {
|
|
return "ConfigService"
|
|
}
|
|
|
|
// Load reads the configuration from disk.
|
|
func (c *ConfigService) Load() error {
|
|
c.mu.Lock()
|
|
defer c.mu.Unlock()
|
|
|
|
data, err := os.ReadFile(c.path)
|
|
if err != nil {
|
|
if os.IsNotExist(err) {
|
|
// No config file yet, use defaults
|
|
return c.saveUnsafe()
|
|
}
|
|
return err
|
|
}
|
|
|
|
var config Config
|
|
if err := json.Unmarshal(data, &config); err != nil {
|
|
return err
|
|
}
|
|
|
|
// Merge with defaults for any new fields
|
|
c.mergeDefaults(&config)
|
|
c.config = &config
|
|
return nil
|
|
}
|
|
|
|
// Save persists the configuration to disk.
|
|
func (c *ConfigService) Save() error {
|
|
c.mu.Lock()
|
|
defer c.mu.Unlock()
|
|
return c.saveUnsafe()
|
|
}
|
|
|
|
// saveUnsafe writes config without acquiring lock.
|
|
func (c *ConfigService) saveUnsafe() error {
|
|
data, err := json.MarshalIndent(c.config, "", " ")
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return os.WriteFile(c.path, data, 0644)
|
|
}
|
|
|
|
// mergeDefaults fills in default values for any unset fields.
|
|
func (c *ConfigService) mergeDefaults(config *Config) {
|
|
if config.Labels == nil || len(config.Labels) == 0 {
|
|
config.Labels = c.config.Labels
|
|
}
|
|
if config.FetchInterval == 0 {
|
|
config.FetchInterval = 15
|
|
}
|
|
if config.Theme == "" {
|
|
config.Theme = "dark"
|
|
}
|
|
if config.MaxConcurrentIssues == 0 {
|
|
config.MaxConcurrentIssues = 1
|
|
}
|
|
if config.DataDir == "" {
|
|
config.DataDir = c.config.DataDir
|
|
}
|
|
if config.UpdateChannel == "" {
|
|
config.UpdateChannel = "stable"
|
|
}
|
|
if config.UpdateCheckInterval == 0 {
|
|
config.UpdateCheckInterval = 6
|
|
}
|
|
}
|
|
|
|
// GetConfig returns a copy of the current configuration.
|
|
func (c *ConfigService) GetConfig() Config {
|
|
c.mu.RLock()
|
|
defer c.mu.RUnlock()
|
|
return *c.config
|
|
}
|
|
|
|
// SetConfig updates the configuration and saves it.
|
|
func (c *ConfigService) SetConfig(config Config) error {
|
|
c.mu.Lock()
|
|
defer c.mu.Unlock()
|
|
c.config = &config
|
|
return c.saveUnsafe()
|
|
}
|
|
|
|
// GetWatchedRepos returns the list of watched repositories.
|
|
func (c *ConfigService) GetWatchedRepos() []string {
|
|
c.mu.RLock()
|
|
defer c.mu.RUnlock()
|
|
return c.config.WatchedRepos
|
|
}
|
|
|
|
// AddWatchedRepo adds a repository to the watch list.
|
|
func (c *ConfigService) AddWatchedRepo(repo string) error {
|
|
c.mu.Lock()
|
|
defer c.mu.Unlock()
|
|
|
|
for _, r := range c.config.WatchedRepos {
|
|
if r == repo {
|
|
return nil // Already watching
|
|
}
|
|
}
|
|
|
|
c.config.WatchedRepos = append(c.config.WatchedRepos, repo)
|
|
return c.saveUnsafe()
|
|
}
|
|
|
|
// RemoveWatchedRepo removes a repository from the watch list.
|
|
func (c *ConfigService) RemoveWatchedRepo(repo string) error {
|
|
c.mu.Lock()
|
|
defer c.mu.Unlock()
|
|
|
|
for i, r := range c.config.WatchedRepos {
|
|
if r == repo {
|
|
c.config.WatchedRepos = append(c.config.WatchedRepos[:i], c.config.WatchedRepos[i+1:]...)
|
|
return c.saveUnsafe()
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// GetLabels returns the issue labels to filter by.
|
|
func (c *ConfigService) GetLabels() []string {
|
|
c.mu.RLock()
|
|
defer c.mu.RUnlock()
|
|
return c.config.Labels
|
|
}
|
|
|
|
// SetLabels updates the issue labels.
|
|
func (c *ConfigService) SetLabels(labels []string) error {
|
|
c.mu.Lock()
|
|
defer c.mu.Unlock()
|
|
c.config.Labels = labels
|
|
return c.saveUnsafe()
|
|
}
|
|
|
|
// GetFetchInterval returns the fetch interval as a duration.
|
|
func (c *ConfigService) GetFetchInterval() time.Duration {
|
|
c.mu.RLock()
|
|
defer c.mu.RUnlock()
|
|
return time.Duration(c.config.FetchInterval) * time.Minute
|
|
}
|
|
|
|
// SetFetchInterval sets the fetch interval in minutes.
