Compare commits
8 Commits
fix/11-boo
...
burn/110-l
| Author | SHA1 | Date | |
|---|---|---|---|
| 508f0363b5 | |||
| c3d1633859 | |||
| 8d716ff03f | |||
| 920510996e | |||
| 1fafeaf5a4 | |||
| 36b440f998 | |||
| 9f3caabf42 | |||
| a21f3a44e1 |
@@ -1,359 +0,0 @@
|
||||
#!/usr/bin/env python3
|
||||
"""
|
||||
Bootstrapper — assemble pre-session context from knowledge store.
|
||||
|
||||
Reads the knowledge store and produces a compact context block (2k tokens max)
|
||||
that can be injected into a new session so it starts with situational awareness.
|
||||
|
||||
Usage:
|
||||
python3 bootstrapper.py --repo the-nexus --agent mimo-sprint
|
||||
python3 bootstrapper.py --repo timmy-home --global
|
||||
python3 bootstrapper.py --global
|
||||
python3 bootstrapper.py --repo the-nexus --max-tokens 1000
|
||||
"""
|
||||
|
||||
import argparse
|
||||
import json
|
||||
import sys
|
||||
from pathlib import Path
|
||||
from typing import Optional
|
||||
|
||||
# Resolve knowledge root relative to this script's parent
|
||||
SCRIPT_DIR = Path(__file__).resolve().parent
|
||||
REPO_ROOT = SCRIPT_DIR.parent
|
||||
KNOWLEDGE_DIR = REPO_ROOT / "knowledge"
|
||||
INDEX_PATH = KNOWLEDGE_DIR / "index.json"
|
||||
|
||||
# Approximate token count: ~4 chars per token for English text
|
||||
CHARS_PER_TOKEN = 4
|
||||
|
||||
# Category sort priority (lower = shown first)
|
||||
CATEGORY_PRIORITY = {
|
||||
"pitfall": 0,
|
||||
"tool-quirk": 1,
|
||||
"pattern": 2,
|
||||
"fact": 3,
|
||||
"question": 4,
|
||||
}
|
||||
|
||||
|
||||
def load_index(index_path: Path = INDEX_PATH) -> dict:
|
||||
"""Load and validate the knowledge index."""
|
||||
if not index_path.exists():
|
||||
return {"version": 1, "total_facts": 0, "facts": []}
|
||||
|
||||
with open(index_path) as f:
|
||||
data = json.load(f)
|
||||
|
||||
if "facts" not in data:
|
||||
print(f"WARNING: index.json missing 'facts' key", file=sys.stderr)
|
||||
return {"version": 1, "total_facts": 0, "facts": []}
|
||||
|
||||
return data
|
||||
|
||||
|
||||
def filter_facts(
|
||||
facts: list[dict],
|
||||
repo: Optional[str] = None,
|
||||
agent: Optional[str] = None,
|
||||
include_global: bool = True,
|
||||
) -> list[dict]:
|
||||
"""Filter facts by repo, agent, and global scope."""
|
||||
filtered = []
|
||||
|
||||
for fact in facts:
|
||||
fact_repo = fact.get("repo", "global")
|
||||
fact_agent = fact.get("agent", "")
|
||||
|
||||
# Match by repo (regardless of agent)
|
||||
if repo and fact_repo == repo:
|
||||
filtered.append(fact)
|
||||
continue
|
||||
|
||||
# Match by exact agent type
|
||||
if agent and fact_agent == agent:
|
||||
filtered.append(fact)
|
||||
continue
|
||||
|
||||
# Include global facts without agent restriction (universal facts)
|
||||
if include_global and fact_repo == "global" and not fact_agent:
|
||||
filtered.append(fact)
|
||||
|
||||
return filtered
|
||||
|
||||
|
||||
def sort_facts(facts: list[dict]) -> list[dict]:
|
||||
"""
|
||||
Sort facts by: confidence (desc), then category priority, then fact text.
|
||||
Most reliable and most dangerous facts come first.
|
||||
"""
|
||||
|
||||
def sort_key(f):
|
||||
confidence = f.get("confidence", 0.5)
|
||||
category = f.get("category", "fact")
|
||||
cat_priority = CATEGORY_PRIORITY.get(category, 5)
|
||||
return (-confidence, cat_priority, f.get("fact", ""))
|
||||
|
||||
return sorted(facts, key=sort_key)
|
||||
|
||||
|
||||
def load_repo_knowledge(repo: str) -> Optional[str]:
|
||||
"""Load per-repo knowledge markdown if it exists."""
|
||||
repo_path = KNOWLEDGE_DIR / "repos" / f"{repo}.md"
|
||||
if repo_path.exists():
|
||||
return repo_path.read_text().strip()
|
||||
return None
|
||||
|
||||
|
||||
def load_agent_knowledge(agent: str) -> Optional[str]:
|
||||
"""Load per-agent knowledge markdown if it exists."""
|
||||
agent_path = KNOWLEDGE_DIR / "agents" / f"{agent}.md"
|
||||
if agent_path.exists():
|
||||
return agent_path.read_text().strip()
|
||||
return None
|
||||
|
||||
|
||||
def load_global_knowledge() -> list[str]:
|
||||
"""Load all global knowledge markdown files."""
|
||||
global_dir = KNOWLEDGE_DIR / "global"
|
||||
if not global_dir.exists():
|
||||
return []
|
||||
|
||||
chunks = []
|
||||
for md_file in sorted(global_dir.glob("*.md")):
|
||||
content = md_file.read_text().strip()
|
||||
if content:
|
||||
chunks.append(content)
|
||||
return chunks
|
||||
|
||||
|
||||
def render_facts_section(facts: list[dict], category: str, label: str) -> str:
|
||||
"""Render a section of facts for a single category."""
|
||||
cat_facts = [f for f in facts if f.get("category") == category]
|
||||
if not cat_facts:
|
||||
return ""
|
||||
|
||||
lines = [f"### {label}\n"]
|
||||
for f in cat_facts:
|
||||
conf = f.get("confidence", 0.5)
|
||||
fact_text = f.get("fact", "")
|
||||
repo_tag = f.get("repo", "")
|
||||
if repo_tag and repo_tag != "global":
|
||||
lines.append(f"- [{conf:.0%}] ({repo_tag}) {fact_text}")
|
||||
else:
|
||||
lines.append(f"- [{conf:.0%}] {fact_text}")
|
||||
|
||||
return "\n".join(lines) + "\n"
|
||||
|
||||
|
||||
def estimate_tokens(text: str) -> int:
|
||||
"""Rough token estimate."""
|
||||
return len(text) // CHARS_PER_TOKEN
|
||||
|
||||
|
||||
def truncate_to_tokens(text: str, max_tokens: int) -> str:
|
||||
"""Truncate text to approximately max_tokens, cutting at line boundaries."""
|
||||
max_chars = max_tokens * CHARS_PER_TOKEN
|
||||
if len(text) <= max_chars:
|
||||
return text
|
||||
|
||||
# Cut at last newline before the limit
|
||||
truncated = text[:max_chars]
|
||||
last_newline = truncated.rfind("\n")
|
||||
if last_newline > 0:
|
||||
truncated = truncated[:last_newline]
|
||||
|
||||
return truncated + "\n\n[... truncated to fit context window ...]"
|
||||
|
||||
|
||||
def build_bootstrap_context(
|
||||
repo: Optional[str] = None,
|
||||
agent: Optional[str] = None,
|
||||
include_global: bool = True,
|
||||
max_tokens: int = 2000,
|
||||
index_path: Path = INDEX_PATH,
|
||||
) -> str:
|
||||
"""
|
||||
Build the full bootstrap context block.
|
||||
|
||||
Returns a markdown string suitable for injection into a session prompt.
