2023-10-20 ChromSword 5.5 Task

ChromSword Version that is compliant with FDA 21 CFR PART 11 regulations.

Client-server must contain

Client-server will be able to export all necessary data required by FDA part 11

User management will provide Locked RPTX files that will be operable only with a connection Client Server

All actions with ChromSword Auto and RPTX files will be electronically signed in accordance with FDA part 11

21 CFR PART 11 COMPLIANCE ASSESSMENT - http://www.ecfr.gov/cgi-bin/text-idx?SID=5bae37807e1cbe352a4411be36b88371&mc=true&node=pt21.1.11&rgn=div5

Password strength: https://www.fda.gov/Food/GuidanceRegulation/FoodFacilityRegistration/ucm091108.htm

 

Git repos

AdminConsole: https://bitbucket.org/evaldsurtans/git-bitbucket.org-evaldsurtans-chromsword5-1-admin-console

 

ReportService: https://bitbucket.org/evaldsurtans/chromsword5-5-report-service

 

ClientServer Service: https://bitbucket.org/evaldsurtans/chromsword5-1-client-server-nodejs

 

InnoSetup installer (for NodeJS services and WPF apps) https://bitbucket.org/evaldsurtans/chromsword5-5-installer

 

 

Schema of how it operates

RPTX files are saved in ClientServer (it can be located on the same machine or another computer). All actions are logged in AuditTrail in ChromSword ClientService / Admin Console App

 

N
Yes
ChromSword Auto 5.5
Is connection?
C:\AppData\ChormSword\Requests
ChromSword ReportService
ChromSword ClientServer 127.0.0.1:8888
PostgreSQL
C:\ProgramData\ChromSword\Storage
ChromSword AdminConsole

 

ClientServer

NodeJS based Windows Service that has TCP socket listening for JSON messages from other services and C# apps.

image-20231020024430730

When testing make sure you STOP Windows services and instead run it in WebStorm from package.json in Debug. image-20231020024443005

Port. hostname and server report path is taken from RegEdit

All REST JSON service Message Types that are currently implemented (https://bitbucket.org/evaldsurtans/chromsword5-1-client-server-nodejs/src/master/app/common/RequestMessageTypes.js)

 

ReportService

NodeJS based Windows Service that sends to ClientServer files that have not been sent to ClientServer imeaditly because of connection issues

AdminConsole

NodeJS Electorn App using Angular.Js V1 library for UI. To debug make sure you launch with environment variable ENV=DEVELOPMENT

image-20231020024453197

Login Window with DEBUG panel on right! CSA AdminConsoile Break points does not work, but you can use Chrome Developer tools in browser window. Client Server and Report Server DEBUG does work image-20231020025949857

All Views ar based on https://bitbucket.org/evaldsurtans/git-bitbucket.org-evaldsurtans-chromsword5-1-admin-console/src/master/app/views/MainWindow.html AND https://bitbucket.org/evaldsurtans/git-bitbucket.org-evaldsurtans-chromsword5-1-admin-console/src/master/app/controllers/MainWindow.js

ViewOverview (https://bitbucket.org/evaldsurtans/git-bitbucket.org-evaldsurtans-chromsword5-1-admin-console/src/master/app/views/ViewOverview.html AND https://bitbucket.org/evaldsurtans/git-bitbucket.org-evaldsurtans-chromsword5-1-admin-console/src/master/app/controllers/ViewOverview.js) shows statistics recorded in DB

ChromSword AdminConsole workst through REST JSON API and not accessing all API requests are eqectuted using https://bitbucket.org/evaldsurtans/git-bitbucket.org-evaldsurtans-chromsword5-1-admin-console/src/master/app/services/ClientServer.js

 

Stats collected in this way:

 

image-20231020101450894

 

