Implements Phases 1-8 of the TFTSR implementation plan. Rust backend (Tauri 2.x, src-tauri/): - Multi-provider AI: OpenAI-compatible, Anthropic, Gemini, Mistral, Ollama - PII detection engine: 11 regex patterns with overlap resolution - SQLCipher AES-256 encrypted database with 10 versioned migrations - 28 Tauri IPC commands for triage, analysis, document, and system ops - Ollama: hardware probe, model recommendations, pull/delete with events - RCA and blameless post-mortem Markdown document generators - PDF export via printpdf - Audit log: SHA-256 hash of every external data send - Integration stubs for Confluence, ServiceNow, Azure DevOps (v0.2) Frontend (React 18 + TypeScript + Vite, src/): - 9 pages: full triage workflow NewIssue→LogUpload→Triage→Resolution→RCA→Postmortem→History+Settings - 7 components: ChatWindow, TriageProgress, PiiDiffViewer, DocEditor, HardwareReport, ModelSelector, UI primitives - 3 Zustand stores: session, settings (persisted), history - Type-safe tauriCommands.ts matching Rust backend types exactly - 8 IT domain system prompts (Linux, Windows, Network, K8s, DB, Virt, HW, Obs) DevOps: - .woodpecker/test.yml: rustfmt, clippy, cargo test, tsc, vitest on every push - .woodpecker/release.yml: linux/amd64 + linux/arm64 builds, Gogs release upload Verified: - cargo check: zero errors - tsc --noEmit: zero errors - vitest run: 13/13 unit tests passing Co-Authored-By: Claude Sonnet 4.6 (1M context) <noreply@anthropic.com>
42 lines
1.4 KiB
JavaScript
42 lines
1.4 KiB
JavaScript
"use strict";
|
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
const netmask_1 = require("netmask");
|
|
const util_1 = require("./util");
|
|
/**
|
|
* True iff the IP address of the host matches the specified IP address pattern.
|
|
*
|
|
* Pattern and mask specification is done the same way as for SOCKS configuration.
|
|
*
|
|
* Examples:
|
|
*
|
|
* ``` js
|
|
* isInNet(host, "198.95.249.79", "255.255.255.255")
|
|
* // is true iff the IP address of host matches exactly 198.95.249.79.
|
|
*
|
|
* isInNet(host, "198.95.0.0", "255.255.0.0")
|
|
* // is true iff the IP address of the host matches 198.95.*.*.
|
|
* ```
|
|
*
|
|
* @param {String} host a DNS hostname, or IP address. If a hostname is passed,
|
|
* it will be resoved into an IP address by this function.
|
|
* @param {String} pattern an IP address pattern in the dot-separated format mask.
|
|
* @param {String} mask for the IP address pattern informing which parts of the
|
|
* IP address should be matched against. 0 means ignore, 255 means match.
|
|
* @return {Boolean}
|
|
*/
|
|
async function isInNet(host, pattern, mask) {
|
|
const family = 4;
|
|
try {
|
|
const ip = await (0, util_1.dnsLookup)(host, { family });
|
|
if (typeof ip === 'string') {
|
|
const netmask = new netmask_1.Netmask(pattern, mask);
|
|
return netmask.contains(ip);
|
|
}
|
|
}
|
|
catch (err) {
|
|
// ignore
|
|
}
|
|
return false;
|
|
}
|
|
exports.default = isInNet;
|
|
//# sourceMappingURL=isInNet.js.map
|