Implements Phases 1-8 of the TFTSR implementation plan. Rust backend (Tauri 2.x, src-tauri/): - Multi-provider AI: OpenAI-compatible, Anthropic, Gemini, Mistral, Ollama - PII detection engine: 11 regex patterns with overlap resolution - SQLCipher AES-256 encrypted database with 10 versioned migrations - 28 Tauri IPC commands for triage, analysis, document, and system ops - Ollama: hardware probe, model recommendations, pull/delete with events - RCA and blameless post-mortem Markdown document generators - PDF export via printpdf - Audit log: SHA-256 hash of every external data send - Integration stubs for Confluence, ServiceNow, Azure DevOps (v0.2) Frontend (React 18 + TypeScript + Vite, src/): - 9 pages: full triage workflow NewIssue→LogUpload→Triage→Resolution→RCA→Postmortem→History+Settings - 7 components: ChatWindow, TriageProgress, PiiDiffViewer, DocEditor, HardwareReport, ModelSelector, UI primitives - 3 Zustand stores: session, settings (persisted), history - Type-safe tauriCommands.ts matching Rust backend types exactly - 8 IT domain system prompts (Linux, Windows, Network, K8s, DB, Virt, HW, Obs) DevOps: - .woodpecker/test.yml: rustfmt, clippy, cargo test, tsc, vitest on every push - .woodpecker/release.yml: linux/amd64 + linux/arm64 builds, Gogs release upload Verified: - cargo check: zero errors - tsc --noEmit: zero errors - vitest run: 13/13 unit tests passing Co-Authored-By: Claude Sonnet 4.6 (1M context) <noreply@anthropic.com>
67 lines
2.4 KiB
JavaScript
67 lines
2.4 KiB
JavaScript
"use strict";
|
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
exports.describeTLS = describeTLS;
|
|
exports.describeAddress = describeAddress;
|
|
exports.upgradeSocket = upgradeSocket;
|
|
exports.ipIsPrivateV4Address = ipIsPrivateV4Address;
|
|
const tls_1 = require("tls");
|
|
/**
|
|
* Returns a string describing the encryption on a given socket instance.
|
|
*/
|
|
function describeTLS(socket) {
|
|
if (socket instanceof tls_1.TLSSocket) {
|
|
const protocol = socket.getProtocol();
|
|
return protocol ? protocol : "Server socket or disconnected client socket";
|
|
}
|
|
return "No encryption";
|
|
}
|
|
/**
|
|
* Returns a string describing the remote address of a socket.
|
|
*/
|
|
function describeAddress(socket) {
|
|
if (socket.remoteFamily === "IPv6") {
|
|
return `[${socket.remoteAddress}]:${socket.remotePort}`;
|
|
}
|
|
return `${socket.remoteAddress}:${socket.remotePort}`;
|
|
}
|
|
/**
|
|
* Upgrade a socket connection with TLS.
|
|
*/
|
|
function upgradeSocket(socket, options) {
|
|
return new Promise((resolve, reject) => {
|
|
const tlsOptions = Object.assign({}, options, {
|
|
socket
|
|
});
|
|
const tlsSocket = (0, tls_1.connect)(tlsOptions, () => {
|
|
const expectCertificate = tlsOptions.rejectUnauthorized !== false;
|
|
if (expectCertificate && !tlsSocket.authorized) {
|
|
reject(tlsSocket.authorizationError);
|
|
}
|
|
else {
|
|
// Remove error listener added below.
|
|
tlsSocket.removeAllListeners("error");
|
|
resolve(tlsSocket);
|
|
}
|
|
}).once("error", error => {
|
|
reject(error);
|
|
});
|
|
});
|
|
}
|
|
/**
|
|
* Returns true if an IP is a private address according to https://tools.ietf.org/html/rfc1918#section-3.
|
|
* This will handle IPv4-mapped IPv6 addresses correctly but return false for all other IPv6 addresses.
|
|
*
|
|
* @param ip The IP as a string, e.g. "192.168.0.1"
|
|
*/
|
|
function ipIsPrivateV4Address(ip = "") {
|
|
// Handle IPv4-mapped IPv6 addresses like ::ffff:192.168.0.1
|
|
if (ip.startsWith("::ffff:")) {
|
|
ip = ip.substr(7); // Strip ::ffff: prefix
|
|
}
|
|
const octets = ip.split(".").map(o => parseInt(o, 10));
|
|
return octets[0] === 10 // 10.0.0.0 - 10.255.255.255
|
|
|| (octets[0] === 172 && octets[1] >= 16 && octets[1] <= 31) // 172.16.0.0 - 172.31.255.255
|
|
|| (octets[0] === 192 && octets[1] === 168) // 192.168.0.0 - 192.168.255.255
|
|
|| ip === "127.0.0.1";
|
|
}
|