Implements Phases 1-8 of the TFTSR implementation plan. Rust backend (Tauri 2.x, src-tauri/): - Multi-provider AI: OpenAI-compatible, Anthropic, Gemini, Mistral, Ollama - PII detection engine: 11 regex patterns with overlap resolution - SQLCipher AES-256 encrypted database with 10 versioned migrations - 28 Tauri IPC commands for triage, analysis, document, and system ops - Ollama: hardware probe, model recommendations, pull/delete with events - RCA and blameless post-mortem Markdown document generators - PDF export via printpdf - Audit log: SHA-256 hash of every external data send - Integration stubs for Confluence, ServiceNow, Azure DevOps (v0.2) Frontend (React 18 + TypeScript + Vite, src/): - 9 pages: full triage workflow NewIssue→LogUpload→Triage→Resolution→RCA→Postmortem→History+Settings - 7 components: ChatWindow, TriageProgress, PiiDiffViewer, DocEditor, HardwareReport, ModelSelector, UI primitives - 3 Zustand stores: session, settings (persisted), history - Type-safe tauriCommands.ts matching Rust backend types exactly - 8 IT domain system prompts (Linux, Windows, Network, K8s, DB, Virt, HW, Obs) DevOps: - .woodpecker/test.yml: rustfmt, clippy, cargo test, tsc, vitest on every push - .woodpecker/release.yml: linux/amd64 + linux/arm64 builds, Gogs release upload Verified: - cargo check: zero errors - tsc --noEmit: zero errors - vitest run: 13/13 unit tests passing Co-Authored-By: Claude Sonnet 4.6 (1M context) <noreply@anthropic.com>
41 lines
1.1 KiB
JavaScript
41 lines
1.1 KiB
JavaScript
"use strict";
|
|
/**
|
|
* Returns true if the string matches the specified shell
|
|
* expression.
|
|
*
|
|
* Actually, currently the patterns are shell expressions,
|
|
* not regular expressions.
|
|
*
|
|
* Examples:
|
|
*
|
|
* ``` js
|
|
* shExpMatch("http://home.netscape.com/people/ari/index.html", "*\/ari/*")
|
|
* // is true.
|
|
*
|
|
* shExpMatch("http://home.netscape.com/people/montulli/index.html", "*\/ari/*")
|
|
* // is false.
|
|
* ```
|
|
*
|
|
* @param {String} str is any string to compare (e.g. the URL, or the hostname).
|
|
* @param {String} shexp is a shell expression to compare against.
|
|
* @return {Boolean} true if the string matches the shell expression.
|
|
*/
|
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
function shExpMatch(str, shexp) {
|
|
const re = toRegExp(shexp);
|
|
return re.test(str);
|
|
}
|
|
exports.default = shExpMatch;
|
|
/**
|
|
* Converts a "shell expression" to a JavaScript RegExp.
|
|
*
|
|
* @api private
|
|
*/
|
|
function toRegExp(str) {
|
|
str = String(str)
|
|
.replace(/\./g, '\\.')
|
|
.replace(/\?/g, '.')
|
|
.replace(/\*/g, '.*');
|
|
return new RegExp(`^${str}$`);
|
|
}
|
|
//# sourceMappingURL=shExpMatch.js.map
|