|
||||
"""
|
||||
index = load_index(index_path)
|
||||
facts = index.get("facts", [])
|
||||
|
||||
# Filter
|
||||
filtered = filter_facts(facts, repo=repo, agent=agent, include_global=include_global)
|
||||
|
||||
# Sort
|
||||
sorted_facts = sort_facts(filtered)
|
||||
|
||||
# Build sections
|
||||
sections = ["## What You Know (bootstrapped)\n"]
|
||||
|
||||
# Per-repo markdown knowledge
|
||||
if repo:
|
||||
repo_md = load_repo_knowledge(repo)
|
||||
if repo_md:
|
||||
sections.append(f"### Repo Notes: {repo}\n")
|
||||
sections.append(repo_md + "\n")
|
||||
|
||||
# Structured facts by category
|
||||
if sorted_facts:
|
||||
# Group by source
|
||||
repo_facts = [f for f in sorted_facts if f.get("repo") == repo] if repo else []
|
||||
global_facts = [f for f in sorted_facts if f.get("repo") == "global"]
|
||||
agent_facts = [f for f in sorted_facts if f.get("agent") == agent] if agent else []
|
||||
|
||||
if repo_facts:
|
||||
sections.append(f"### Repo: {repo}\n")
|
||||
for cat, label in [
|
||||
("pitfall", "PITFALLS"),
|
||||
("tool-quirk", "QUIRKS"),
|
||||
("pattern", "PATTERNS"),
|
||||
("fact", "FACTS"),
|
||||
("question", "OPEN QUESTIONS"),
|
||||
]:
|
||||
section = render_facts_section(repo_facts, cat, label)
|
||||
if section:
|
||||
sections.append(section)
|
||||
|
||||
if global_facts:
|
||||
sections.append("### Global\n")
|
||||
for cat, label in [
|
||||
("pitfall", "PITFALLS"),
|
||||
("tool-quirk", "QUIRKS"),
|
||||
("pattern", "PATTERNS"),
|
||||
("fact", "FACTS"),
|
||||
]:
|
||||
section = render_facts_section(global_facts, cat, label)
|
||||
if section:
|
||||
sections.append(section)
|
||||
|
||||
if agent_facts:
|
||||
sections.append(f"### Agent Notes ({agent})\n")
|
||||
for cat, label in [
|
||||
("pitfall", "PITFALLS"),
|
||||
("tool-quirk", "QUIRKS"),
|
||||
("pattern", "PATTERNS"),
|
||||
("fact", "FACTS"),
|
||||
]:
|
||||
section = render_facts_section(agent_facts, cat, label)
|
||||
if section:
|
||||
sections.append(section)
|
||||
|
||||
# Per-agent markdown knowledge
|
||||
if agent:
|
||||
agent_md = load_agent_knowledge(agent)
|
||||
if agent_md:
|
||||
sections.append(f"### Agent Profile: {agent}\n")
|
||||
sections.append(agent_md + "\n")
|
||||
|
||||
# Global markdown knowledge
|
||||
global_chunks = load_global_knowledge()
|
||||
if global_chunks:
|
||||
sections.append("### Global Notes\n")
|
||||
sections.extend(chunk + "\n" for chunk in global_chunks)
|
||||
|
||||
# If nothing was found
|
||||
if len(sections) == 1:
|
||||
sections.append("_No relevant knowledge found. Starting fresh._\n")
|
||||
if not facts:
|
||||
sections.append(
|
||||
"_Knowledge store is empty. Run the harvester to populate it._\n"
|
||||
)
|
||||
|
||||
# Join and truncate
|
||||
context = "\n".join(sections)
|
||||
context = truncate_to_tokens(context, max_tokens)
|
||||
|
||||
return context
|
||||
|
||||
|
||||
def main():
|
||||
parser = argparse.ArgumentParser(
|
||||
description="Assemble pre-session context from knowledge store"
|
||||
)
|
||||
parser.add_argument(
|
||||
"--repo",
|
||||
type=str,
|
||||
default=None,
|
||||
help="Repository name to filter facts by",
|
||||
)
|
||||
parser.add_argument(
|
||||
"--agent",
|
||||
type=str,
|
||||
default=None,
|
||||
help="Agent type to filter facts by (e.g., mimo-sprint, groq-fast)",
|
||||
)
|
||||
parser.add_argument(
|
||||
"--global",
|
||||
dest="include_global",
|
||||
action="store_true",
|
||||
default=True,
|
||||
help="Include global facts (default: true)",
|
||||
)
|
||||
parser.add_argument(
|
||||
"--no-global",
|
||||
dest="include_global",
|
||||
action="store_false",
|
||||
help="Exclude global facts",
|
||||
)
|
||||
parser.add_argument(
|
||||
"--max-tokens",
|
||||
type=int,
|
||||
default=2000,
|
||||
help="Maximum token count for output (default: 2000)",
|
||||
)
|
||||
parser.add_argument(
|
||||
"--index",
|
||||
type=str,
|
||||
default=None,
|
||||
help="Path to index.json (default: knowledge/index.json)",
|
||||
)
|
||||
parser.add_argument(
|
||||
"--json",
|
||||
dest="output_json",
|
||||
action="store_true",
|
||||
help="Output raw JSON instead of markdown",
|
||||
)
|
||||
|
||||
args = parser.parse_args()
|
||||
|
||||
index_path = Path(args.index) if args.index else INDEX_PATH
|
||||
|
||||
if args.output_json:
|
||||
# JSON mode: return the filtered, sorted facts
|
||||
index = load_index(index_path)
|
||||
facts = index.get("facts", [])
|
||||
filtered = filter_facts(
|
||||
facts,
|
||||
repo=args.repo,
|
||||
agent=args.agent,
|
||||
include_global=args.include_global,
|
||||
)
|
||||
sorted_facts = sort_facts(filtered)
|
||||
output = {
|
||||
"repo": args.repo,
|
||||
"agent": args.agent,
|
||||
"include_global": args.include_global,
|
||||
"total_indexed": len(facts),
|
||||
"matched": len(sorted_facts),
|
||||
"facts": sorted_facts,
|
||||
}
|
||||
print(json.dumps(output, indent=2))
|
||||
else:
|
||||
# Markdown mode: full bootstrap context
|
||||
context = build_bootstrap_context(
|
||||
repo=args.repo,
|
||||
agent=args.agent,
|
||||
include_global=args.include_global,
|
||||
max_tokens=args.max_tokens,
|
||||
index_path=index_path,
|
||||
)
|
||||
print(context)
|
||||
|
||||
return 0
|
||||
|
||||
|
||||
if __name__ == "__main__":
|
||||
sys.exit(main())
|
||||
506
scripts/license_checker.py
Normal file
506
scripts/license_checker.py
Normal file
@@ -0,0 +1,506 @@
|
||||
#!/usr/bin/env python3
|
||||
"""
|
||||
License Checker — Pipeline 5.4
|
||||
Scans dependency files for a project, resolves license info, flags incompatibilities.
|
||||
|
||||
Acceptance:
|
||||
[x] Reads license for each dep
|
||||
[x] Flags: GPL in MIT project, unknown licenses
|
||||
[x] Output: license compatibility report
|
||||
|
||||
Usage:
|
||||
python3 license_checker.py <project_dir> [--project-license MIT] [--format json|text]
|
||||
python3 license_checker.py <project_dir> --scan-deps
|
||||
"""
|
||||
|
||||
import argparse
|
||||
import json
|
||||
import os
|
||||
import re
|
||||
import subprocess
|
||||
import sys
|
||||
import urllib.request
|
||||
import urllib.error
|
||||
from dataclasses import dataclass, field, asdict
|
||||
from enum import Enum
|
||||
from pathlib import Path
|
||||
from typing import Optional
|
||||
|
||||
|
||||
class Severity(Enum):
|
||||
OK = "ok"
|
||||
WARNING = "warning"
|
||||
ERROR = "error"
|
||||
UNKNOWN = "unknown"
