AUTARCH v1.9 — remote monitoring, SSH manager, daemon, vault, cleanup
- Add Remote Monitoring Station with PIAP device profile system - Add SSH/SSHD manager with fail2ban integration - Add privileged daemon architecture for safe root operations - Add encrypted vault, HAL memory, HAL auto-analyst - Add network security suite, module creator, codex training - Add start.sh launcher script and GTK3 desktop launcher - Remove Output/ build artifacts, installer files, loose docs - Update .gitignore for runtime data and build artifacts - Update README for v1.9 with new launch method, screenshots, and features Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
This commit is contained in:
@@ -291,6 +291,7 @@ function wgServerStatus() {
|
||||
} else {
|
||||
wgResult('wg-dashboard-results', wgOk('Server status refreshed.'));
|
||||
}
|
||||
halAnalyze('WireGuard', JSON.stringify(data, null, 2), 'vpn status', 'network');
|
||||
});
|
||||
}
|
||||
|
||||
@@ -327,6 +328,7 @@ function wgRefreshPeers() {
|
||||
document.getElementById('wg-online-count').textContent = online;
|
||||
wgPopulateIpDropdowns();
|
||||
wgRenderPeersTable();
|
||||
halAnalyze('WireGuard', JSON.stringify(data, null, 2), 'vpn status', 'network');
|
||||
});
|
||||
}
|
||||
|
||||
@@ -382,6 +384,7 @@ function wgRefreshClients() {
|
||||
wgClients = data.clients || [];
|
||||
wgPopulateIpDropdowns();
|
||||
wgRenderClientsTable();
|
||||
halAnalyze('WireGuard', JSON.stringify(data, null, 2), 'vpn status', 'network');
|
||||
});
|
||||
}
|
||||
|
||||
@@ -432,6 +435,7 @@ function wgCreateClient() {
|
||||
wgResult('wg-clients-results', wgOk('Created: ' + c.name + ' (' + c.assigned_ip + ')'));
|
||||
document.getElementById('wg-new-name').value = '';
|
||||
wgRefreshClients();
|
||||
halAnalyze('WireGuard', JSON.stringify(data, null, 2), 'vpn status', 'network');
|
||||
} else {
|
||||
wgResult('wg-clients-results', wgErr(data.error || 'Failed'));
|
||||
}
|
||||
@@ -466,6 +470,7 @@ function wgViewClient(id) {
|
||||
h += '</div>';
|
||||
h += '<div id="wg-config-box" style="display:none;margin-top:10px"></div>';
|
||||
document.getElementById('wg-detail-content').innerHTML = h;
|
||||
halAnalyze('WireGuard', JSON.stringify(data, null, 2), 'vpn status', 'network');
|
||||
});
|
||||
}
|
||||
|
||||
@@ -532,6 +537,7 @@ function wgAdbAutoConnect() {
|
||||
});
|
||||
wgResult('wg-adb-results', h);
|
||||
wgAdbDevices();
|
||||
halAnalyze('WireGuard', JSON.stringify(data, null, 2), 'vpn status', 'network');
|
||||
});
|
||||
}
|
||||
|
||||
@@ -549,6 +555,7 @@ function wgAdbDevices() {
|
||||
});
|
||||
h += '</tbody></table>';
|
||||
el.innerHTML = h;
|
||||
halAnalyze('WireGuard', JSON.stringify(data, null, 2), 'vpn status', 'network');
|
||||
});
|
||||
}
|
||||
|
||||
@@ -561,6 +568,7 @@ function wgUsbipStatus() {
|
||||
txt.textContent = data.modules_loaded ? 'Loaded' : 'Not loaded';
|
||||
document.getElementById('wg-usbip-imports').textContent = data.active_imports || '0';
|
||||
wgUsbipPorts();
|
||||
halAnalyze('WireGuard', JSON.stringify(data, null, 2), 'vpn status', 'network');
|
||||
});
|
||||
}
|
||||
|
||||
@@ -596,6 +604,7 @@ function wgUsbipListRemote() {
|
||||
});
|
||||
h += '</tbody></table>';
|
||||
el.innerHTML = h;
|
||||
halAnalyze('WireGuard', JSON.stringify(data, null, 2), 'vpn status', 'network');
|
||||
});
|
||||
}
|
||||
|
||||
@@ -632,6 +641,7 @@ function wgUsbipPorts() {
|
||||
});
|
||||
h += '</tbody></table>';
|
||||
el.innerHTML = h;
|
||||
halAnalyze('WireGuard', JSON.stringify(data, null, 2), 'vpn status', 'network');
|
||||
});
|
||||
}
|
||||
|
||||
|
||||
Reference in New Issue
Block a user