adaptai / platform /dataops /dto /validate-ci.py
ADAPT-Chase's picture
Add files using upload-large-folder tool
fd357f4 verified
#!/usr/bin/env python3
"""
DTO CI Validation Script
Implements validation gates required by OPERATING_AGREEMENT.md
"""
import os
import sys
import yaml
import json
import subprocess
from pathlib import Path
from typing import Dict, Any, List, Tuple
class DTOCIValidator:
def __init__(self):
self.root_path = Path(__file__).parent
self.manifest_path = self.root_path / "dto_manifest.yaml"
self.codeowners_path = self.root_path / "CODEOWNERS"
self.errors = []
self.warnings = []
def load_manifest(self) -> Dict[str, Any]:
"""Load and parse DTO manifest"""
if not self.manifest_path.exists():
self.errors.append("DTO manifest not found")
return {}
try:
with open(self.manifest_path, 'r') as f:
return yaml.safe_load(f)
except Exception as e:
self.errors.append(f"Failed to parse manifest: {e}")
return {}
def validate_schema(self) -> bool:
"""Validate manifest schema compliance"""
print("πŸ” Validating DTO manifest schema...")
manifest = self.load_manifest()
if not manifest:
return False
# Required top-level fields
required_fields = [
'apiVersion', 'kind', 'metadata', 'services',
'slo_specifications', 'port_registry', 'validation'
]
for field in required_fields:
if field not in manifest:
self.errors.append(f"Missing required field: {field}")
# Validate API version
if manifest.get('apiVersion') != 'dto/v1':
self.errors.append(f"Invalid API version: {manifest.get('apiVersion')}")
# Validate kind
if manifest.get('kind') != 'ServiceManifest':
self.errors.append(f"Invalid kind: {manifest.get('kind')}")
# Validate metadata
metadata = manifest.get('metadata', {})
required_metadata = ['name', 'namespace', 'version', 'owner']
for field in required_metadata:
if field not in metadata:
self.errors.append(f"Missing metadata field: {field}")
if self.errors:
print("❌ Schema validation failed")
return False
print("βœ… Schema validation passed")
return True
def validate_port_conflicts(self) -> bool:
"""Check for port conflicts across services"""
print("πŸ” Checking for port conflicts...")
manifest = self.load_manifest()
if not manifest:
return False
used_ports = {}
for category, services in manifest.get('services', {}).items():
for service in services:
service_name = service['name']
for port in service.get('ports', []):
if port in used_ports:
self.errors.append(
f"Port conflict: {port} used by both {used_ports[port]} and {service_name}"
)
else:
used_ports[port] = service_name
if self.errors:
print("❌ Port conflict validation failed")
return False
print("βœ… No port conflicts found")
return True
def validate_dependencies(self) -> bool:
"""Validate service dependencies exist and are valid"""
print("πŸ” Validating service dependencies...")
manifest = self.load_manifest()
if not manifest:
return False
# Build service registry
all_services = set()
for category, services in manifest.get('services', {}).items():
for service in services:
all_services.add(service['name'])
# Check dependencies
for category, services in manifest.get('services', {}).items():
for service in services:
for dep in service.get('dependencies', []):
if dep not in all_services:
self.errors.append(
f"Service {service['name']} depends on non-existent service: {dep}"
)
if self.errors:
print("❌ Dependency validation failed")
return False
print("βœ… All dependencies validated")
return True
def validate_slo_compliance(self) -> bool:
"""Validate SLO tier assignments and specifications"""
print("πŸ” Validating SLO compliance...")
manifest = self.load_manifest()
if not manifest:
return False
slo_specs = manifest.get('slo_specifications', {})
valid_tiers = set(slo_specs.keys())
for category, services in manifest.get('services', {}).items():
for service in services:
slo_tier = service.get('slo_tier')
if not slo_tier:
self.errors.append(f"Service {service['name']} missing SLO tier")
elif slo_tier not in valid_tiers:
self.errors.append(
f"Service {service['name']} has invalid SLO tier: {slo_tier}"
)
# Validate SLO specification structure
required_slo_fields = ['availability', 'latency_p99', 'recovery_time', 'max_downtime']
for tier, spec in slo_specs.items():
for field in required_slo_fields:
if field not in spec:
self.errors.append(f"SLO tier {tier} missing field: {field}")
if self.errors:
print("❌ SLO compliance validation failed")
return False
print("βœ… SLO compliance validated")
return True
def validate_codeowners(self) -> bool:
"""Validate CODEOWNERS file exists and has required entries"""
print("πŸ” Validating CODEOWNERS...")