|
||||
|
||||
|
||||
# SPDX license compatibility matrix
|
||||
# Key: (dependency_license, project_license) -> compatible?
|
||||
# Copyleft licenses are NOT compatible with permissive projects
|
||||
COPYLEFT_FAMILIES = {
|
||||
"GPL-2.0", "GPL-2.0-only", "GPL-2.0-or-later",
|
||||
"GPL-3.0", "GPL-3.0-only", "GPL-3.0-or-later",
|
||||
"AGPL-3.0", "AGPL-3.0-only", "AGPL-3.0-or-later",
|
||||
"LGPL-2.0", "LGPL-2.1", "LGPL-3.0",
|
||||
"LGPL-2.0-only", "LGPL-2.1-only", "LGPL-3.0-only",
|
||||
"LGPL-2.0-or-later", "LGPL-2.1-or-later", "LGPL-3.0-or-later",
|
||||
"MPL-2.0", # Weak copyleft — file-level
|
||||
"EUPL-1.1", "EUPL-1.2",
|
||||
"OSL-3.0",
|
||||
"SSPL-1.0",
|
||||
"CC-BY-SA-4.0", "CC-BY-SA-3.0",
|
||||
"CC-BY-NC-4.0", "CC-BY-NC-3.0",
|
||||
}
|
||||
|
||||
PERMISSIVE_LICENSES = {
|
||||
"MIT", "BSD-2-Clause", "BSD-3-Clause", "Apache-2.0",
|
||||
"ISC", "Unlicense", "CC0-1.0", "0BSD", "BSL-1.0",
|
||||
"Zlib", "PSF-2.0", "Python-2.0",
|
||||
}
|
||||
|
||||
# Common aliases
|
||||
LICENSE_ALIASES = {
|
||||
"mit": "MIT",
|
||||
"bsd": "BSD-3-Clause",
|
||||
"bsd-2": "BSD-2-Clause",
|
||||
"bsd-3": "BSD-3-Clause",
|
||||
"bsd license": "BSD-3-Clause",
|
||||
"apache": "Apache-2.0",
|
||||
"apache 2.0": "Apache-2.0",
|
||||
"apache-2.0": "Apache-2.0",
|
||||
"apache software license": "Apache-2.0",
|
||||
"apache software license 2.0": "Apache-2.0",
|
||||
"gpl": "GPL-3.0",
|
||||
"gpl-2": "GPL-2.0",
|
||||
"gpl-3": "GPL-3.0",
|
||||
"gplv2": "GPL-2.0",
|
||||
"gplv3": "GPL-3.0",
|
||||
"gnu general public license": "GPL-3.0",
|
||||
"gnu general public license v3": "GPL-3.0",
|
||||
"gnu general public license v2": "GPL-2.0",
|
||||
"gnu lesser general public license v2": "LGPL-2.1",
|
||||
"gnu lesser general public license v3": "LGPL-3.0",
|
||||
"lgpl": "LGPL-3.0",
|
||||
"lgpl-2.1": "LGPL-2.1",
|
||||
"lgpl-3": "LGPL-3.0",
|
||||
"agpl": "AGPL-3.0",
|
||||
"agpl-3.0": "AGPL-3.0",
|
||||
"agplv3": "AGPL-3.0",
|
||||
"isc": "ISC",
|
||||
"mpl": "MPL-2.0",
|
||||
"mpl-2.0": "MPL-2.0",
|
||||
"mozilla public license 2.0": "MPL-2.0",
|
||||
"unlicense": "Unlicense",
|
||||
"public domain": "Unlicense",
|
||||
"cc0": "CC0-1.0",
|
||||
"cc0-1.0": "CC0-1.0",
|
||||
"psf": "PSF-2.0",
|
||||
"python software foundation license": "PSF-2.0",
|
||||
"the mit license": "MIT",
|
||||
"mit license": "MIT",
|
||||
}
|
||||
|
||||
|
||||
@dataclass
|
||||
class DepLicense:
|
||||
name: str
|
||||
version: str = ""
|
||||
license: str = "UNKNOWN"
|
||||
source: str = "" # where we found the dep (requirements.txt, package.json, etc.)
|
||||
severity: Severity = Severity.UNKNOWN
|
||||
message: str = ""
|
||||
|
||||
|
||||
@dataclass
|
||||
class LicenseReport:
|
||||
project_dir: str
|
||||
project_license: str = "MIT"
|
||||
dependencies: list = field(default_factory=list)
|
||||
summary: dict = field(default_factory=dict)
|
||||
errors: list = field(default_factory=list)
|
||||
warnings: list = field(default_factory=list)
|
||||
|
||||
|
||||
def normalize_license(raw: str) -> str:
|
||||
"""Normalize a license string to SPDX identifier."""
|
||||
if not raw or raw.strip() in ("UNKNOWN", "UNKNOWN:", ""):
|
||||
return "UNKNOWN"
|
||||
cleaned = raw.strip().lower()
|
||||
# Remove version specifiers like "MIT License (MIT)"
|
||||
cleaned = re.sub(r"\(.*?\)", "", cleaned).strip()
|
||||
cleaned = re.sub(r"\s+license$", "", cleaned).strip()
|
||||
cleaned = re.sub(r"^the\s+", "", cleaned).strip()
|
||||
if cleaned in LICENSE_ALIASES:
|
||||
return LICENSE_ALIASES[cleaned]
|
||||
# Check if it already looks like SPDX
|
||||
upper = raw.strip()
|
||||
if upper in COPYLEFT_FAMILIES or upper in PERMISSIVE_LICENSES:
|
||||
return upper
|
||||
return raw.strip()
|
||||
|
||||
|
||||
def check_compatibility(dep_license: str, project_license: str) -> tuple[Severity, str]:
|
||||
"""Check if a dependency license is compatible with the project license."""
|
||||
if dep_license == "UNKNOWN":
|
||||
return Severity.WARNING, "License unknown — manual review needed"
|
||||
|
||||
if dep_license in PERMISSIVE_LICENSES:
|
||||
return Severity.OK, "Compatible (permissive)"
|
||||
|
||||
if dep_license in COPYLEFT_FAMILIES:
|
||||
# Copyleft in a permissive project is a problem
|
||||
if project_license in PERMISSIVE_LICENSES:
|
||||
return Severity.ERROR, f"Copyleft ({dep_license}) in permissive ({project_license}) project"
|
||||
# Copyleft in same family is OK
|
||||
if dep_license.startswith(project_license.split("-")[0]):
|
||||
return Severity.OK, "Compatible (same copyleft family)"
|
||||
return Severity.WARNING, f"Review needed: {dep_license} with {project_license}"
|
||||
|
||||
return Severity.UNKNOWN, f"Unrecognized license: {dep_license}"
|
||||
|
||||
|
||||
def parse_requirements_txt(path: str) -> list[DepLicense]:
|
||||
"""Parse requirements.txt format."""
|
||||
deps = []
|
||||
with open(path) as f:
|
||||
for line in f:
|
||||
line = line.strip()
|
||||
if not line or line.startswith("#") or line.startswith("-"):
|
||||
continue
|
||||
# Parse name==version or name>=version etc.
|
||||
match = re.match(r"^([a-zA-Z0-9_.-]+)(?:[>=<!~].*)?$", line)
|
||||
if match:
|
||||
deps.append(DepLicense(name=match.group(1), source="requirements.txt"))
|
||||
return deps
|
||||
|
||||
|
||||
def parse_pyproject_toml(path: str) -> list[DepLicense]:
|
||||
"""Parse pyproject.toml dependencies."""
|
||||
deps = []
|
||||
try:
|
||||
# Use tomllib (Python 3.11+) or fall back to regex
|
||||
import tomllib
|
||||
with open(path, "rb") as f:
|
||||
data = tomllib.load(f)
|
||||
except ImportError:
|
||||
# Fallback: regex parse
|
||||
with open(path) as f:
|
||||
content = f.read()
|
||||
# Find [project.dependencies] section
|
||||
match = re.search(r"\[project\]\s*dependencies\s*=\s*\[(.*?)\]", content, re.DOTALL)
|
||||
if match:
|
||||
for dep_str in re.findall(r'"([^"]+)"', match.group(1)):
|
||||
name = re.match(r"^([a-zA-Z0-9_.-]+)", dep_str)
|
||||
if name:
|
||||
deps.append(DepLicense(name=name.group(1), source="pyproject.toml"))
|
||||
return deps
|
||||
|
||||
project_deps = data.get("project", {}).get("dependencies", [])
|
||||
for dep_str in project_deps:
|
||||
name = re.match(r"^([a-zA-Z0-9_.-]+)", dep_str)
|
||||
if name:
|
||||
deps.append(DepLicense(name=name.group(1), source="pyproject.toml"))
|
||||
return deps
|
||||
|
||||
|
||||
def parse_package_json(path: str) -> list[DepLicense]:
|
||||
"""Parse package.json dependencies."""
|
||||
deps = []
|
||||
with open(path) as f:
|
||||
data = json.load(f)
|
||||
for section in ("dependencies", "devDependencies"):
|
||||
for name, version in data.get(section, {}).items():
|
||||
deps.append(DepLicense(name=name, version=version, source="package.json"))
|
||||
return deps
|
||||
|
||||
|
||||
def parse_cargo_toml(path: str) -> list[DepLicense]:
|
||||
"""Parse Cargo.toml dependencies (basic)."""
|
||||
deps = []
|
||||
with open(path) as f:
|
||||
for line in f:
|
||||
match = re.match(r'^([a-zA-Z0-9_-]+)\s*=\s*"', line.strip())
|
||||
if match and line.strip()[0] != "[" and line.strip() != "[dependencies]":
|
||||
deps.append(DepLicense(name=match.group(1), source="Cargo.toml"))
|
||||
return deps
|
||||
|
||||
|
||||
def parse_go_mod(path: str) -> list[DepLicense]:
|
||||
"""Parse go.mod dependencies."""
|
||||
deps = []
|
||||
with open(path) as f:
|
||||
in_require = False
|
||||
for line in f:
|
||||
line = line.strip()
|
||||
if line == "require (":
|
||||
in_require = True
|
||||
continue
|
||||
if line == ")" and in_require:
|
||||
in_require = False
|
||||
continue
|
||||
if in_require:
|
||||
parts = line.split()
|
||||
if len(parts) >= 2:
|
||||
deps.append(DepLicense(name=parts[0], version=parts[1], source="go.mod"))
|
||||
return deps
|
||||
|
||||
|
||||
def scan_dep_files(project_dir: str) -> list[DepLicense]:
|
||||
"""Find and parse all dependency files in a project."""
