Implements Phases 1-8 of the TFTSR implementation plan. Rust backend (Tauri 2.x, src-tauri/): - Multi-provider AI: OpenAI-compatible, Anthropic, Gemini, Mistral, Ollama - PII detection engine: 11 regex patterns with overlap resolution - SQLCipher AES-256 encrypted database with 10 versioned migrations - 28 Tauri IPC commands for triage, analysis, document, and system ops - Ollama: hardware probe, model recommendations, pull/delete with events - RCA and blameless post-mortem Markdown document generators - PDF export via printpdf - Audit log: SHA-256 hash of every external data send - Integration stubs for Confluence, ServiceNow, Azure DevOps (v0.2) Frontend (React 18 + TypeScript + Vite, src/): - 9 pages: full triage workflow NewIssue→LogUpload→Triage→Resolution→RCA→Postmortem→History+Settings - 7 components: ChatWindow, TriageProgress, PiiDiffViewer, DocEditor, HardwareReport, ModelSelector, UI primitives - 3 Zustand stores: session, settings (persisted), history - Type-safe tauriCommands.ts matching Rust backend types exactly - 8 IT domain system prompts (Linux, Windows, Network, K8s, DB, Virt, HW, Obs) DevOps: - .woodpecker/test.yml: rustfmt, clippy, cargo test, tsc, vitest on every push - .woodpecker/release.yml: linux/amd64 + linux/arm64 builds, Gogs release upload Verified: - cargo check: zero errors - tsc --noEmit: zero errors - vitest run: 13/13 unit tests passing Co-Authored-By: Claude Sonnet 4.6 (1M context) <noreply@anthropic.com>
58 lines
1.3 KiB
JavaScript
58 lines
1.3 KiB
JavaScript
'use strict'
|
|
|
|
const safe = require('../')
|
|
const { test } = require('node:test')
|
|
|
|
const good = [
|
|
/\bOakland\b/,
|
|
/\b(Oakland|San Francisco)\b/i,
|
|
/^\d+1337\d+$/i,
|
|
/^\d+(1337|404)\d+$/i,
|
|
/^\d+(1337|404)*\d+$/i,
|
|
RegExp(Array(26).join('a?') + Array(26).join('a'))
|
|
]
|
|
|
|
test('safe regex', t => {
|
|
t.plan(good.length)
|
|
good.forEach(function (re) {
|
|
t.assert.strictEqual(safe(re), true, `Expected ${re} to be safe`)
|
|
})
|
|
})
|
|
|
|
const bad = [
|
|
/^(a?){25}(a){25}$/,
|
|
RegExp(Array(27).join('a?') + Array(27).join('a')),
|
|
/(x+x+)+y/,
|
|
/foo|(x+x+)+y/,
|
|
/(a+){10}y/,
|
|
/(a+){2}y/,
|
|
/(.*){1,32000}[bc]/
|
|
]
|
|
|
|
test('unsafe regex', t => {
|
|
t.plan(bad.length)
|
|
bad.forEach(function (re) {
|
|
t.assert.strictEqual(safe(re), false)
|
|
})
|
|
})
|
|
|
|
test('limit option', t => {
|
|
t.assert.strictEqual(safe(RegExp(Array(27).join('a?') + Array(27).join('a')), { limit: 50 }), true, 'Should be safe with limit of 50')
|
|
t.assert.strictEqual(safe(RegExp(Array(27).join('a?') + Array(27).join('a')), { limit: 24 }), false, 'Should be unsafe with limit of 24')
|
|
})
|
|
|
|
const invalid = [
|
|
'*Oakland*',
|
|
'hey(yoo))',
|
|
'abcde(?>hellow)',
|
|
'[abc',
|
|
{ toString: () => '[abc' }
|
|
]
|
|
|
|
test('invalid regex', t => {
|
|
t.plan(invalid.length)
|
|
invalid.forEach(function (re) {
|
|
t.assert.strictEqual(safe(re), false)
|
|
})
|
|
})
|