|
|
func (c *ConfigService) SetFetchInterval(minutes int) error {
|
|
c.mu.Lock()
|
|
defer c.mu.Unlock()
|
|
c.config.FetchInterval = minutes
|
|
return c.saveUnsafe()
|
|
}
|
|
|
|
// IsWithinWorkHours checks if the current time is within configured work hours.
|
|
func (c *ConfigService) IsWithinWorkHours() bool {
|
|
c.mu.RLock()
|
|
defer c.mu.RUnlock()
|
|
|
|
if c.config.WorkHours == nil || !c.config.WorkHours.Enabled {
|
|
return true // No work hours restriction
|
|
}
|
|
|
|
wh := c.config.WorkHours
|
|
now := time.Now()
|
|
|
|
// Check timezone
|
|
if wh.Timezone != "" {
|
|
loc, err := time.LoadLocation(wh.Timezone)
|
|
if err == nil {
|
|
now = now.In(loc)
|
|
}
|
|
}
|
|
|
|
// Check day
|
|
day := int(now.Weekday())
|
|
dayAllowed := false
|
|
for _, d := range wh.Days {
|
|
if d == day {
|
|
dayAllowed = true
|
|
break
|
|
}
|
|
}
|
|
if !dayAllowed {
|
|
return false
|
|
}
|
|
|
|
// Check hour
|
|
hour := now.Hour()
|
|
if wh.StartHour <= wh.EndHour {
|
|
return hour >= wh.StartHour && hour < wh.EndHour
|
|
}
|
|
// Handle overnight (e.g., 22:00 - 06:00)
|
|
return hour >= wh.StartHour || hour < wh.EndHour
|
|
}
|
|
|
|
// GetWorkHours returns the work hours configuration.
|
|
func (c *ConfigService) GetWorkHours() *WorkHours {
|
|
c.mu.RLock()
|
|
defer c.mu.RUnlock()
|
|
return c.config.WorkHours
|
|
}
|
|
|
|
// SetWorkHours updates the work hours configuration.
|
|
func (c *ConfigService) SetWorkHours(wh *WorkHours) error {
|
|
c.mu.Lock()
|
|
defer c.mu.Unlock()
|
|
c.config.WorkHours = wh
|
|
return c.saveUnsafe()
|
|
}
|
|
|
|
// IsNotificationsEnabled returns whether notifications are enabled.
|
|
func (c *ConfigService) IsNotificationsEnabled() bool {
|
|
c.mu.RLock()
|
|
defer c.mu.RUnlock()
|
|
return c.config.NotificationsEnabled
|
|
}
|
|
|
|
// SetNotificationsEnabled enables or disables notifications.
|
|
func (c *ConfigService) SetNotificationsEnabled(enabled bool) error {
|
|
c.mu.Lock()
|
|
defer c.mu.Unlock()
|
|
c.config.NotificationsEnabled = enabled
|
|
return c.saveUnsafe()
|
|
}
|
|
|
|
// GetWorkspaceDir returns the workspace directory.
|
|
func (c *ConfigService) GetWorkspaceDir() string {
|
|
c.mu.RLock()
|
|
defer c.mu.RUnlock()
|
|
return c.config.WorkspaceDir
|
|
}
|
|
|
|
// SetWorkspaceDir sets the workspace directory.
|
|
func (c *ConfigService) SetWorkspaceDir(dir string) error {
|
|
c.mu.Lock()
|
|
defer c.mu.Unlock()
|
|
c.config.WorkspaceDir = dir
|
|
return c.saveUnsafe()
|
|
}
|
|
|
|
// GetDataDir returns the data directory.
|
|
func (c *ConfigService) GetDataDir() string {
|
|
c.mu.RLock()
|
|
defer c.mu.RUnlock()
|
|
return c.config.DataDir
|
|
}
|
|
|
|
// IsOnboarded returns whether the user has completed onboarding.
|
|
func (c *ConfigService) IsOnboarded() bool {
|
|
c.mu.RLock()
|
|
defer c.mu.RUnlock()
|
|
return c.config.Onboarded
|
|
}
|
|
|
|
// CompleteOnboarding marks onboarding as complete.
|
|
func (c *ConfigService) CompleteOnboarding() error {
|
|
c.mu.Lock()
|
|
defer c.mu.Unlock()
|
|
c.config.Onboarded = true
|
|
c.config.OnboardedAt = time.Now()
|
|
return c.saveUnsafe()
|
|
}
|
|
|
|
// GetTheme returns the current theme.
|
|
func (c *ConfigService) GetTheme() string {
|
|
c.mu.RLock()
|
|
defer c.mu.RUnlock()
|
|
return c.config.Theme
|
|
}
|
|
|
|
// SetTheme sets the theme.
|
|
func (c *ConfigService) SetTheme(theme string) error {
|
|
c.mu.Lock()
|
|
defer c.mu.Unlock()
|
|
c.config.Theme = theme
|
|
return c.saveUnsafe()
|
|
}
|
|
|
|
// IsAutoSeedEnabled returns whether automatic context seeding is enabled.