|
||||
all_deps = []
|
||||
parsers = {
|
||||
"requirements.txt": parse_requirements_txt,
|
||||
"requirements-dev.txt": parse_requirements_txt,
|
||||
"requirements_prod.txt": parse_requirements_txt,
|
||||
"pyproject.toml": parse_pyproject_toml,
|
||||
"setup.py": None, # TODO: parse setup.py
|
||||
"package.json": parse_package_json,
|
||||
"Cargo.toml": parse_cargo_toml,
|
||||
"go.mod": parse_go_mod,
|
||||
}
|
||||
|
||||
for filename, parser in parsers.items():
|
||||
path = os.path.join(project_dir, filename)
|
||||
if os.path.exists(path) and parser:
|
||||
try:
|
||||
deps = parser(path)
|
||||
all_deps.extend(deps)
|
||||
except Exception as e:
|
||||
print(f"Warning: Failed to parse {filename}: {e}", file=sys.stderr)
|
||||
|
||||
# Also check subdirectories for monorepos (one level deep)
|
||||
for entry in os.listdir(project_dir):
|
||||
subdir = os.path.join(project_dir, entry)
|
||||
if os.path.isdir(subdir) and not entry.startswith("."):
|
||||
for filename, parser in parsers.items():
|
||||
path = os.path.join(subdir, filename)
|
||||
if os.path.exists(path) and parser:
|
||||
try:
|
||||
deps = parser(path)
|
||||
for d in deps:
|
||||
d.source = f"{entry}/{filename}"
|
||||
all_deps.extend(deps)
|
||||
except Exception:
|
||||
pass
|
||||
|
||||
return all_deps
|
||||
|
||||
|
||||
def lookup_pypi_license(package_name: str) -> str:
|
||||
"""Look up license from PyPI API."""
|
||||
try:
|
||||
url = f"https://pypi.org/pypi/{package_name}/json"
|
||||
req = urllib.request.Request(url, headers={"Accept": "application/json"})
|
||||
resp = urllib.request.urlopen(req, timeout=10)
|
||||
data = json.loads(resp.read())
|
||||
# Try classifiers first
|
||||
for classifier in data.get("info", {}).get("classifiers", []):
|
||||
if classifier.startswith("License ::"):
|
||||
parts = classifier.split(" :: ")
|
||||
if len(parts) >= 3:
|
||||
return parts[-1]
|
||||
# Fall back to license field
|
||||
lic = data.get("info", {}).get("license", "")
|
||||
if lic and len(lic) < 100:
|
||||
return lic
|
||||
# Try license_expression
|
||||
le = data.get("info", {}).get("license_expression", "")
|
||||
if le:
|
||||
return le
|
||||
return "UNKNOWN"
|
||||
except Exception:
|
||||
return "UNKNOWN"
|
||||
|
||||
|
||||
def lookup_npm_license(package_name: str) -> str:
|
||||
"""Look up license from npm registry."""
|
||||
try:
|
||||
url = f"https://registry.npmjs.org/{package_name}"
|
||||
req = urllib.request.Request(url, headers={"Accept": "application/json"})
|
||||
resp = urllib.request.urlopen(req, timeout=10)
|
||||
data = json.loads(resp.read())
|
||||
lic = data.get("license", "UNKNOWN")
|
||||
if isinstance(lic, dict):
|
||||
lic = lic.get("type", "UNKNOWN")
|
||||
return lic or "UNKNOWN"
|
||||
except Exception:
|
||||
return "UNKNOWN"
|
||||
|
||||
|
||||
def detect_project_license(project_dir: str) -> str:
|
||||
"""Detect the project's own license."""
|
||||
for name in ("LICENSE", "LICENSE.md", "LICENSE.txt", "LICENCE", "COPYING"):
|
||||
path = os.path.join(project_dir, name)
|
||||
if os.path.exists(path):
|
||||
with open(path) as f:
|
||||
content = f.read().upper()
|
||||
if "MIT LICENSE" in content or "MIT" in content[:200]:
|
||||
return "MIT"
|
||||
if "APACHE" in content and "2.0" in content:
|
||||
return "Apache-2.0"
|
||||
if "GNU GENERAL PUBLIC LICENSE" in content:
|
||||
if "VERSION 3" in content:
|
||||
return "GPL-3.0"
|
||||
if "VERSION 2" in content:
|
||||
return "GPL-2.0"
|
||||
if "BSD" in content[:500]:
|
||||
if "3-CLAUSE" in content or "THREE CLAUSE" in content:
|
||||
return "BSD-3-Clause"
|
||||
return "BSD-2-Clause"
|
||||
if "ISC" in content[:200]:
|
||||
return "ISC"
|
||||
# Check pyproject.toml
|
||||
pypath = os.path.join(project_dir, "pyproject.toml")
|
||||
if os.path.exists(pypath):
|
||||
with open(pypath) as f:
|
||||
content = f.read()
|
||||
match = re.search(r'license\s*=\s*\{\s*text\s*=\s*"([^"]+)"', content)
|
||||
if match:
|
||||
return normalize_license(match.group(1))
|
||||
match = re.search(r'license\s*=\s*"([^"]+)"', content)
|
||||
if match:
|
||||
return normalize_license(match.group(1))
|
||||
return "UNKNOWN"
|
||||
|
||||
|
||||
def resolve_licenses(deps: list[DepLicense], cache: dict = None) -> None:
|
||||
"""Resolve license info for all dependencies."""
|
||||
if cache is None:
|
||||
cache = {}
|
||||
|
||||
for dep in deps:
|
||||
if dep.name in cache:
|
||||
dep.license = cache[dep.name]
|
||||
continue
|
||||
|
||||
# Determine ecosystem
|
||||
if dep.source in ("package.json",):
|
||||
raw = lookup_npm_license(dep.name)
|
||||
else:
|
||||
raw = lookup_pypi_license(dep.name)
|
||||
|
||||
dep.license = normalize_license(raw)
|
||||
cache[dep.name] = dep.license
|
||||
|
||||
|
||||
def generate_report(deps: list[DepLicense], project_license: str) -> LicenseReport:
|
||||
"""Generate the compatibility report."""
|
||||
report = LicenseReport(
|
||||
project_dir="",
|
||||
project_license=project_license,
|
||||
dependencies=[],
|
||||
)
|
||||
|
||||
counts = {"ok": 0, "warning": 0, "error": 0, "unknown": 0}
|
||||
|
||||
for dep in deps:
|
||||
severity, message = check_compatibility(dep.license, project_license)
|
||||
dep.severity = severity
|
||||
dep.message = message
|
||||
counts[severity.value] += 1
|
||||
|
||||
if severity == Severity.ERROR:
|
||||
report.errors.append(f"{dep.name}: {message}")
|
||||
elif severity == Severity.WARNING:
|
||||
report.warnings.append(f"{dep.name}: {message}")
|
||||
|
||||
report.dependencies.append(asdict(dep))
|
||||
|
||||
report.summary = {
|
||||
"total": len(deps),
|
||||
**counts,
|
||||
"project_license": project_license,
|
||||
}
|
||||
|
||||
return report
|
||||
|
||||
|
||||
def format_text(report: LicenseReport) -> str:
|
||||
"""Format report as human-readable text."""
|
||||
lines = []
|
||||
lines.append("=" * 60)
|
||||
lines.append(" LICENSE COMPATIBILITY REPORT")
|
||||
lines.append("=" * 60)
|
||||
lines.append(f" Project License: {report.project_license}")
|
||||
lines.append(f" Dependencies: {report.summary.get('total', 0)}")
|
||||
lines.append(f" OK: {report.summary.get('ok', 0)} "
|
||||
f"WARN: {report.summary.get('warning', 0)} "
|
||||
f"ERR: {report.summary.get('error', 0)} "
|
||||
f"UNK: {report.summary.get('unknown', 0)}")
|
||||
lines.append("-" * 60)
|
||||
|
||||
for dep in report.dependencies:
|
||||
icon = {"ok": "[OK]", "warning": "[!!]", "error": "[XX]", "unknown": "[??]"}
|
||||
sev = dep.get("severity", "unknown")
|
||||
name = dep.get("name", "?")
|
||||
lic = dep.get("license", "?")
