Implements Phases 1-8 of the TFTSR implementation plan. Rust backend (Tauri 2.x, src-tauri/): - Multi-provider AI: OpenAI-compatible, Anthropic, Gemini, Mistral, Ollama - PII detection engine: 11 regex patterns with overlap resolution - SQLCipher AES-256 encrypted database with 10 versioned migrations - 28 Tauri IPC commands for triage, analysis, document, and system ops - Ollama: hardware probe, model recommendations, pull/delete with events - RCA and blameless post-mortem Markdown document generators - PDF export via printpdf - Audit log: SHA-256 hash of every external data send - Integration stubs for Confluence, ServiceNow, Azure DevOps (v0.2) Frontend (React 18 + TypeScript + Vite, src/): - 9 pages: full triage workflow NewIssue→LogUpload→Triage→Resolution→RCA→Postmortem→History+Settings - 7 components: ChatWindow, TriageProgress, PiiDiffViewer, DocEditor, HardwareReport, ModelSelector, UI primitives - 3 Zustand stores: session, settings (persisted), history - Type-safe tauriCommands.ts matching Rust backend types exactly - 8 IT domain system prompts (Linux, Windows, Network, K8s, DB, Virt, HW, Obs) DevOps: - .woodpecker/test.yml: rustfmt, clippy, cargo test, tsc, vitest on every push - .woodpecker/release.yml: linux/amd64 + linux/arm64 builds, Gogs release upload Verified: - cargo check: zero errors - tsc --noEmit: zero errors - vitest run: 13/13 unit tests passing Co-Authored-By: Claude Sonnet 4.6 (1M context) <noreply@anthropic.com>
90 lines
2.2 KiB
JavaScript
90 lines
2.2 KiB
JavaScript
'use strict';
|
|
|
|
// This file is a proxy of the original file located at:
|
|
// https://github.com/nodejs/node/blob/main/lib/internal/validators.js
|
|
// Every addition or modification to this file must be evaluated
|
|
// during the PR review.
|
|
|
|
const {
|
|
ArrayIsArray,
|
|
ArrayPrototypeIncludes,
|
|
ArrayPrototypeJoin,
|
|
} = require('./primordials');
|
|
|
|
const {
|
|
codes: {
|
|
ERR_INVALID_ARG_TYPE
|
|
}
|
|
} = require('./errors');
|
|
|
|
function validateString(value, name) {
|
|
if (typeof value !== 'string') {
|
|
throw new ERR_INVALID_ARG_TYPE(name, 'String', value);
|
|
}
|
|
}
|
|
|
|
function validateUnion(value, name, union) {
|
|
if (!ArrayPrototypeIncludes(union, value)) {
|
|
throw new ERR_INVALID_ARG_TYPE(name, `('${ArrayPrototypeJoin(union, '|')}')`, value);
|
|
}
|
|
}
|
|
|
|
function validateBoolean(value, name) {
|
|
if (typeof value !== 'boolean') {
|
|
throw new ERR_INVALID_ARG_TYPE(name, 'Boolean', value);
|
|
}
|
|
}
|
|
|
|
function validateArray(value, name) {
|
|
if (!ArrayIsArray(value)) {
|
|
throw new ERR_INVALID_ARG_TYPE(name, 'Array', value);
|
|
}
|
|
}
|
|
|
|
function validateStringArray(value, name) {
|
|
validateArray(value, name);
|
|
for (let i = 0; i < value.length; i++) {
|
|
validateString(value[i], `${name}[${i}]`);
|
|
}
|
|
}
|
|
|
|
function validateBooleanArray(value, name) {
|
|
validateArray(value, name);
|
|
for (let i = 0; i < value.length; i++) {
|
|
validateBoolean(value[i], `${name}[${i}]`);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @param {unknown} value
|
|
* @param {string} name
|
|
* @param {{
|
|
* allowArray?: boolean,
|
|
* allowFunction?: boolean,
|
|
* nullable?: boolean
|
|
* }} [options]
|
|
*/
|
|
function validateObject(value, name, options) {
|
|
const useDefaultOptions = options == null;
|
|
const allowArray = useDefaultOptions ? false : options.allowArray;
|
|
const allowFunction = useDefaultOptions ? false : options.allowFunction;
|
|
const nullable = useDefaultOptions ? false : options.nullable;
|
|
if ((!nullable && value === null) ||
|
|
(!allowArray && ArrayIsArray(value)) ||
|
|
(typeof value !== 'object' && (
|
|
!allowFunction || typeof value !== 'function'
|
|
))) {
|
|
throw new ERR_INVALID_ARG_TYPE(name, 'Object', value);
|
|
}
|
|
}
|
|
|
|
module.exports = {
|
|
validateArray,
|
|
validateObject,
|
|
validateString,
|
|
validateStringArray,
|
|
validateUnion,
|
|
validateBoolean,
|
|
validateBooleanArray,
|
|
};
|