| | |
| | """ |
| | DTO CI Validation Script |
| | Implements validation gates required by OPERATING_AGREEMENT.md |
| | """ |
| |
|
| | import os |
| | import sys |
| | import yaml |
| | import json |
| | import subprocess |
| | from pathlib import Path |
| | from typing import Dict, Any, List, Tuple |
| |
|
| | class DTOCIValidator: |
| | def __init__(self): |
| | self.root_path = Path(__file__).parent |
| | self.manifest_path = self.root_path / "dto_manifest.yaml" |
| | self.codeowners_path = self.root_path / "CODEOWNERS" |
| | self.errors = [] |
| | self.warnings = [] |
| | |
| | def load_manifest(self) -> Dict[str, Any]: |
| | """Load and parse DTO manifest""" |
| | if not self.manifest_path.exists(): |
| | self.errors.append("DTO manifest not found") |
| | return {} |
| | |
| | try: |
| | with open(self.manifest_path, 'r') as f: |
| | return yaml.safe_load(f) |
| | except Exception as e: |
| | self.errors.append(f"Failed to parse manifest: {e}") |
| | return {} |
| | |
| | def validate_schema(self) -> bool: |
| | """Validate manifest schema compliance""" |
| | print("π Validating DTO manifest schema...") |
| | |
| | manifest = self.load_manifest() |
| | if not manifest: |
| | return False |
| | |
| | |
| | required_fields = [ |
| | 'apiVersion', 'kind', 'metadata', 'services', |
| | 'slo_specifications', 'port_registry', 'validation' |
| | ] |
| | |
| | for field in required_fields: |
| | if field not in manifest: |
| | self.errors.append(f"Missing required field: {field}") |
| | |
| | |
| | if manifest.get('apiVersion') != 'dto/v1': |
| | self.errors.append(f"Invalid API version: {manifest.get('apiVersion')}") |
| | |
| | |
| | if manifest.get('kind') != 'ServiceManifest': |
| | self.errors.append(f"Invalid kind: {manifest.get('kind')}") |
| | |
| | |
| | metadata = manifest.get('metadata', {}) |
| | required_metadata = ['name', 'namespace', 'version', 'owner'] |
| | for field in required_metadata: |
| | if field not in metadata: |
| | self.errors.append(f"Missing metadata field: {field}") |
| | |
| | if self.errors: |
| | print("β Schema validation failed") |
| | return False |
| | |
| | print("β
Schema validation passed") |
| | return True |
| | |
| | def validate_port_conflicts(self) -> bool: |
| | """Check for port conflicts across services""" |
| | print("π Checking for port conflicts...") |
| | |
| | manifest = self.load_manifest() |
| | if not manifest: |
| | return False |
| | |
| | used_ports = {} |
| | |
| | for category, services in manifest.get('services', {}).items(): |
| | for service in services: |
| | service_name = service['name'] |
| | for port in service.get('ports', []): |
| | if port in used_ports: |
| | self.errors.append( |
| | f"Port conflict: {port} used by both {used_ports[port]} and {service_name}" |
| | ) |
| | else: |
| | used_ports[port] = service_name |
| | |
| | if self.errors: |
| | print("β Port conflict validation failed") |
| | return False |
| | |
| | print("β
No port conflicts found") |
| | return True |
| | |
| | def validate_dependencies(self) -> bool: |
| | """Validate service dependencies exist and are valid""" |
| | print("π Validating service dependencies...") |
| | |
| | manifest = self.load_manifest() |
| | if not manifest: |
| | return False |
| | |
| | |
| | all_services = set() |
| | for category, services in manifest.get('services', {}).items(): |
| | for service in services: |
| | all_services.add(service['name']) |
| | |
| | |
| | for category, services in manifest.get('services', {}).items(): |
| | for service in services: |
| | for dep in service.get('dependencies', []): |
| | if dep not in all_services: |
| | self.errors.append( |
| | f"Service {service['name']} depends on non-existent service: {dep}" |
| | ) |
| | |
| | if self.errors: |
| | print("β Dependency validation failed") |
| | return False |
| | |
| | print("β
All dependencies validated") |
| | return True |
| | |
| | def validate_slo_compliance(self) -> bool: |
| | """Validate SLO tier assignments and specifications""" |
| | print("π Validating SLO compliance...") |
| | |
| | manifest = self.load_manifest() |
| | if not manifest: |
| | return False |
| | |
| | slo_specs = manifest.get('slo_specifications', {}) |
| | valid_tiers = set(slo_specs.keys()) |
| | |
| | for category, services in manifest.get('services', {}).items(): |
| | for service in services: |
| | slo_tier = service.get('slo_tier') |
| | if not slo_tier: |
| | self.errors.append(f"Service {service['name']} missing SLO tier") |
| | elif slo_tier not in valid_tiers: |
| | self.errors.append( |
| | f"Service {service['name']} has invalid SLO tier: {slo_tier}" |
| | ) |
| | |
| | |
| | required_slo_fields = ['availability', 'latency_p99', 'recovery_time', 'max_downtime'] |
| | for tier, spec in slo_specs.items(): |
| | for field in required_slo_fields: |
| | if field not in spec: |
| | self.errors.append(f"SLO tier {tier} missing field: {field}") |
| | |
| | if self.errors: |
| | print("β SLO compliance validation failed") |
| | return False |
| | |
| | print("β
SLO compliance validated") |
| | return True |
| | |
| | def validate_codeowners(self) -> bool: |
| | """Validate CODEOWNERS file exists and has required entries""" |
| | print("π Validating CODEOWNERS...") |
| | |
| | if not self.codeowners_path.exists(): |
| | self.errors.append("CODEOWNERS file not found") |