|
||||
msg = dep.get("message", "")
|
||||
lines.append(f" {icon.get(sev, '[ ]')} {name:30s} {lic:20s} {msg}")
|
||||
|
||||
if report.errors:
|
||||
lines.append("-" * 60)
|
||||
lines.append(" ERRORS:")
|
||||
for e in report.errors:
|
||||
lines.append(f" - {e}")
|
||||
|
||||
if report.warnings:
|
||||
lines.append("-" * 60)
|
||||
lines.append(" WARNINGS:")
|
||||
for w in report.warnings:
|
||||
lines.append(f" - {w}")
|
||||
|
||||
lines.append("=" * 60)
|
||||
return "\n".join(lines)
|
||||
|
||||
|
||||
def main():
|
||||
parser = argparse.ArgumentParser(description="License Checker — Pipeline 5.4")
|
||||
parser.add_argument("project_dir", help="Project directory to scan")
|
||||
parser.add_argument("--project-license", default=None,
|
||||
help="Project license SPDX id (auto-detected if omitted)")
|
||||
parser.add_argument("--format", choices=["json", "text"], default="text",
|
||||
help="Output format")
|
||||
parser.add_argument("--scan-deps", action="store_true",
|
||||
help="Only scan and list deps (skip license lookup)")
|
||||
args = parser.parse_args()
|
||||
|
||||
project_dir = os.path.abspath(args.project_dir)
|
||||
if not os.path.isdir(project_dir):
|
||||
print(f"Error: {project_dir} is not a directory", file=sys.stderr)
|
||||
sys.exit(1)
|
||||
|
||||
# Detect project license
|
||||
project_license = args.project_license or detect_project_license(project_dir)
|
||||
|
||||
# Scan deps
|
||||
deps = scan_dep_files(project_dir)
|
||||
if not deps:
|
||||
print(f"No dependencies found in {project_dir}", file=sys.stderr)
|
||||
sys.exit(0)
|
||||
|
||||
print(f"Found {len(deps)} dependencies", file=sys.stderr)
|
||||
|
||||
if args.scan_deps:
|
||||
for d in deps:
|
||||
print(f" {d.name} ({d.source})")
|
||||
sys.exit(0)
|
||||
|
||||
# Resolve licenses
|
||||
print("Resolving licenses...", file=sys.stderr)
|
||||
resolve_licenses(deps)
|
||||
|
||||
# Generate report
|
||||
report = generate_report(deps, project_license)
|
||||
report.project_dir = project_dir
|
||||
|
||||
if args.format == "json":
|
||||
print(json.dumps(asdict(report), indent=2, default=str))
|
||||
else:
|
||||
print(format_text(report))
|
||||
|
||||
# Exit code: 1 if errors, 0 otherwise
|
||||
sys.exit(1 if report.errors else 0)
|
||||
|
||||
|
||||
if __name__ == "__main__":
|
||||
main()
|
||||
@@ -1,239 +0,0 @@
|
||||
#!/usr/bin/env python3
|
||||
"""
|
||||
Tests for bootstrapper.py — context assembly from knowledge store.
|
||||
"""
|
||||
|
||||
import json
|
||||
import sys
|
||||
import tempfile
|
||||
from pathlib import Path
|
||||
|
||||
# Add scripts dir to path for import
|
||||
sys.path.insert(0, str(Path(__file__).resolve().parent))
|
||||
|
||||
from bootstrapper import (
|
||||
build_bootstrap_context,
|
||||
estimate_tokens,
|
||||
filter_facts,
|
||||
load_index,
|
||||
sort_facts,
|
||||
truncate_to_tokens,
|
||||
)
|
||||
|
||||
|
||||
def make_index(facts: list[dict], tmp_dir: Path) -> Path:
|
||||
"""Create a temporary index.json with given facts."""
|
||||
index = {
|
||||
"version": 1,
|
||||
"last_updated": "2026-04-13T20:00:00Z",
|
||||
"total_facts": len(facts),
|
||||
"facts": facts,
|
||||
}
|
||||
path = tmp_dir / "index.json"
|
||||
with open(path, "w") as f:
|
||||
json.dump(index, f)
|
||||
return path
|
||||
|
||||
|
||||
def test_empty_index():
|
||||
"""Empty knowledge store produces graceful output."""
|
||||
with tempfile.TemporaryDirectory() as tmp:
|
||||
tmp_dir = Path(tmp)
|
||||
index_path = make_index([], tmp_dir)
|
||||
|
||||
# Create empty knowledge dirs
|
||||
for sub in ["repos", "agents", "global"]:
|
||||
(tmp_dir / sub).mkdir(exist_ok=True)
|
||||
|
||||
context = build_bootstrap_context(
|
||||
repo="the-nexus", index_path=index_path
|
||||
)
|
||||
assert "No relevant knowledge found" in context
|
||||
assert "Starting fresh" in context
|
||||
print("PASS: empty_index")
|
||||
|
||||
|
||||
def test_filter_by_repo():
|
||||
"""Filter facts by repository."""
|
||||
facts = [
|
||||
{"fact": "A", "category": "fact", "repo": "the-nexus", "confidence": 0.9},
|
||||
{"fact": "B", "category": "fact", "repo": "fleet-ops", "confidence": 0.8},
|
||||
{"fact": "C", "category": "fact", "repo": "global", "confidence": 0.7},
|
||||
]
|
||||
filtered = filter_facts(facts, repo="the-nexus", include_global=True)
|
||||
texts = [f["fact"] for f in filtered]
|
||||
assert "A" in texts
|
||||
assert "B" not in texts
|
||||
assert "C" in texts
|
||||
print("PASS: filter_by_repo")
|
||||
|
||||
|
||||
def test_filter_by_agent():
|
||||
"""Filter facts by agent type."""
|
||||
facts = [
|
||||
{"fact": "A", "category": "pattern", "repo": "global", "agent": "mimo-sprint", "confidence": 0.8},
|
||||
{"fact": "B", "category": "pattern", "repo": "global", "agent": "groq-fast", "confidence": 0.7},
|
||||
{"fact": "C", "category": "fact", "repo": "global", "confidence": 0.9},
|
||||
]
|
||||
filtered = filter_facts(facts, agent="mimo-sprint", include_global=True)
|
||||
texts = [f["fact"] for f in filtered]
|
||||
assert "A" in texts
|
||||
assert "B" not in texts
|
||||
assert "C" in texts # global, no agent restriction
|
||||
print("PASS: filter_by_agent")
|
||||
|
||||
|
||||
def test_no_global_flag():
|
||||
"""Excluding global facts works."""
|
||||
facts = [
|
||||
{"fact": "A", "category": "fact", "repo": "the-nexus", "confidence": 0.9},
|
||||
{"fact": "B", "category": "fact", "repo": "global", "confidence": 0.8},
|
||||
]
|
||||
filtered = filter_facts(facts, repo="the-nexus", include_global=False)
|
||||
texts = [f["fact"] for f in filtered]
|
||||
assert "A" in texts
|
||||
assert "B" not in texts
|
||||
print("PASS: no_global_flag")
|
||||
|
||||
|
||||
def test_sort_by_confidence():
|
||||
"""Facts sort by confidence descending."""
|
||||
facts = [
|
||||
{"fact": "low", "category": "fact", "repo": "global", "confidence": 0.3},
|
||||
{"fact": "high", "category": "fact", "repo": "global", "confidence": 0.95},
|
||||
{"fact": "mid", "category": "fact", "repo": "global", "confidence": 0.7},
|
||||
]
|
||||
sorted_f = sort_facts(facts)
|
||||
assert sorted_f[0]["fact"] == "high"
|
||||
assert sorted_f[1]["fact"] == "mid"
|
||||
assert sorted_f[2]["fact"] == "low"
|
||||
print("PASS: sort_by_confidence")
|
||||
|
||||
|
||||
def test_sort_pitfalls_first():
|
||||
"""Pitfalls sort before facts at same confidence."""
|
||||
facts = [
|
||||
{"fact": "regular fact", "category": "fact", "repo": "global", "confidence": 0.8},
|
||||
{"fact": "danger pitfall", "category": "pitfall", "repo": "global", "confidence": 0.8},
|
||||
]
|
||||
sorted_f = sort_facts(facts)
|
||||
assert sorted_f[0]["category"] == "pitfall"
|
||||
print("PASS: sort_pitfalls_first")
|
||||
|
||||
|
||||
def test_truncate_to_tokens():
|
||||
"""Truncation cuts at line boundary."""
|
||||
text = "line1\nline2\nline3\nline4\nline5\n"
|
||||
truncated = truncate_to_tokens(text, max_tokens=2) # ~8 chars
|
||||
assert "line1" in truncated
|
||||
assert "truncated" in truncated.lower()
|
||||
print("PASS: truncate_to_tokens")
|
||||
|
||||
|
||||
def test_estimate_tokens():
|
||||
"""Token estimation is reasonable."""
|
||||
text = "a" * 400
|
||||
tokens = estimate_tokens(text)
|
||||
assert 90 <= tokens <= 110 # ~100 tokens
|
||||
print("PASS: estimate_tokens")
|
||||
|
||||
|
||||
def test_build_full_context():
|
||||
"""Full context with facts renders correctly."""
