Implements Phases 1-8 of the TFTSR implementation plan. Rust backend (Tauri 2.x, src-tauri/): - Multi-provider AI: OpenAI-compatible, Anthropic, Gemini, Mistral, Ollama - PII detection engine: 11 regex patterns with overlap resolution - SQLCipher AES-256 encrypted database with 10 versioned migrations - 28 Tauri IPC commands for triage, analysis, document, and system ops - Ollama: hardware probe, model recommendations, pull/delete with events - RCA and blameless post-mortem Markdown document generators - PDF export via printpdf - Audit log: SHA-256 hash of every external data send - Integration stubs for Confluence, ServiceNow, Azure DevOps (v0.2) Frontend (React 18 + TypeScript + Vite, src/): - 9 pages: full triage workflow NewIssue→LogUpload→Triage→Resolution→RCA→Postmortem→History+Settings - 7 components: ChatWindow, TriageProgress, PiiDiffViewer, DocEditor, HardwareReport, ModelSelector, UI primitives - 3 Zustand stores: session, settings (persisted), history - Type-safe tauriCommands.ts matching Rust backend types exactly - 8 IT domain system prompts (Linux, Windows, Network, K8s, DB, Virt, HW, Obs) DevOps: - .woodpecker/test.yml: rustfmt, clippy, cargo test, tsc, vitest on every push - .woodpecker/release.yml: linux/amd64 + linux/arm64 builds, Gogs release upload Verified: - cargo check: zero errors - tsc --noEmit: zero errors - vitest run: 13/13 unit tests passing Co-Authored-By: Claude Sonnet 4.6 (1M context) <noreply@anthropic.com>
63 lines
2.2 KiB
JavaScript
63 lines
2.2 KiB
JavaScript
const outputFunctions = require('./output-functions');
|
|
const ValidationError = require('./errors/validation-error');
|
|
|
|
function validateParameters(params) {
|
|
// Coerce the protocol.
|
|
const protocol = params.protocol || undefined;
|
|
|
|
// The protocol can be nothing or http.
|
|
if (protocol && protocol !== 'http') throw new ValidationError('\'protocol\' can be nothing or http');
|
|
|
|
// Validate and coerce the port.
|
|
const port = params.port;
|
|
if (!port) throw new ValidationError('\'port\' is required.');
|
|
if (!Number.isInteger(port)) throw new ValidationError('\'port\' must be a number.');
|
|
if (port < 1) throw new ValidationError('\'port\' must be greater than 0.');
|
|
if (port > 65535) throw new ValidationError('\'port\' must not be greater than 65535.');
|
|
|
|
// Coerce the host.
|
|
const host = params.host || 'localhost';
|
|
|
|
// Coerce the path.
|
|
// If we have the http protocol, but no path, assume root.
|
|
const path = params.path || (protocol === 'http' ? '/' : undefined);
|
|
|
|
// Validate and coerce the interval.
|
|
const interval = params.interval || 1000;
|
|
if (!Number.isInteger(interval)) throw new ValidationError('\'interval\' must be a number.');
|
|
if (interval < 0) throw new ValidationError('\'interval\' must be greater or equal to 0.');
|
|
|
|
// Validate and coerce the timeout.
|
|
const timeout = params.timeout || 0;
|
|
if (!Number.isInteger(timeout)) throw new ValidationError('\'timeout\' must be a number.');
|
|
if (timeout < 0) throw new ValidationError('\'timeout\' must be greater or equal to 0.');
|
|
|
|
// Validate and coerce the wait-for-dns parameter.
|
|
const waitForDns = params.waitForDns || false;
|
|
if (typeof waitForDns !== 'boolean') throw new ValidationError('\'wait-for-dns\' must be a boolean.');
|
|
|
|
// Coerce the output.
|
|
const output = params.output || 'dots';
|
|
|
|
// The only valid output options are out named output functions.
|
|
if (!outputFunctions[output]) {
|
|
const validOutputFunctions = Object.keys(outputFunctions);
|
|
const set = validOutputFunctions.join(', ');
|
|
const errorMessage = `'output' must be in the set ${set}`;
|
|
throw new ValidationError(errorMessage);
|
|
}
|
|
|
|
return {
|
|
protocol,
|
|
port,
|
|
host,
|
|
path,
|
|
interval,
|
|
timeout,
|
|
output,
|
|
waitForDns,
|
|
};
|
|
}
|
|
|
|
module.exports = validateParameters;
|