ViewAudiTrial (https://bitbucket.org/evaldsurtans/git-bitbucket.org-evaldsurtans-chromsword5-1-admin-console/src/master/app/controllers/ViewAuditTrail.js) - All actions that happen in AdminConsole and other CSA apps must be logged in AuditTrail and also must be possible to download PRJX, RTPX before and after every change

image-20231020101513441

 

https://bitbucket.org/evaldsurtans/git-bitbucket.org-evaldsurtans-chromsword5-1-admin-console/src/master/app/controllers/ViewInstruments.js – To use any Instruments in ChromSword Auto user must first register instrument and access to user to this instrument, otherwise cannot run it

image-20231020101735798

ProjectGroups image-20231020103259675

 

 

Projects - These are PRJX files - like ChromSword DataSystem Project file (coppied as file and also in DB)

image-20231020103316814

 

Reports image-20231020103340737

 

Users

image-20231020105509287

 

Roles (optional)

image-20231020105525009

 

Settings

image-20231020105543007

 

If mouse is moved then refresh session token

image-20231020024329153

RPTX, PRJX with 5.5 support

Inside file there is few records that mark 5.5 files which have limited access. Hash is used primarily if no connection to ClientServer - it uses unique hash uuid that is later registered in PostgreSQL with the proper timestamp

image-20231020105601033

 

image-20231020105609839

CSA Apps

API communication logic must be implemented in ClientServerController.cs (https://bitbucket.org/evaldsurtans/chromsword5/src/master/Chromsword.ClientServer/Controllers/ClientServerController.cs)

Checking Access to instrument (would be better to move whole code block to ClientServerController.cs) image-20231020103237882

Checking Access to reports: image-20231020103038337

To detect CSA 5.5 Client server version there is special flag in RegEdit and Version number 5.5 image-20231020024243332

In apps there is Login dialog that is shared by all app instances and should be invalidated if all windows are closed or opening the first window

image-20231020024156477

 

PostgreSQL

Dabase structure dumped here: https://bitbucket.org/evaldsurtans/chromsword5-1-client-server-nodejs/src/master/pg_dump/ Normally this is installed using InnoSetup, but can also be done manually For Database access use WebStorm database viewer and connect to localhost PostgreSQL image-20231020102253115

 

Data structure

N
Yes
ChromSword Auto 5.5
Is connection?
C:\AppData\ChormSword\Requests
ChromSword ReportService
ChromSword ClientServer 127.0.0.1:8888
PostgreSQL
C:\ProgramData\ChromSword\Storage
ChromSword AdminConsole

InnoSetup

InnoSetup is about the same as for ChromSword 5.x, but there are few extra installations.

  1. It installs PostgreSQL

  2. It restores DB without touching existing data, for example:

  1. Registers Windows Services that are running in background

     

 

Task - Tutorial

Create report with questions and screenshot after every step in Notion.

  1. Install http://client:newversionscsa@versions.chromsword.com/ChromswordAuto_5.5.372.1028.exe or latest version (obtain full ChromSword 5.5 License Key from LicenseAdmin in seperate project)

  2. It will install all Windows Services, PostgreSQL and database (later when debugging remember to stop in Windows Services ClientServer service and if necessary also Report Service)

  3. Log in “ChromSword AdminConsole”

  4. Create Project Group “Test project group #1”

  5. Configure Instument as 127.0.0.1 Simulator

  6. Start ChromSword DataSystem, login using CSA 5.5 credentials, Choose Project Group “Test project group #1” (in second step of setting method). This option is not visible in other CSA versions, just 5.5

  7. Start experiment in simulator

  8. In “ChromSword AdminConsole” Look if all actions are logged in “Audit Trail”

  9. After Run try to download Project and Report from “ChromSword AdminConsole” sections

  10. Open in Report in “ChromSword ReportViewer”, there should be LogIn dialog, then re-integrate some run chromatogram, check if changes are logged in “Audit Trail”

  11. Create another user “test_user_2” with Project Group “Test project group #2”, but give access to same instrument

  12. Create another experiment and check if this user cann access previosu experiment in “Test project group #1” - user should not be able to open it!

  13. Stop Windows Services “ChromSword ClientServer” “ChromSword ReportViewer”, close “ChromSword AdminConsole”

  14. Using WebStorm Start these 3 projects in DEBUG mode, see in console all actions happening

  15. Repeat whole series of experiments