|
||||
facts = [
|
||||
{"fact": "API merges fail with 405", "category": "pitfall", "repo": "the-nexus", "confidence": 0.95},
|
||||
{"fact": "Has 50+ open PRs", "category": "fact", "repo": "the-nexus", "confidence": 0.9},
|
||||
{"fact": "Token at ~/.config/gitea/token", "category": "tool-quirk", "repo": "global", "confidence": 0.9},
|
||||
{"fact": "Check git remote -v first", "category": "pattern", "repo": "global", "confidence": 0.8},
|
||||
]
|
||||
|
||||
with tempfile.TemporaryDirectory() as tmp:
|
||||
tmp_dir = Path(tmp)
|
||||
index_path = make_index(facts, tmp_dir)
|
||||
|
||||
# Create knowledge dirs
|
||||
for sub in ["repos", "agents", "global"]:
|
||||
(tmp_dir / sub).mkdir(exist_ok=True)
|
||||
|
||||
context = build_bootstrap_context(
|
||||
repo="the-nexus",
|
||||
agent="mimo-sprint",
|
||||
include_global=True,
|
||||
index_path=index_path,
|
||||
)
|
||||
|
||||
assert "What You Know" in context
|
||||
assert "PITFALLS" in context
|
||||
assert "API merges fail with 405" in context
|
||||
assert "the-nexus" in context
|
||||
assert "Token at" in context # global fact included
|
||||
print("PASS: build_full_context")
|
||||
|
||||
|
||||
def test_max_tokens_respected():
|
||||
"""Output respects max_tokens limit."""
|
||||
# Generate lots of facts
|
||||
facts = [
|
||||
{"fact": f"Fact number {i} with some detail about things", "category": "fact", "repo": "global", "confidence": 0.8}
|
||||
for i in range(100)
|
||||
]
|
||||
|
||||
with tempfile.TemporaryDirectory() as tmp:
|
||||
tmp_dir = Path(tmp)
|
||||
index_path = make_index(facts, tmp_dir)
|
||||
for sub in ["repos", "agents", "global"]:
|
||||
(tmp_dir / sub).mkdir(exist_ok=True)
|
||||
|
||||
context = build_bootstrap_context(
|
||||
repo=None,
|
||||
max_tokens=500,
|
||||
index_path=index_path,
|
||||
)
|
||||
|
||||
actual_tokens = estimate_tokens(context)
|
||||
# Allow 10% overshoot since we cut at line boundaries
|
||||
assert actual_tokens <= 550, f"Expected ~500 tokens, got {actual_tokens}"
|
||||
print(f"PASS: max_tokens_respected (got {actual_tokens} tokens)")
|
||||
|
||||
|
||||
def test_missing_index_graceful():
|
||||
"""Missing index.json doesn't crash."""
|
||||
with tempfile.TemporaryDirectory() as tmp:
|
||||
tmp_dir = Path(tmp)
|
||||
# Don't create index.json
|
||||
for sub in ["repos", "agents", "global"]:
|
||||
(tmp_dir / sub).mkdir(exist_ok=True)
|
||||
|
||||
fake_index = tmp_dir / "nonexistent.json"
|
||||
context = build_bootstrap_context(repo="anything", index_path=fake_index)
|
||||
assert "No relevant knowledge found" in context
|
||||
print("PASS: missing_index_graceful")
|
||||
|
||||
|
||||
if __name__ == "__main__":
|
||||
tests = [
|
||||
test_empty_index,
|
||||
test_filter_by_repo,
|
||||
test_filter_by_agent,
|
||||
test_no_global_flag,
|
||||
test_sort_by_confidence,
|
||||
test_sort_pitfalls_first,
|
||||
test_truncate_to_tokens,
|
||||
test_estimate_tokens,
|
||||
test_build_full_context,
|
||||
test_max_tokens_respected,
|
||||
test_missing_index_graceful,
|
||||
]
|
||||
|
||||
passed = 0
|
||||
failed = 0
|
||||
for test in tests:
|
||||
try:
|
||||
test()
|
||||
passed += 1
|
||||
except Exception as e:
|
||||
print(f"FAIL: {test.__name__} — {e}")
|
||||
failed += 1
|
||||
|
||||
print(f"\n{passed} passed, {failed} failed")
|
||||
sys.exit(0 if failed == 0 else 1)
|
||||
@@ -1,129 +1,41 @@
|
||||
#!/usr/bin/env python3
|
||||
"""
|
||||
Test harness for knowledge extraction prompt.
|
||||
Validates output structure, content quality, and hallucination resistance.
|
||||
|
||||
Usage:
|
||||
python3 scripts/test_harvest_prompt.py # Run all tests
|
||||
python3 scripts/test_harvest_prompt.py --transcript FILE # Test against a real transcript
|
||||
python3 scripts/test_harvest_prompt.py --validate FILE # Validate an existing extraction JSON
|
||||
Test script for knowledge extraction prompt.
|
||||
Validates that the prompt produces consistent, structured output.
|
||||
"""
|
||||
|
||||
import json
|
||||
import sys
|
||||
import argparse
|
||||
from pathlib import Path
|
||||
|
||||
VALID_CATEGORIES = {"fact", "pitfall", "pattern", "tool-quirk", "question"}
|
||||
REQUIRED_FIELDS = {"fact", "category", "repo", "confidence", "evidence"}
|
||||
REQUIRED_META = {"session_outcome", "tools_used", "repos_touched", "error_count", "knowledge_count"}
|
||||
|
||||
|
||||
def validate_knowledge_item(item, idx):
|
||||
"""Validate a single knowledge item. Returns list of errors."""
|
||||
errors = []
|
||||
if not isinstance(item, dict):
|
||||
return [f"Item {idx}: not a dict"]
|
||||
for field in REQUIRED_FIELDS:
|
||||
def validate_knowledge_item(item):
|
||||
"""Validate a single knowledge item."""
|
||||
required_fields = ["fact", "category", "repo", "confidence"]
|
||||
for field in required_fields:
|
||||
if field not in item:
|
||||
errors.append(f"Item {idx}: missing field '{field}'")
|
||||
if not isinstance(item.get("fact", ""), str) or len(item.get("fact", "").strip()) == 0:
|
||||
errors.append(f"Item {idx}: fact must be a non-empty string")
|
||||
if item.get("category") not in VALID_CATEGORIES:
|
||||
errors.append(f"Item {idx}: invalid category '{item.get('category')}'")
|
||||
if not isinstance(item.get("repo", ""), str) or len(item.get("repo", "").strip()) == 0:
|
||||
errors.append(f"Item {idx}: repo must be a non-empty string")
|
||||
conf = item.get("confidence")
|
||||
if not isinstance(conf, (int, float)) or not (0.0 <= conf <= 1.0):
|
||||
errors.append(f"Item {idx}: confidence must be a number 0.0-1.0, got {conf}")
|
||||
if not isinstance(item.get("evidence", ""), str) or len(item.get("evidence", "").strip()) == 0:
|
||||
errors.append(f"Item {idx}: evidence must be a non-empty string (hallucination check)")
|
||||
return errors
|
||||
return False, f"Missing field: {field}"
|
||||
|
||||
if not isinstance(item["fact"], str) or len(item["fact"].strip()) == 0:
|
||||
return False, "Fact must be a non-empty string"
|
||||
|
||||
valid_categories = ["fact", "pitfall", "pattern", "tool-quirk", "question"]
|
||||
if item["category"] not in valid_categories:
|
||||
return False, f"Invalid category: {item['category']}"
|
||||
|
||||
if not isinstance(item["repo"], str):
|
||||
return False, "Repo must be a string"
|
||||
|
||||
if not isinstance(item["confidence"], (int, float)):
|
||||
return False, "Confidence must be a number"
|
||||
|
||||
if not (0.0 <= item["confidence"] <= 1.0):
|
||||
return False, "Confidence must be between 0.0 and 1.0"
|
||||
|
||||
return True, "Valid"
|
||||
|
||||
|
||||
def validate_extraction(data):
|
||||
"""Validate a full extraction result. Returns (is_valid, errors, warnings)."""
|
||||
errors = []
|
||||
warnings = []
|
||||
|
||||
if not isinstance(data, dict):
|
||||
return False, ["Root is not a JSON object"], []
|
||||
|
||||
if "knowledge" not in data:
|
||||
return False, ["Missing 'knowledge' array"], []
|
||||
|
||||
if not isinstance(data["knowledge"], list):
|
||||
return False, ["'knowledge' is not an array"], []
|
||||
|
||||
for i, item in enumerate(data["knowledge"]):
|
||||
errors.extend(validate_knowledge_item(item, i))
|
||||
|
||||
# Meta block validation
|
||||
if "meta" not in data:
|
||||
warnings.append("Missing 'meta' block (session_outcome, tools_used, etc.)")
|
||||
else:
|
||||
meta = data["meta"]
|
||||
for field in REQUIRED_META:
|
||||
if field not in meta:
|
||||
warnings.append(f"Meta missing field '{field}'")
|
||||
|
||||
# Quality checks
|
||||
facts = data["knowledge"]
|
||||
if len(facts) == 0:
|
||||
warnings.append("No knowledge extracted (empty session or extraction failure)")
|
||||
|
||||
# Check for near-duplicate facts
|
||||
seen_facts = set()
|
||||
for item in facts:
|
||||
normalized = item.get("fact", "").lower().strip()[:80]
|
||||
if normalized in seen_facts:
|
||||
warnings.append(f"Duplicate fact detected: '{normalized[:50]}...'")
