Implements Phases 1-8 of the TFTSR implementation plan. Rust backend (Tauri 2.x, src-tauri/): - Multi-provider AI: OpenAI-compatible, Anthropic, Gemini, Mistral, Ollama - PII detection engine: 11 regex patterns with overlap resolution - SQLCipher AES-256 encrypted database with 10 versioned migrations - 28 Tauri IPC commands for triage, analysis, document, and system ops - Ollama: hardware probe, model recommendations, pull/delete with events - RCA and blameless post-mortem Markdown document generators - PDF export via printpdf - Audit log: SHA-256 hash of every external data send - Integration stubs for Confluence, ServiceNow, Azure DevOps (v0.2) Frontend (React 18 + TypeScript + Vite, src/): - 9 pages: full triage workflow NewIssue→LogUpload→Triage→Resolution→RCA→Postmortem→History+Settings - 7 components: ChatWindow, TriageProgress, PiiDiffViewer, DocEditor, HardwareReport, ModelSelector, UI primitives - 3 Zustand stores: session, settings (persisted), history - Type-safe tauriCommands.ts matching Rust backend types exactly - 8 IT domain system prompts (Linux, Windows, Network, K8s, DB, Virt, HW, Obs) DevOps: - .woodpecker/test.yml: rustfmt, clippy, cargo test, tsc, vitest on every push - .woodpecker/release.yml: linux/amd64 + linux/arm64 builds, Gogs release upload Verified: - cargo check: zero errors - tsc --noEmit: zero errors - vitest run: 13/13 unit tests passing Co-Authored-By: Claude Sonnet 4.6 (1M context) <noreply@anthropic.com>
36 lines
1.2 KiB
TypeScript
36 lines
1.2 KiB
TypeScript
/**
|
|
* Make a value safe for injection as a URL.
|
|
*
|
|
* This encodes unsafe characters with percent-encoding and skips already
|
|
* encoded sequences (see `normalizeUri`).
|
|
* Further unsafe characters are encoded as character references (see
|
|
* `micromark-util-encode`).
|
|
*
|
|
* A regex of allowed protocols can be given, in which case the URL is
|
|
* sanitized.
|
|
* For example, `/^(https?|ircs?|mailto|xmpp)$/i` can be used for `a[href]`, or
|
|
* `/^https?$/i` for `img[src]` (this is what `github.com` allows).
|
|
* If the URL includes an unknown protocol (one not matched by `protocol`, such
|
|
* as a dangerous example, `javascript:`), the value is ignored.
|
|
*
|
|
* @param {string | null | undefined} url
|
|
* URI to sanitize.
|
|
* @param {RegExp | null | undefined} [protocol]
|
|
* Allowed protocols.
|
|
* @returns {string}
|
|
* Sanitized URI.
|
|
*/
|
|
export function sanitizeUri(url: string | null | undefined, protocol?: RegExp | null | undefined): string;
|
|
/**
|
|
* Normalize a URL.
|
|
*
|
|
* Encode unsafe characters with percent-encoding, skipping already encoded
|
|
* sequences.
|
|
*
|
|
* @param {string} value
|
|
* URI to normalize.
|
|
* @returns {string}
|
|
* Normalized URI.
|
|
*/
|
|
export function normalizeUri(value: string): string;
|
|
//# sourceMappingURL=index.d.ts.map
|