Implements Phases 1-8 of the TFTSR implementation plan. Rust backend (Tauri 2.x, src-tauri/): - Multi-provider AI: OpenAI-compatible, Anthropic, Gemini, Mistral, Ollama - PII detection engine: 11 regex patterns with overlap resolution - SQLCipher AES-256 encrypted database with 10 versioned migrations - 28 Tauri IPC commands for triage, analysis, document, and system ops - Ollama: hardware probe, model recommendations, pull/delete with events - RCA and blameless post-mortem Markdown document generators - PDF export via printpdf - Audit log: SHA-256 hash of every external data send - Integration stubs for Confluence, ServiceNow, Azure DevOps (v0.2) Frontend (React 18 + TypeScript + Vite, src/): - 9 pages: full triage workflow NewIssue→LogUpload→Triage→Resolution→RCA→Postmortem→History+Settings - 7 components: ChatWindow, TriageProgress, PiiDiffViewer, DocEditor, HardwareReport, ModelSelector, UI primitives - 3 Zustand stores: session, settings (persisted), history - Type-safe tauriCommands.ts matching Rust backend types exactly - 8 IT domain system prompts (Linux, Windows, Network, K8s, DB, Virt, HW, Obs) DevOps: - .woodpecker/test.yml: rustfmt, clippy, cargo test, tsc, vitest on every push - .woodpecker/release.yml: linux/amd64 + linux/arm64 builds, Gogs release upload Verified: - cargo check: zero errors - tsc --noEmit: zero errors - vitest run: 13/13 unit tests passing Co-Authored-By: Claude Sonnet 4.6 (1M context) <noreply@anthropic.com>
34 lines
1.5 KiB
JavaScript
34 lines
1.5 KiB
JavaScript
const TargetError = require('./errors/target-error');
|
|
|
|
function extractTarget(target) {
|
|
if (!target) throw new TargetError('\'target\' is required');
|
|
|
|
// First, check to see if we have a protocol specified.
|
|
const protocol = target.toLowerCase().startsWith('http://') ? 'http' : undefined;
|
|
|
|
// If we have a protocol, we can rip it out of the string.
|
|
target = protocol ? target.substring('http://'.length) : target;
|
|
|
|
// If we have a protocol, we can also rip out the path (if there is one).
|
|
const pathStart = target.indexOf('/');
|
|
const path = pathStart !== -1 ? target.substring(pathStart) : undefined;
|
|
target = pathStart !== -1 ? target.substring(0, pathStart) : target;
|
|
|
|
// Split the target by the separator (which might not be present.
|
|
const split = target.split(':');
|
|
if (split.length > 2) throw new TargetError(`'${target}' is an invalid target, it has more than two ':' symbols`);
|
|
|
|
// Grab the host and port (which will still be a string).
|
|
const host = split.length === 2 ? (split[0] || undefined) : undefined;
|
|
const portString = split.length === 1 ? split[0] : split[1];
|
|
|
|
// Make sure the port is numeric.
|
|
if (!/^[0-9]+$/.test(portString)) throw new TargetError(`'${target}' is an invalid target, '${portString}' is not a valid port number - try something like 'host:port'`);
|
|
const port = parseInt(portString, 10);
|
|
|
|
// That's it, return the extracted target.
|
|
return { protocol, host, port, path };
|
|
}
|
|
|
|
module.exports = extractTarget;
|