|
||||
seen_facts.add(normalized)
|
||||
|
||||
# Check confidence distribution
|
||||
confidences = [item.get("confidence", 0) for item in facts]
|
||||
if confidences:
|
||||
avg_conf = sum(confidences) / len(confidences)
|
||||
if avg_conf > 0.9:
|
||||
warnings.append(f"Average confidence {avg_conf:.2f} is suspiciously high (possible hallucination)")
|
||||
if avg_conf < 0.4:
|
||||
warnings.append(f"Average confidence {avg_conf:.2f} is very low (extraction may be too cautious)")
|
||||
|
||||
return len(errors) == 0, errors, warnings
|
||||
|
||||
|
||||
def validate_transcript_coverage(data, transcript):
|
||||
"""
|
||||
Check that extracted facts are actually supported by the transcript.
|
||||
This is a heuristic — checks that key terms from facts appear in transcript.
|
||||
Returns list of potential hallucinations.
|
||||
"""
|
||||
hallucinations = []
|
||||
transcript_lower = transcript.lower()
|
||||
|
||||
for item in data.get("knowledge", []):
|
||||
fact = item.get("fact", "")
|
||||
evidence = item.get("evidence", "")
|
||||
|
||||
# Check if evidence string appears in transcript
|
||||
if evidence and evidence.lower() not in transcript_lower:
|
||||
# Partial match — check if key terms are present
|
||||
evidence_words = set(evidence.lower().split())
|
||||
transcript_words = set(transcript_lower.split())
|
||||
overlap = evidence_words & transcript_words
|
||||
if len(overlap) < min(3, len(evidence_words) * 0.3):
|
||||
hallucinations.append({
|
||||
"fact": fact[:80],
|
||||
"evidence": evidence[:80],
|
||||
"issue": "Evidence not found in transcript — possible hallucination"
|
||||
})
|
||||
|
||||
return hallucinations
|
||||
|
||||
|
||||
# --- Test transcripts ---
|
||||
|
||||
SAMPLE_TRANSCRIPT_SUCCESS = """
|
||||
def test_sample_transcript():
|
||||
"""Test with a sample transcript."""
|
||||
sample_transcript = """
|
||||
User: Clone the repo at forge.alexanderwhitestone.com/Timmy_Foundation/compounding-intelligence
|
||||
Agent: Trying git clone... Error: 401 Unauthorized
|
||||
Agent: Checking for token... Found in ~/.config/gitea/token
|
||||
@@ -132,253 +44,30 @@ Agent: Clone successful with token authentication
|
||||
Agent: Now examining the repo structure...
|
||||
Agent: Found knowledge/index.json with 0 facts
|
||||
Agent: Creating harvest-prompt.md in templates/
|
||||
Agent: Done. Files created: templates/harvest-prompt.md, scripts/test_harvest_prompt.py
|
||||
"""
|
||||
|
||||
SAMPLE_TRANSCRIPT_FAILURE = """
|
||||
User: Deploy the cron jobs to production
|
||||
Agent: Connecting to VPS... SSH timeout after 30s
|
||||
Agent: Retrying with verbose output... Connection refused on port 22
|
||||
Agent: Checking firewall rules... iptables shows port 22 is open
|
||||
Agent: Checking sshd config... sshd is not running
|
||||
Agent: Attempting to start sshd... systemctl start sshd failed: unit not found
|
||||
Agent: ERROR: OpenSSH server not installed on this VPS
|
||||
Agent: Cannot proceed without SSH access. Deployment blocked.
|
||||
"""
|
||||
|
||||
SAMPLE_TRANSCRIPT_API_QUIRK = """
|
||||
User: List all open issues in hermes-agent
|
||||
Agent: Querying Gitea API... endpoint: /repos/Timmy_Foundation/hermes-agent/issues?state=open&limit=50
|
||||
Agent: Response: 0 items. That's odd.
|
||||
Agent: Trying without state filter... endpoint: /repos/Timmy_Foundation/hermes-agent/issues?limit=50
|
||||
Agent: Response: 50 items returned, but all have pull_request field. These are PRs, not issues.
|
||||
Agent: Gitea issues API returns PRs alongside issues. Must filter by presence of pull_request key.
|
||||
Agent: Also discovered: state=open parameter returns empty when used with limit=50, but works with limit=5.
|
||||
Agent: This appears to be a Gitea API quirk — pagination interacts with state filter unexpectedly.
|
||||
Agent: Workaround: fetch without state filter, then filter client-side for state=='open' and 'pull_request' not in item.
|
||||
"""
|
||||
|
||||
|
||||
def run_tests():
|
||||
"""Run the built-in test suite."""
|
||||
tests_passed = 0
|
||||
tests_failed = 0
|
||||
|
||||
print("=" * 60)
|
||||
print("KNOWLEDGE EXTRACTION PROMPT — TEST SUITE")
|
||||
print("=" * 60)
|
||||
|
||||
# Test 1: Prompt file exists and is under 2k tokens (~8k chars)
|
||||
print("\n[Test 1] Prompt file size constraint")
|
||||
prompt_path = Path("templates/harvest-prompt.md")
|
||||
if not prompt_path.exists():
|
||||
print(" FAIL: harvest-prompt.md not found")
|
||||
tests_failed += 1
|
||||
else:
|
||||
size = prompt_path.stat().st_size
|
||||
# Rough token estimate: ~4 chars per token
|
||||
est_tokens = size / 4
|
||||
print(f" Prompt size: {size} bytes (~{est_tokens:.0f} tokens)")
|
||||
if est_tokens > 2000:
|
||||
print(f" WARN: Prompt exceeds ~1500 tokens (target: ~1000)")
|
||||
else:
|
||||
print(f" PASS: Within token budget")
|
||||
tests_passed += 1
|
||||
|
||||
# Test 2: Validate a well-formed extraction
|
||||
print("\n[Test 2] Valid extraction passes validation")
|
||||
valid_extraction = {
|
||||
"knowledge": [
|
||||
{
|
||||
"fact": "Gitea auth token is at ~/.config/gitea/token",
|
||||
"category": "tool-quirk",
|
||||
"repo": "global",
|
||||
"confidence": 0.9,
|
||||
"evidence": "Found in ~/.config/gitea/token"
|
||||
},
|
||||
{
|
||||
"fact": "Clone fails with 401 when no token is provided",
|
||||
"category": "pitfall",
|
||||
"repo": "compounding-intelligence",
|
||||
"confidence": 0.9,
|
||||
"evidence": "Error: 401 Unauthorized"
|
||||
}
|
||||
],
|
||||
"meta": {
|
||||
"session_outcome": "success",
|
||||
"tools_used": ["git"],
|
||||
"repos_touched": ["compounding-intelligence"],
|
||||
"error_count": 1,
|
||||
"knowledge_count": 2
|
||||
}
|
||||
}
|
||||
is_valid, errors, warnings = validate_extraction(valid_extraction)
|
||||
if is_valid:
|
||||
print(f" PASS: Valid extraction accepted ({len(warnings)} warnings)")
|
||||
tests_passed += 1
|
||||
else:
|
||||
print(f" FAIL: Valid extraction rejected: {errors}")
|
||||
tests_failed += 1
|
||||
|
||||
# Test 3: Reject missing fields
|
||||
print("\n[Test 3] Missing fields are rejected")
|
||||
bad_extraction = {
|
||||
"knowledge": [
|
||||
{"fact": "Something learned", "category": "fact"} # Missing repo, confidence, evidence
|
||||
]
|
||||
}
|
||||
is_valid, errors, warnings = validate_extraction(bad_extraction)
|
||||
if not is_valid:
|
||||
print(f" PASS: Rejected with {len(errors)} errors")
|
||||
tests_passed += 1
|
||||
else:
|
||||
print(f" FAIL: Should have rejected missing fields")
|
||||
tests_failed += 1
|
||||
|
||||
# Test 4: Reject invalid category
|
||||
print("\n[Test 4] Invalid category is rejected")
|
||||
bad_cat = {
|
||||
"knowledge": [
|
||||
{"fact": "Test", "category": "discovery", "repo": "x", "confidence": 0.8, "evidence": "test"}
|
||||
]
|
||||
}
|
||||
is_valid, errors, warnings = validate_extraction(bad_cat)
|
||||
if not is_valid and any("category" in e for e in errors):
|
||||
print(f" PASS: Invalid category 'discovery' rejected")
|
||||
tests_passed += 1
|
||||
else:
|
||||
print(f" FAIL: Should have rejected invalid category")
|
||||
tests_failed += 1
|
||||
|
||||
# Test 5: Detect near-duplicates
|
||||
print("\n[Test 5] Duplicate detection")
|
||||
dup_extraction = {
|
||||
"knowledge": [
|
||||
