Implements Phases 1-8 of the TFTSR implementation plan. Rust backend (Tauri 2.x, src-tauri/): - Multi-provider AI: OpenAI-compatible, Anthropic, Gemini, Mistral, Ollama - PII detection engine: 11 regex patterns with overlap resolution - SQLCipher AES-256 encrypted database with 10 versioned migrations - 28 Tauri IPC commands for triage, analysis, document, and system ops - Ollama: hardware probe, model recommendations, pull/delete with events - RCA and blameless post-mortem Markdown document generators - PDF export via printpdf - Audit log: SHA-256 hash of every external data send - Integration stubs for Confluence, ServiceNow, Azure DevOps (v0.2) Frontend (React 18 + TypeScript + Vite, src/): - 9 pages: full triage workflow NewIssue→LogUpload→Triage→Resolution→RCA→Postmortem→History+Settings - 7 components: ChatWindow, TriageProgress, PiiDiffViewer, DocEditor, HardwareReport, ModelSelector, UI primitives - 3 Zustand stores: session, settings (persisted), history - Type-safe tauriCommands.ts matching Rust backend types exactly - 8 IT domain system prompts (Linux, Windows, Network, K8s, DB, Virt, HW, Obs) DevOps: - .woodpecker/test.yml: rustfmt, clippy, cargo test, tsc, vitest on every push - .woodpecker/release.yml: linux/amd64 + linux/arm64 builds, Gogs release upload Verified: - cargo check: zero errors - tsc --noEmit: zero errors - vitest run: 13/13 unit tests passing Co-Authored-By: Claude Sonnet 4.6 (1M context) <noreply@anthropic.com>
54 lines
2.0 KiB
CoffeeScript
54 lines
2.0 KiB
CoffeeScript
vows = require 'vows'
|
|
assert = require 'assert'
|
|
Netmask = require('../lib/netmask').Netmask
|
|
|
|
shouldFailWithError = (msg) ->
|
|
context =
|
|
topic: ->
|
|
try
|
|
return new Netmask(@context.name)
|
|
catch e
|
|
return e
|
|
'should fail': (e) ->
|
|
assert.ok isError(e), "is an Error object #{e}"
|
|
"with error `#{msg}'": (e) ->
|
|
assert.ok e.message?.toLowerCase().indexOf(msg.toLowerCase()) > -1, "'#{e.message}' =~ #{msg}"
|
|
|
|
return context
|
|
|
|
isError = (e) ->
|
|
return typeof e == 'object' and Object.prototype.toString.call(e) == '[object Error]'
|
|
|
|
vows.describe('IPs with bytes greater than 255')
|
|
.addBatch
|
|
'209.256.68.22/255.255.224.0': shouldFailWithError 'Invalid net'
|
|
'209.180.68.22/256.255.224.0': shouldFailWithError 'Invalid mask'
|
|
'209.500.70.33/19': shouldFailWithError 'Invalid net'
|
|
'140.999.82': shouldFailWithError 'Invalid net'
|
|
'899.174': shouldFailWithError 'Invalid net'
|
|
'209.157.65536/19': shouldFailWithError 'Invalid net'
|
|
'209.300.64.0.10': shouldFailWithError 'Invalid net'
|
|
'garbage': shouldFailWithError 'Invalid net'
|
|
.export(module)
|
|
|
|
|
|
vows.describe('Invalid IP format')
|
|
.addBatch
|
|
' 1.2.3.4': shouldFailWithError 'Invalid net'
|
|
' 1.2.3.4': shouldFailWithError 'Invalid net'
|
|
'1. 2.3.4': shouldFailWithError 'Invalid net'
|
|
'1.2. 3.4': shouldFailWithError 'Invalid net'
|
|
'1.2.3. 4': shouldFailWithError 'Invalid net'
|
|
'1.2.3.4 ': shouldFailWithError 'Invalid net'
|
|
'1 .2.3.4': shouldFailWithError 'Invalid net'
|
|
'018.0.0.0': shouldFailWithError 'Invalid net'
|
|
'08.0.0.0': shouldFailWithError 'Invalid net'
|
|
'0xfg.0.0.0': shouldFailWithError 'Invalid net'
|
|
.export(module)
|
|
|
|
vows.describe('Ranges that are a power-of-two big, but are not legal blocks')
|
|
.addBatch
|
|
'218.0.0.0/221.255.255.255': shouldFailWithError 'Invalid mask'
|
|
'218.0.0.4/218.0.0.11': shouldFailWithError 'Invalid mask'
|
|
.export(module)
|