tftsr-devops_investigation/src-tauri/target/debug/.fingerprint/iota-crypto-768b0be5e9a1a058/build-script-build-script-build.json
Shaun Arman 8839075805 feat: initial implementation of TFTSR IT Triage & RCA application
Implements Phases 1-8 of the TFTSR implementation plan.

Rust backend (Tauri 2.x, src-tauri/):
- Multi-provider AI: OpenAI-compatible, Anthropic, Gemini, Mistral, Ollama
- PII detection engine: 11 regex patterns with overlap resolution
- SQLCipher AES-256 encrypted database with 10 versioned migrations
- 28 Tauri IPC commands for triage, analysis, document, and system ops
- Ollama: hardware probe, model recommendations, pull/delete with events
- RCA and blameless post-mortem Markdown document generators
- PDF export via printpdf
- Audit log: SHA-256 hash of every external data send
- Integration stubs for Confluence, ServiceNow, Azure DevOps (v0.2)

Frontend (React 18 + TypeScript + Vite, src/):
- 9 pages: full triage workflow NewIssue→LogUpload→Triage→Resolution→RCA→Postmortem→History+Settings
- 7 components: ChatWindow, TriageProgress, PiiDiffViewer, DocEditor, HardwareReport, ModelSelector, UI primitives
- 3 Zustand stores: session, settings (persisted), history
- Type-safe tauriCommands.ts matching Rust backend types exactly
- 8 IT domain system prompts (Linux, Windows, Network, K8s, DB, Virt, HW, Obs)

DevOps:
- .woodpecker/test.yml: rustfmt, clippy, cargo test, tsc, vitest on every push
- .woodpecker/release.yml: linux/amd64 + linux/arm64 builds, Gogs release upload

Verified:
- cargo check: zero errors
- tsc --noEmit: zero errors
- vitest run: 13/13 unit tests passing

Co-Authored-By: Claude Sonnet 4.6 (1M context) <noreply@anthropic.com>
2026-03-14 22:36:25 -05:00

1 line
1.5 KiB
JSON

{"rustc":9435880562281667341,"features":"[\"aead\", \"aes-gcm\", \"aes-kw\", \"age\", \"base64\", \"bip39\", \"bip39-en\", \"bip39-jp\", \"blake2\", \"blake2b\", \"chacha\", \"chacha20poly1305\", \"cipher\", \"curve25519-dalek\", \"default\", \"digest\", \"ed25519\", \"ed25519-zebra\", \"generic-array\", \"getrandom\", \"hmac\", \"keccak\", \"pbkdf2\", \"rand\", \"random\", \"secp256k1\", \"sha\", \"slip10\", \"std\", \"x25519\", \"x25519-dalek\", \"zeroize\"]","declared_features":"[\"aead\", \"aes\", \"aes-cbc\", \"aes-gcm\", \"aes-kw\", \"age\", \"base64\", \"bee-common-derive\", \"bip39\", \"bip39-en\", \"bip39-jp\", \"bip44\", \"blake2\", \"blake2b\", \"byteorder\", \"chacha\", \"chacha20poly1305\", \"cipher\", \"cpufeatures\", \"curl-p\", \"curve25519-dalek\", \"default\", \"digest\", \"ed25519\", \"ed25519-zebra\", \"generic-array\", \"getrandom\", \"hmac\", \"keccak\", \"kerl_deprecated_do_not_use\", \"lazy_static\", \"num-traits\", \"pbkdf2\", \"rand\", \"random\", \"secp256k1\", \"serde\", \"sha\", \"sha3\", \"slip10\", \"std\", \"subtle\", \"ternary_encoding\", \"ternary_hashes\", \"ternary_keys\", \"ternary_signatures\", \"wots_deprecated_do_not_use\", \"x25519\", \"x25519-dalek\", \"zeroize\"]","target":5408242616063297496,"profile":16320666045629331189,"path":1470384464182186774,"deps":[[13927012481677012980,"autocfg",false,10089883055318768961]],"local":[{"CheckDepInfo":{"dep_info":"debug/.fingerprint/iota-crypto-768b0be5e9a1a058/dep-build-script-build-script-build","checksum":false}}],"rustflags":[],"config":8247474407144887393,"compile_kind":0}