File size: 12,477 Bytes
fd357f4
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
#!/usr/bin/env python3
"""
DTO CI Validation Script
Implements validation gates required by OPERATING_AGREEMENT.md
"""

import os
import sys
import yaml
import json
import subprocess
from pathlib import Path
from typing import Dict, Any, List, Tuple

class DTOCIValidator:
    def __init__(self):
        self.root_path = Path(__file__).parent
        self.manifest_path = self.root_path / "dto_manifest.yaml"
        self.codeowners_path = self.root_path / "CODEOWNERS"
        self.errors = []
        self.warnings = []
        
    def load_manifest(self) -> Dict[str, Any]:
        """Load and parse DTO manifest"""
        if not self.manifest_path.exists():
            self.errors.append("DTO manifest not found")
            return {}
        
        try:
            with open(self.manifest_path, 'r') as f:
                return yaml.safe_load(f)
        except Exception as e:
            self.errors.append(f"Failed to parse manifest: {e}")
            return {}
    
    def validate_schema(self) -> bool:
        """Validate manifest schema compliance"""
        print("πŸ” Validating DTO manifest schema...")
        
        manifest = self.load_manifest()
        if not manifest:
            return False
        
        # Required top-level fields
        required_fields = [
            'apiVersion', 'kind', 'metadata', 'services', 
            'slo_specifications', 'port_registry', 'validation'
        ]
        
        for field in required_fields:
            if field not in manifest:
                self.errors.append(f"Missing required field: {field}")
        
        # Validate API version
        if manifest.get('apiVersion') != 'dto/v1':
            self.errors.append(f"Invalid API version: {manifest.get('apiVersion')}")
        
        # Validate kind
        if manifest.get('kind') != 'ServiceManifest':
            self.errors.append(f"Invalid kind: {manifest.get('kind')}")
        
        # Validate metadata
        metadata = manifest.get('metadata', {})
        required_metadata = ['name', 'namespace', 'version', 'owner']
        for field in required_metadata:
            if field not in metadata:
                self.errors.append(f"Missing metadata field: {field}")
        
        if self.errors:
            print("❌ Schema validation failed")
            return False
        
        print("βœ… Schema validation passed")
        return True
    
    def validate_port_conflicts(self) -> bool:
        """Check for port conflicts across services"""
        print("πŸ” Checking for port conflicts...")
        
        manifest = self.load_manifest()
        if not manifest:
            return False
        
        used_ports = {}
        
        for category, services in manifest.get('services', {}).items():
            for service in services:
                service_name = service['name']
                for port in service.get('ports', []):
                    if port in used_ports:
                        self.errors.append(
                            f"Port conflict: {port} used by both {used_ports[port]} and {service_name}"
                        )
                    else:
                        used_ports[port] = service_name
        
        if self.errors:
            print("❌ Port conflict validation failed")
            return False
        
        print("βœ… No port conflicts found")
        return True
    
    def validate_dependencies(self) -> bool:
        """Validate service dependencies exist and are valid"""
        print("πŸ” Validating service dependencies...")
        
        manifest = self.load_manifest()
        if not manifest:
            return False
        
        # Build service registry
        all_services = set()
        for category, services in manifest.get('services', {}).items():
            for service in services:
                all_services.add(service['name'])
        
        # Check dependencies
        for category, services in manifest.get('services', {}).items():
            for service in services:
                for dep in service.get('dependencies', []):
                    if dep not in all_services:
                        self.errors.append(
                            f"Service {service['name']} depends on non-existent service: {dep}"
                        )
        
        if self.errors:
            print("❌ Dependency validation failed")
            return False
        
        print("βœ… All dependencies validated")
        return True
    
    def validate_slo_compliance(self) -> bool:
        """Validate SLO tier assignments and specifications"""
        print("πŸ” Validating SLO compliance...")
        
        manifest = self.load_manifest()
        if not manifest:
            return False
        
        slo_specs = manifest.get('slo_specifications', {})
        valid_tiers = set(slo_specs.keys())
        
        for category, services in manifest.get('services', {}).items():
            for service in services:
                slo_tier = service.get('slo_tier')
                if not slo_tier:
                    self.errors.append(f"Service {service['name']} missing SLO tier")
                elif slo_tier not in valid_tiers:
                    self.errors.append(
                        f"Service {service['name']} has invalid SLO tier: {slo_tier}"
                    )
        
        # Validate SLO specification structure
        required_slo_fields = ['availability', 'latency_p99', 'recovery_time', 'max_downtime']
        for tier, spec in slo_specs.items():
            for field in required_slo_fields:
                if field not in spec:
                    self.errors.append(f"SLO tier {tier} missing field: {field}")
        
        if self.errors:
            print("❌ SLO compliance validation failed")
            return False
        
        print("βœ… SLO compliance validated")
        return True
    
    def validate_codeowners(self) -> bool:
        """Validate CODEOWNERS file exists and has required entries"""
        print("πŸ” Validating CODEOWNERS...")
        
        if not self.codeowners_path.exists():
            self.errors.append("CODEOWNERS file not found")
            return False
        
        try:
            with open(self.codeowners_path, 'r') as f:
                codeowners_content = f.read()
        except Exception as e:
            self.errors.append(f"Failed to read CODEOWNERS: {e}")
            return False
        