| | return False |
| | |
| | try: |
| | with open(self.codeowners_path, 'r') as f: |
| | codeowners_content = f.read() |
| | except Exception as e: |
| | self.errors.append(f"Failed to read CODEOWNERS: {e}") |
| | return False |
| | |
| | |
| | required_patterns = [ |
| | '/data/adaptai/platform/dataops/dto/', |
| | '/data/adaptai/platform/dataops/dto/dto_manifest.yaml', |
| | '/data/adaptai/platform/dataops/dto/CODEOWNERS', |
| | '/data/adaptai/platform/dataops/dto/services/', |
| | '/data/adaptai/platform/dataops/dto/generated/' |
| | ] |
| | |
| | for pattern in required_patterns: |
| | if pattern not in codeowners_content: |
| | self.errors.append(f"CODEOWNERS missing required pattern: {pattern}") |
| | |
| | if self.errors: |
| | print("β CODEOWNERS validation failed") |
| | return False |
| | |
| | print("β
CODEOWNERS validation passed") |
| | return True |
| | |
| | def validate_generated_artifacts(self) -> bool: |
| | """Validate that generated artifacts exist and are up-to-date""" |
| | print("π Validating generated artifacts...") |
| | |
| | generated_path = self.root_path / "generated" |
| | if not generated_path.exists(): |
| | self.errors.append("Generated artifacts directory not found") |
| | return False |
| | |
| | |
| | required_files = [ |
| | "supervisord-production.conf", |
| | |
| | ] |
| | |
| | for file_name in required_files: |
| | file_path = generated_path / file_name |
| | if not file_path.exists(): |
| | self.errors.append(f"Missing generated file: {file_name}") |
| | |
| | |
| | runbooks_path = self.root_path / "docs" / "runbooks" |
| | if not runbooks_path.exists(): |
| | self.errors.append("Runbooks directory not found") |
| | else: |
| | |
| | runbook_files = list(runbooks_path.glob("*-runbook.md")) |
| | if not runbook_files: |
| | self.errors.append("No runbooks found") |
| | |
| | if self.errors: |
| | print("β Generated artifacts validation failed") |
| | return False |
| | |
| | print("β
Generated artifacts validated") |
| | return True |
| | |
| | def validate_syncthing_policy(self) -> bool: |
| | """Validate Syncthing narrow usage policy compliance""" |
| | print("π Validating Syncthing policy...") |
| | |
| | manifest = self.load_manifest() |
| | if not manifest: |
| | return False |
| | |
| | syncthing_config = manifest.get('syncthing', {}) |
| | |
| | if syncthing_config.get('enabled'): |
| | |
| | allowed_classes = syncthing_config.get('data_classes', []) |
| | if not set(allowed_classes).issubset({'CLASS_B', 'CLASS_C'}): |
| | self.errors.append("Syncthing can only be used for CLASS_B and CLASS_C data") |
| | |
| | |
| | excluded_paths = syncthing_config.get('excluded_paths', []) |
| | required_exclusions = ['/.git/*', '/logs/*', '*.tmp', '*.log'] |
| | for exclusion in required_exclusions: |
| | if exclusion not in excluded_paths: |
| | self.warnings.append(f"Consider excluding path: {exclusion}") |
| | |
| | |
| | bandwidth_limits = syncthing_config.get('bandwidth_limits', {}) |
| | if not bandwidth_limits: |
| | self.warnings.append("Bandwidth limits not specified for Syncthing") |
| | |
| | if self.errors: |
| | print("β Syncthing policy validation failed") |
| | return False |
| | |
| | print("β
Syncthing policy validated") |
| | return True |
| | |
| | def validate_environment_overlays(self) -> bool: |
| | """Validate environment overlay structure""" |
| | print("π Validating environment overlays...") |
| | |
| | manifest = self.load_manifest() |
| | if not manifest: |
| | return False |
| | |
| | environments = manifest.get('environments', {}) |
| | overlays_path = self.root_path / "overlays" |
| | |
| | for env_name in environments.keys(): |
| | env_overlay_path = overlays_path / env_name / "config.yaml" |
| | if not env_overlay_path.exists(): |
| | self.errors.append(f"Missing overlay for environment: {env_name}") |
| | |
| | if self.errors: |
| | print("β Environment overlay validation failed") |
| | return False |
| | |
| | print("β
Environment overlays validated") |
| | return True |
| | |
| | def run_validation(self) -> Tuple[bool, List[str], List[str]]: |
| | """Run all validation checks""" |
| | print("π Running DTO CI validation...") |
| | print("=" * 50) |
| | |
| | validations = [ |
| | self.validate_schema, |
| | self.validate_port_conflicts, |
| | self.validate_dependencies, |
| | self.validate_slo_compliance, |
| | self.validate_codeowners, |
| | self.validate_generated_artifacts, |
| | self.validate_syncthing_policy, |
| | self.validate_environment_overlays |
| | ] |
| | |
| | all_passed = True |
| | for validation in validations: |
| | if not validation(): |
| | all_passed = False |
| | |
| | print("=" * 50) |
| | |
| | if all_passed: |
| | print("β
All CI validation checks passed!") |
| | else: |
| | print("β CI validation failed!") |
| | print("\nErrors:") |
| | for error in self.errors: |
| | print(f" - {error}") |
| | |
| | if self.warnings: |
| | print("\nWarnings:") |
| | for warning in self.warnings: |
| | print(f" - {warning}") |
| | |
| | return all_passed, self.errors, self.warnings |
| |
|
| | def main(): |
| | """CLI entry point""" |
| | validator = DTOCIValidator() |
| | success, errors, warnings = validator.run_validation() |
| | |
| | |
| | sys.exit(0 if success else 1) |
| |
|
| | if __name__ == "__main__": |
| | main() |