Implements Phases 1-8 of the TFTSR implementation plan. Rust backend (Tauri 2.x, src-tauri/): - Multi-provider AI: OpenAI-compatible, Anthropic, Gemini, Mistral, Ollama - PII detection engine: 11 regex patterns with overlap resolution - SQLCipher AES-256 encrypted database with 10 versioned migrations - 28 Tauri IPC commands for triage, analysis, document, and system ops - Ollama: hardware probe, model recommendations, pull/delete with events - RCA and blameless post-mortem Markdown document generators - PDF export via printpdf - Audit log: SHA-256 hash of every external data send - Integration stubs for Confluence, ServiceNow, Azure DevOps (v0.2) Frontend (React 18 + TypeScript + Vite, src/): - 9 pages: full triage workflow NewIssue→LogUpload→Triage→Resolution→RCA→Postmortem→History+Settings - 7 components: ChatWindow, TriageProgress, PiiDiffViewer, DocEditor, HardwareReport, ModelSelector, UI primitives - 3 Zustand stores: session, settings (persisted), history - Type-safe tauriCommands.ts matching Rust backend types exactly - 8 IT domain system prompts (Linux, Windows, Network, K8s, DB, Virt, HW, Obs) DevOps: - .woodpecker/test.yml: rustfmt, clippy, cargo test, tsc, vitest on every push - .woodpecker/release.yml: linux/amd64 + linux/arm64 builds, Gogs release upload Verified: - cargo check: zero errors - tsc --noEmit: zero errors - vitest run: 13/13 unit tests passing Co-Authored-By: Claude Sonnet 4.6 (1M context) <noreply@anthropic.com>
50 lines
1.6 KiB
JavaScript
50 lines
1.6 KiB
JavaScript
"use strict";
|
|
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
};
|
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
const ip_1 = require("./ip");
|
|
const net_1 = __importDefault(require("net"));
|
|
/**
|
|
* Returns the IP address of the host that the Navigator is running on, as
|
|
* a string in the dot-separated integer format.
|
|
*
|
|
* Example:
|
|
*
|
|
* ``` js
|
|
* myIpAddress()
|
|
* // would return the string "198.95.249.79" if you were running the
|
|
* // Navigator on that host.
|
|
* ```
|
|
*
|
|
* @return {String} external IP address
|
|
*/
|
|
async function myIpAddress() {
|
|
return new Promise((resolve, reject) => {
|
|
// 8.8.8.8:53 is "Google Public DNS":
|
|
// https://developers.google.com/speed/public-dns/
|
|
const socket = net_1.default.connect({ host: '8.8.8.8', port: 53 });
|
|
const onError = () => {
|
|
// if we fail to access Google DNS (as in firewall blocks access),
|
|
// fallback to querying IP locally
|
|
resolve(ip_1.ip.address());
|
|
};
|
|
socket.once('error', onError);
|
|
socket.once('connect', () => {
|
|
socket.removeListener('error', onError);
|
|
const addr = socket.address();
|
|
socket.destroy();
|
|
if (typeof addr === 'string') {
|
|
resolve(addr);
|
|
}
|
|
else if (addr.address) {
|
|
resolve(addr.address);
|
|
}
|
|
else {
|
|
reject(new Error('Expected a `string`'));
|
|
}
|
|
});
|
|
});
|
|
}
|
|
exports.default = myIpAddress;
|
|
//# sourceMappingURL=myIpAddress.js.map
|