File size: 6,978 Bytes
d688dc2 | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 | # agentic_reliability_framework/infrastructure/intents.py
"""
Infrastructure Intent Schema – Algebraic Data Types for Change Requests.
This module defines a family of intents as a discriminated union. Each intent
represents a proposed infrastructure action. Intents are immutable, self-validating,
and carry provenance for auditability.
The design follows principles of domain-driven design and knowledge engineering,
using strong typing and semantic constraints to prevent invalid states.
"""
from __future__ import annotations
import uuid
from datetime import datetime
from enum import Enum
from typing import Annotated, Any, Dict, Literal, Optional, Union
from pydantic import BaseModel, Field, field_validator
from pydantic.functional_validators import AfterValidator
# -----------------------------------------------------------------------------
# Domain Primitives (NewTypes for type safety)
# -----------------------------------------------------------------------------
# These are simple wrappers that enforce type checks at runtime only if validators are added.
# Here we use them as markers; actual validation occurs in field validators.
Region = str
Size = str
Principal = str
ResourceScope = str
ServiceName = str
ChangeScope = Literal["single_instance", "canary", "global"]
Environment = Literal["dev", "staging", "prod", "test"]
# -----------------------------------------------------------------------------
# Enums for fixed sets (but extensible via new variants)
# -----------------------------------------------------------------------------
class ResourceType(str, Enum):
"""Azure resource types with semantic meaning."""
VM = "vm"
STORAGE_ACCOUNT = "storage_account"
DATABASE = "database"
KUBERNETES_CLUSTER = "kubernetes_cluster"
FUNCTION_APP = "function_app"
VIRTUAL_NETWORK = "virtual_network"
# We could add methods here to return associated pricing categories, etc.
class PermissionLevel(str, Enum):
"""Access permission levels in increasing order of privilege."""
READ = "read"
WRITE = "write"
ADMIN = "admin"
# -----------------------------------------------------------------------------
# Knowledge Base Stubs (simulated – in production would be loaded from external source)
# -----------------------------------------------------------------------------
# These are used for semantic validation. In a real system, they would be fetched
# from Azure APIs or a configuration service.
VALID_AZURE_REGIONS = {
"eastus", "eastus2", "westus", "westeurope", "northeurope",
"southeastasia", "eastasia", "japaneast", "brazilsouth"
}
# Mapping of resource type to plausible size patterns (simplified)
RESOURCE_SIZE_PATTERNS = {
ResourceType.VM: {"Standard_D2s_v3", "Standard_D4s_v3", "Standard_D8s_v3", "Standard_D16s_v3"},
ResourceType.STORAGE_ACCOUNT: {"50GB", "100GB", "1TB", "10TB"},
ResourceType.DATABASE: {"Basic", "Standard", "Premium"},
ResourceType.KUBERNETES_CLUSTER: {"Small", "Medium", "Large"},
ResourceType.FUNCTION_APP: {"Consumption", "Premium"},
ResourceType.VIRTUAL_NETWORK: {"default"},
}
# -----------------------------------------------------------------------------
# Base Intent Class
# -----------------------------------------------------------------------------
class Intent(BaseModel):
"""Abstract base for all intents, providing common fields."""
intent_id: str = Field(default_factory=lambda: str(uuid.uuid4()), description="Unique identifier for this intent")
timestamp: datetime = Field(default_factory=datetime.utcnow, description="Time the intent was created")
requester: Principal = Field(..., description="User or service principal requesting the action")
provenance: Dict[str, Any] = Field(
default_factory=dict,
description="Metadata about how the intent was generated (e.g., agent ID, session)"
)
class Config:
frozen = True # immutable after creation
extra = "forbid" # no extra fields
# -----------------------------------------------------------------------------
# Specific Intent Types
# -----------------------------------------------------------------------------
class ProvisionResourceIntent(Intent):
"""Request to provision a new Azure resource."""
intent_type: Literal["provision_resource"] = "provision_resource"
resource_type: ResourceType
region: Region
size: Size
configuration: Dict[str, Any] = Field(default_factory=dict)
environment: Environment
@field_validator("region")
def validate_region(cls, v: Region) -> Region:
if v not in VALID_AZURE_REGIONS:
raise ValueError(f"Unknown Azure region: {v}")
return v
@field_validator("size")
def validate_size(cls, v: Size, info) -> Size:
# info.data contains previously validated fields
resource_type = info.data.get("resource_type")
if resource_type and resource_type in RESOURCE_SIZE_PATTERNS:
if v not in RESOURCE_SIZE_PATTERNS[resource_type]:
raise ValueError(f"Invalid size '{v}' for resource type {resource_type}")
return v
class DeployConfigurationIntent(Intent):
"""Request to change configuration of an existing service."""
intent_type: Literal["deploy_config"] = "deploy_config"
service_name: ServiceName
change_scope: ChangeScope
deployment_target: Environment
risk_level_hint: Optional[Annotated[float, Field(ge=0, le=1)]] = None
configuration: Dict[str, Any] = Field(default_factory=dict)
# Optional: validate that service_name follows naming conventions
@field_validator("service_name")
def validate_service_name(cls, v: ServiceName) -> ServiceName:
if not v or len(v) < 3:
raise ValueError("Service name must be at least 3 characters")
return v
class GrantAccessIntent(Intent):
"""Request to grant a permission to a principal."""
intent_type: Literal["grant_access"] = "grant_access"
principal: Principal
permission_level: PermissionLevel
resource_scope: ResourceScope
justification: Optional[str] = None
# Validate resource_scope format (simplified)
@field_validator("resource_scope")
def validate_resource_scope(cls, v: ResourceScope) -> ResourceScope:
if not v.startswith("/"):
raise ValueError("Resource scope must start with '/'")
return v
# -----------------------------------------------------------------------------
# Discriminated Union of All Intents
# -----------------------------------------------------------------------------
InfrastructureIntent = Annotated[
Union[ProvisionResourceIntent, DeployConfigurationIntent, GrantAccessIntent],
Field(discriminator="intent_type")
]
__all__ = [
"ResourceType",
"PermissionLevel",
"Environment",
"ChangeScope",
"ProvisionResourceIntent",
"DeployConfigurationIntent",
"GrantAccessIntent",
"InfrastructureIntent",
] |