Implements Phases 1-8 of the TFTSR implementation plan. Rust backend (Tauri 2.x, src-tauri/): - Multi-provider AI: OpenAI-compatible, Anthropic, Gemini, Mistral, Ollama - PII detection engine: 11 regex patterns with overlap resolution - SQLCipher AES-256 encrypted database with 10 versioned migrations - 28 Tauri IPC commands for triage, analysis, document, and system ops - Ollama: hardware probe, model recommendations, pull/delete with events - RCA and blameless post-mortem Markdown document generators - PDF export via printpdf - Audit log: SHA-256 hash of every external data send - Integration stubs for Confluence, ServiceNow, Azure DevOps (v0.2) Frontend (React 18 + TypeScript + Vite, src/): - 9 pages: full triage workflow NewIssue→LogUpload→Triage→Resolution→RCA→Postmortem→History+Settings - 7 components: ChatWindow, TriageProgress, PiiDiffViewer, DocEditor, HardwareReport, ModelSelector, UI primitives - 3 Zustand stores: session, settings (persisted), history - Type-safe tauriCommands.ts matching Rust backend types exactly - 8 IT domain system prompts (Linux, Windows, Network, K8s, DB, Virt, HW, Obs) DevOps: - .woodpecker/test.yml: rustfmt, clippy, cargo test, tsc, vitest on every push - .woodpecker/release.yml: linux/amd64 + linux/arm64 builds, Gogs release upload Verified: - cargo check: zero errors - tsc --noEmit: zero errors - vitest run: 13/13 unit tests passing Co-Authored-By: Claude Sonnet 4.6 (1M context) <noreply@anthropic.com>
59 lines
1.3 KiB
JavaScript
Executable File
59 lines
1.3 KiB
JavaScript
Executable File
#!/usr/bin/env node
|
|
'use strict'
|
|
|
|
const { parseArgs } = require('node:util')
|
|
const { safeRegex } = require('../index.js')
|
|
|
|
const { version } = require('../package.json')
|
|
|
|
const { values: options, positionals } = parseArgs({
|
|
allowPositionals: true,
|
|
options: {
|
|
version: {
|
|
type: 'boolean',
|
|
short: 'v',
|
|
default: false,
|
|
},
|
|
help: {
|
|
type: 'boolean',
|
|
short: 'h',
|
|
default: false,
|
|
}
|
|
},
|
|
})
|
|
|
|
function help () {
|
|
console.log(`Usage: safe-regex2 [options] <regex>
|
|
|
|
Check if a regular expression is safe to use in a production environment.
|
|
|
|
Options:
|
|
-v, --version Display the version number
|
|
-h, --help Display this help message
|
|
<regex> The regular expression to check`
|
|
)
|
|
}
|
|
|
|
if (options.help) {
|
|
help()
|
|
} else if (options.version) {
|
|
console.log(version)
|
|
} else {
|
|
if (positionals.length === 0) {
|
|
help()
|
|
} else if (positionals.length > 1) {
|
|
console.error('Error: Too many positional arguments.')
|
|
help()
|
|
} else {
|
|
const regex = positionals[0]
|
|
const isSafe = safeRegex(regex)
|
|
if (isSafe === false) {
|
|
console.error('Provided regex is invalid or unsafe.')
|
|
process.exit(1)
|
|
} else {
|
|
console.log('Provided regex is safe.')
|
|
process.exit(0)
|
|
}
|
|
}
|
|
}
|