if not self.codeowners_path.exists():
self.errors.append("CODEOWNERS file not found")
return False
try:
with open(self.codeowners_path, 'r') as f:
codeowners_content = f.read()
except Exception as e:
self.errors.append(f"Failed to read CODEOWNERS: {e}")
return False
# Required ownership patterns
required_patterns = [
'/data/adaptai/platform/dataops/dto/',
'/data/adaptai/platform/dataops/dto/dto_manifest.yaml',
'/data/adaptai/platform/dataops/dto/CODEOWNERS',
'/data/adaptai/platform/dataops/dto/services/',
'/data/adaptai/platform/dataops/dto/generated/'
]
for pattern in required_patterns:
if pattern not in codeowners_content:
self.errors.append(f"CODEOWNERS missing required pattern: {pattern}")
if self.errors:
print("❌ CODEOWNERS validation failed")
return False
print("βœ… CODEOWNERS validation passed")
return True
def validate_generated_artifacts(self) -> bool:
"""Validate that generated artifacts exist and are up-to-date"""
print("πŸ” Validating generated artifacts...")
generated_path = self.root_path / "generated"
if not generated_path.exists():
self.errors.append("Generated artifacts directory not found")
return False
# Check for required generated files
required_files = [
"supervisord-production.conf",
# Add more required generated files as needed
]
for file_name in required_files:
file_path = generated_path / file_name
if not file_path.exists():
self.errors.append(f"Missing generated file: {file_name}")
# Check if runbooks exist
runbooks_path = self.root_path / "docs" / "runbooks"
if not runbooks_path.exists():
self.errors.append("Runbooks directory not found")
else:
# Should have at least some runbooks
runbook_files = list(runbooks_path.glob("*-runbook.md"))
if not runbook_files:
self.errors.append("No runbooks found")
if self.errors:
print("❌ Generated artifacts validation failed")
return False
print("βœ… Generated artifacts validated")
return True
def validate_syncthing_policy(self) -> bool:
"""Validate Syncthing narrow usage policy compliance"""
print("πŸ” Validating Syncthing policy...")
manifest = self.load_manifest()
if not manifest:
return False
syncthing_config = manifest.get('syncthing', {})
if syncthing_config.get('enabled'):
# Check data class restrictions
allowed_classes = syncthing_config.get('data_classes', [])
if not set(allowed_classes).issubset({'CLASS_B', 'CLASS_C'}):
self.errors.append("Syncthing can only be used for CLASS_B and CLASS_C data")
# Check excluded paths
excluded_paths = syncthing_config.get('excluded_paths', [])
required_exclusions = ['/.git/*', '/logs/*', '*.tmp', '*.log']
for exclusion in required_exclusions:
if exclusion not in excluded_paths:
self.warnings.append(f"Consider excluding path: {exclusion}")
# Check bandwidth limits
bandwidth_limits = syncthing_config.get('bandwidth_limits', {})
if not bandwidth_limits:
self.warnings.append("Bandwidth limits not specified for Syncthing")
if self.errors:
print("❌ Syncthing policy validation failed")
return False
print("βœ… Syncthing policy validated")
return True
def validate_environment_overlays(self) -> bool:
"""Validate environment overlay structure"""
print("πŸ” Validating environment overlays...")
manifest = self.load_manifest()
if not manifest:
return False
environments = manifest.get('environments', {})
overlays_path = self.root_path / "overlays"
for env_name in environments.keys():
env_overlay_path = overlays_path / env_name / "config.yaml"
if not env_overlay_path.exists():
self.errors.append(f"Missing overlay for environment: {env_name}")
if self.errors:
print("❌ Environment overlay validation failed")
return False
print("βœ… Environment overlays validated")
return True
def run_validation(self) -> Tuple[bool, List[str], List[str]]:
"""Run all validation checks"""
print("πŸš€ Running DTO CI validation...")
print("=" * 50)
validations = [
self.validate_schema,
self.validate_port_conflicts,
self.validate_dependencies,
self.validate_slo_compliance,
self.validate_codeowners,
self.validate_generated_artifacts,
self.validate_syncthing_policy,
self.validate_environment_overlays
]
all_passed = True
for validation in validations:
if not validation():
all_passed = False
print("=" * 50)
if all_passed:
print("βœ… All CI validation checks passed!")
else:
print("❌ CI validation failed!")
print("\nErrors:")
for error in self.errors:
print(f" - {error}")
if self.warnings:
print("\nWarnings:")
for warning in self.warnings:
print(f" - {warning}")
return all_passed, self.errors, self.warnings
def main():
"""CLI entry point"""
validator = DTOCIValidator()
success, errors, warnings = validator.run_validation()
# Exit with appropriate code for CI systems
sys.exit(0 if success else 1)
if __name__ == "__main__":
main()