|
|
func (c *ConfigService) IsAutoSeedEnabled() bool {
|
|
c.mu.RLock()
|
|
defer c.mu.RUnlock()
|
|
return c.config.AutoSeedContext
|
|
}
|
|
|
|
// SetAutoSeedEnabled enables or disables automatic context seeding.
|
|
func (c *ConfigService) SetAutoSeedEnabled(enabled bool) error {
|
|
c.mu.Lock()
|
|
defer c.mu.Unlock()
|
|
c.config.AutoSeedContext = enabled
|
|
return c.saveUnsafe()
|
|
}
|
|
|
|
// UpdateSettings holds update-related configuration.
|
|
type UpdateSettings struct {
|
|
Channel string `json:"channel"`
|
|
AutoUpdate bool `json:"autoUpdate"`
|
|
CheckInterval int `json:"checkInterval"` // Hours
|
|
LastCheck time.Time `json:"lastCheck"`
|
|
}
|
|
|
|
// GetUpdateSettings returns the update settings.
|
|
func (c *ConfigService) GetUpdateSettings() UpdateSettings {
|
|
c.mu.RLock()
|
|
defer c.mu.RUnlock()
|
|
return UpdateSettings{
|
|
Channel: c.config.UpdateChannel,
|
|
AutoUpdate: c.config.AutoUpdate,
|
|
CheckInterval: c.config.UpdateCheckInterval,
|
|
LastCheck: c.config.LastUpdateCheck,
|
|
}
|
|
}
|
|
|
|
// SetUpdateSettings updates the update settings.
|
|
func (c *ConfigService) SetUpdateSettings(settings UpdateSettings) error {
|
|
c.mu.Lock()
|
|
defer c.mu.Unlock()
|
|
c.config.UpdateChannel = settings.Channel
|
|
c.config.AutoUpdate = settings.AutoUpdate
|
|
c.config.UpdateCheckInterval = settings.CheckInterval
|
|
return c.saveUnsafe()
|
|
}
|
|
|
|
// GetUpdateChannel returns the update channel.
|
|
func (c *ConfigService) GetUpdateChannel() string {
|
|
c.mu.RLock()
|
|
defer c.mu.RUnlock()
|
|
return c.config.UpdateChannel
|
|
}
|
|
|
|
// SetUpdateChannel sets the update channel.
|
|
func (c *ConfigService) SetUpdateChannel(channel string) error {
|
|
c.mu.Lock()
|
|
defer c.mu.Unlock()
|
|
c.config.UpdateChannel = channel
|
|
return c.saveUnsafe()
|
|
}
|
|
|
|
// IsAutoUpdateEnabled returns whether automatic updates are enabled.
|
|
func (c *ConfigService) IsAutoUpdateEnabled() bool {
|
|
c.mu.RLock()
|
|
defer c.mu.RUnlock()
|
|
return c.config.AutoUpdate
|
|
}
|
|
|
|
// SetAutoUpdateEnabled enables or disables automatic updates.
|
|
func (c *ConfigService) SetAutoUpdateEnabled(enabled bool) error {
|
|
c.mu.Lock()
|
|
defer c.mu.Unlock()
|
|
c.config.AutoUpdate = enabled
|
|
return c.saveUnsafe()
|
|
}
|
|
|
|
// GetUpdateCheckInterval returns the update check interval in hours.
|
|
func (c *ConfigService) GetUpdateCheckInterval() int {
|
|
c.mu.RLock()
|
|
defer c.mu.RUnlock()
|
|
return c.config.UpdateCheckInterval
|
|
}
|
|
|
|
// SetUpdateCheckInterval sets the update check interval in hours.
|
|
func (c *ConfigService) SetUpdateCheckInterval(hours int) error {
|
|
c.mu.Lock()
|
|
defer c.mu.Unlock()
|
|
c.config.UpdateCheckInterval = hours
|
|
return c.saveUnsafe()
|
|
}
|
|
|
|
// GetLastUpdateCheck returns the last update check time.
|
|
func (c *ConfigService) GetLastUpdateCheck() time.Time {
|
|
c.mu.RLock()
|
|
defer c.mu.RUnlock()
|
|
return c.config.LastUpdateCheck
|
|
}
|
|
|
|
// SetLastUpdateCheck sets the last update check time.
|
|
func (c *ConfigService) SetLastUpdateCheck(t time.Time) error {
|
|
c.mu.Lock()
|
|
defer c.mu.Unlock()
|
|
c.config.LastUpdateCheck = t
|
|
return c.saveUnsafe()
|
|
}
|
|
|
|
// ShouldCheckForUpdates returns true if it's time to check for updates.
|
|
func (c *ConfigService) ShouldCheckForUpdates() bool {
|
|
c.mu.RLock()
|
|
defer c.mu.RUnlock()
|
|
|
|
if c.config.UpdateCheckInterval <= 0 {
|
|
return false // Updates disabled
|
|
}
|
|
|
|
if c.config.LastUpdateCheck.IsZero() {
|
|
return true // Never checked
|
|
}
|
|
|
|
interval := time.Duration(c.config.UpdateCheckInterval) * time.Hour
|
|
return time.Since(c.config.LastUpdateCheck) >= interval
|
|
}
|