        # Required ownership patterns
        required_patterns = [
            '/data/adaptai/platform/dataops/dto/',
            '/data/adaptai/platform/dataops/dto/dto_manifest.yaml',
            '/data/adaptai/platform/dataops/dto/CODEOWNERS',
            '/data/adaptai/platform/dataops/dto/services/',
            '/data/adaptai/platform/dataops/dto/generated/'
        ]
        
        for pattern in required_patterns:
            if pattern not in codeowners_content:
                self.errors.append(f"CODEOWNERS missing required pattern: {pattern}")
        
        if self.errors:
            print("❌ CODEOWNERS validation failed")
            return False
        
        print("βœ… CODEOWNERS validation passed")
        return True
    
    def validate_generated_artifacts(self) -> bool:
        """Validate that generated artifacts exist and are up-to-date"""
        print("πŸ” Validating generated artifacts...")
        
        generated_path = self.root_path / "generated"
        if not generated_path.exists():
            self.errors.append("Generated artifacts directory not found")
            return False
        
        # Check for required generated files
        required_files = [
            "supervisord-production.conf",
            # Add more required generated files as needed
        ]
        
        for file_name in required_files:
            file_path = generated_path / file_name
            if not file_path.exists():
                self.errors.append(f"Missing generated file: {file_name}")
        
        # Check if runbooks exist
        runbooks_path = self.root_path / "docs" / "runbooks"
        if not runbooks_path.exists():
            self.errors.append("Runbooks directory not found")
        else:
            # Should have at least some runbooks
            runbook_files = list(runbooks_path.glob("*-runbook.md"))
            if not runbook_files:
                self.errors.append("No runbooks found")
        
        if self.errors:
            print("❌ Generated artifacts validation failed")
            return False
        
        print("βœ… Generated artifacts validated")
        return True
    
    def validate_syncthing_policy(self) -> bool:
        """Validate Syncthing narrow usage policy compliance"""
        print("πŸ” Validating Syncthing policy...")
        
        manifest = self.load_manifest()
        if not manifest:
            return False
        
        syncthing_config = manifest.get('syncthing', {})
        
        if syncthing_config.get('enabled'):
            # Check data class restrictions
            allowed_classes = syncthing_config.get('data_classes', [])
            if not set(allowed_classes).issubset({'CLASS_B', 'CLASS_C'}):
                self.errors.append("Syncthing can only be used for CLASS_B and CLASS_C data")
            
            # Check excluded paths
            excluded_paths = syncthing_config.get('excluded_paths', [])
            required_exclusions = ['/.git/*', '/logs/*', '*.tmp', '*.log']
            for exclusion in required_exclusions:
                if exclusion not in excluded_paths:
                    self.warnings.append(f"Consider excluding path: {exclusion}")
            
            # Check bandwidth limits
            bandwidth_limits = syncthing_config.get('bandwidth_limits', {})
            if not bandwidth_limits:
                self.warnings.append("Bandwidth limits not specified for Syncthing")
        
        if self.errors:
            print("❌ Syncthing policy validation failed")
            return False
        
        print("βœ… Syncthing policy validated")
        return True
    
    def validate_environment_overlays(self) -> bool:
        """Validate environment overlay structure"""
        print("πŸ” Validating environment overlays...")
        
        manifest = self.load_manifest()
        if not manifest:
            return False
        
        environments = manifest.get('environments', {})
        overlays_path = self.root_path / "overlays"
        
        for env_name in environments.keys():
            env_overlay_path = overlays_path / env_name / "config.yaml"
            if not env_overlay_path.exists():
                self.errors.append(f"Missing overlay for environment: {env_name}")
        
        if self.errors:
            print("❌ Environment overlay validation failed")
            return False
        
        print("βœ… Environment overlays validated")
        return True
    
    def run_validation(self) -> Tuple[bool, List[str], List[str]]:
        """Run all validation checks"""
        print("πŸš€ Running DTO CI validation...")
        print("=" * 50)
        
        validations = [
            self.validate_schema,
            self.validate_port_conflicts,
            self.validate_dependencies,
            self.validate_slo_compliance,
            self.validate_codeowners,
            self.validate_generated_artifacts,
            self.validate_syncthing_policy,
            self.validate_environment_overlays
        ]
        
        all_passed = True
        for validation in validations:
            if not validation():
                all_passed = False
        
        print("=" * 50)
        
        if all_passed:
            print("βœ… All CI validation checks passed!")
        else:
            print("❌ CI validation failed!")
            print("\nErrors:")
            for error in self.errors:
                print(f"  - {error}")
        
        if self.warnings:
            print("\nWarnings:")
            for warning in self.warnings:
                print(f"  - {warning}")
        
        return all_passed, self.errors, self.warnings

def main():
    """CLI entry point"""
    validator = DTOCIValidator()
    success, errors, warnings = validator.run_validation()
    
    # Exit with appropriate code for CI systems
    sys.exit(0 if success else 1)

if __name__ == "__main__":
    main()