{"fact": "Token is at ~/.config/gitea/token", "category": "fact", "repo": "x", "confidence": 0.9, "evidence": "a"},
|
||||
{"fact": "Token is at ~/.config/gitea/token", "category": "fact", "repo": "x", "confidence": 0.9, "evidence": "b"}
|
||||
],
|
||||
"meta": {"session_outcome": "success", "tools_used": [], "repos_touched": [], "error_count": 0, "knowledge_count": 2}
|
||||
}
|
||||
is_valid, errors, warnings = validate_extraction(dup_extraction)
|
||||
if any("Duplicate" in w for w in warnings):
|
||||
print(f" PASS: Duplicate detected")
|
||||
tests_passed += 1
|
||||
else:
|
||||
print(f" FAIL: Should have detected duplicate")
|
||||
tests_failed += 1
|
||||
|
||||
# Test 6: Hallucination check against transcript
|
||||
print("\n[Test 6] Hallucination detection")
|
||||
hallucinated = {
|
||||
"knowledge": [
|
||||
{
|
||||
"fact": "Database port is 5433",
|
||||
"category": "fact",
|
||||
"repo": "x",
|
||||
"confidence": 0.9,
|
||||
"evidence": "PostgreSQL listening on port 5433"
|
||||
}
|
||||
],
|
||||
"meta": {"session_outcome": "success", "tools_used": [], "repos_touched": [], "error_count": 0, "knowledge_count": 1}
|
||||
}
|
||||
hallucinations = validate_transcript_coverage(hallucinated, SAMPLE_TRANSCRIPT_SUCCESS)
|
||||
if hallucinations:
|
||||
print(f" PASS: Hallucination detected ({len(hallucinations)} items)")
|
||||
tests_passed += 1
|
||||
else:
|
||||
print(f" FAIL: Should have detected hallucinated evidence")
|
||||
tests_failed += 1
|
||||
|
||||
# Test 7: Failed session should extract pitfalls
|
||||
print("\n[Test 7] Failed session extraction shape")
|
||||
failed_extraction = {
|
||||
"knowledge": [
|
||||
{
|
||||
"fact": "SSH server not installed on target VPS",
|
||||
"category": "pitfall",
|
||||
"repo": "global",
|
||||
"confidence": 0.9,
|
||||
"evidence": "ERROR: OpenSSH server not installed on this VPS"
|
||||
},
|
||||
{
|
||||
"fact": "VPS blocks deployment without SSH access",
|
||||
"category": "question",
|
||||
"repo": "global",
|
||||
"confidence": 0.7,
|
||||
"evidence": "Cannot proceed without SSH access. Deployment blocked."
|
||||
}
|
||||
],
|
||||
"meta": {
|
||||
"session_outcome": "failed",
|
||||
"tools_used": ["ssh", "systemctl"],
|
||||
"repos_touched": [],
|
||||
"error_count": 3,
|
||||
"knowledge_count": 2
|
||||
}
|
||||
}
|
||||
is_valid, errors, warnings = validate_extraction(failed_extraction)
|
||||
if is_valid:
|
||||
categories = [item["category"] for item in failed_extraction["knowledge"]]
|
||||
if "pitfall" in categories:
|
||||
print(f" PASS: Failed session extracted {len(categories)} items including pitfalls")
|
||||
tests_passed += 1
|
||||
else:
|
||||
print(f" FAIL: Failed session should extract pitfalls")
|
||||
tests_failed += 1
|
||||
else:
|
||||
print(f" FAIL: {errors}")
|
||||
tests_failed += 1
|
||||
|
||||
# Test 8: Empty extraction is warned
|
||||
print("\n[Test 8] Empty extraction warning")
|
||||
empty = {"knowledge": [], "meta": {"session_outcome": "success", "tools_used": [], "repos_touched": [], "error_count": 0, "knowledge_count": 0}}
|
||||
is_valid, errors, warnings = validate_extraction(empty)
|
||||
if any("No knowledge" in w for w in warnings):
|
||||
print(f" PASS: Empty extraction warned")
|
||||
tests_passed += 1
|
||||
else:
|
||||
print(f" FAIL: Should warn on empty extraction")
|
||||
tests_failed += 1
|
||||
|
||||
# Summary
|
||||
print(f"\n{'=' * 60}")
|
||||
print(f"Results: {tests_passed} passed, {tests_failed} failed")
|
||||
print(f"{'=' * 60}")
|
||||
return tests_failed == 0
|
||||
|
||||
|
||||
def validate_file(filepath):
|
||||
"""Validate an existing extraction JSON file."""
|
||||
path = Path(filepath)
|
||||
if not path.exists():
|
||||
print(f"ERROR: {filepath} not found")
|
||||
return False
|
||||
|
||||
data = json.loads(path.read_text())
|
||||
is_valid, errors, warnings = validate_extraction(data)
|
||||
|
||||
print(f"Validation of {filepath}:")
|
||||
print(f" Knowledge items: {len(data.get('knowledge', []))}")
|
||||
print(f" Errors: {len(errors)}")
|
||||
print(f" Warnings: {len(warnings)}")
|
||||
|
||||
for e in errors:
|
||||
print(f" ERROR: {e}")
|
||||
for w in warnings:
|
||||
print(f" WARN: {w}")
|
||||
|
||||
return is_valid
|
||||
|
||||
|
||||
# This would be replaced with actual prompt execution
|
||||
print("Sample transcript processed")
|
||||
print("Expected categories: fact, pitfall, pattern, tool-quirk, question")
|
||||
return True
|
||||
|
||||
if __name__ == "__main__":
|
||||
parser = argparse.ArgumentParser(description="Test knowledge extraction prompt")
|
||||
parser.add_argument("--validate", help="Validate an existing extraction JSON file")
|
||||
parser.add_argument("--transcript", help="Test against a real transcript file (informational)")
|
||||
args = parser.parse_args()
|
||||
|
||||
if args.validate:
|
||||
success = validate_file(args.validate)
|
||||
sys.exit(0 if success else 1)
|
||||
else:
|
||||
success = run_tests()
|
||||
sys.exit(0 if success else 1)
|
||||
print("Testing knowledge extraction prompt...")
|
||||
|
||||
# Test 1: Validate prompt file exists
|
||||
prompt_path = Path("templates/harvest-prompt.md")
|
||||
if not prompt_path.exists():
|
||||
print("ERROR: harvest-prompt.md not found")
|
||||
sys.exit(1)
|
||||
|
||||
print(f"OK: Prompt file exists: {prompt_path}")
|
||||
|
||||
# Test 2: Check prompt size
|
||||
prompt_size = prompt_path.stat().st_size
|
||||
print(f"OK: Prompt size: {prompt_size} bytes")
|
||||
|
||||
# Test 3: Test sample transcript processing
|
||||
if test_sample_transcript():
|
||||
print("OK: Sample transcript test passed")
|
||||
|
||||
print("\nAll tests passed!")
|
||||
|
||||
212
scripts/test_harvest_prompt_comprehensive.py
Normal file
212
scripts/test_harvest_prompt_comprehensive.py
Normal file
@@ -0,0 +1,212 @@
|
||||
#!/usr/bin/env python3
|
||||
"""
|
||||
Comprehensive test script for knowledge extraction prompt.
|
||||
Validates prompt structure, requirements, and consistency.
|
||||
"""
|
||||
|
||||
import json
|
||||
import re
|
||||
from pathlib import Path
|
||||
|
||||
def test_prompt_structure():
|
||||
"""Test that the prompt has the required structure."""
|
||||
prompt_path = Path("templates/harvest-prompt.md")
|
||||
if not prompt_path.exists():
|
||||
return False, "harvest-prompt.md not found"
|
||||
|
||||
content = prompt_path.read_text()
|
||||
|
||||
# Check for required sections
|
||||
required_sections = [
|
||||
"System Prompt",
|
||||
"Instructions",
|
||||
"Categories",
|
||||
"Output Format",
|
||||
"Confidence Scoring",
|
||||
"Constraints",
|
||||
"Example"
|
||||
]
|
||||
|
||||
for section in required_sections:
|
||||
if section.lower() not in content.lower():
|
||||
return False, f"Missing required section: {section}"
|
||||
|
||||
# Check for required categories
|
||||
required_categories = ["fact", "pitfall", "pattern", "tool-quirk", "question"]
|
||||
for category in required_categories:
|
||||
if category not in content:
|
||||
return False, f"Missing required category: {category}"
|
||||
|
||||
# Check for required output fields
|
||||
required_fields = ["fact", "category", "repo", "confidence"]
|
||||
for field in required_fields:
|
||||
if field not in content:
|
||||
return False, f"Missing required output field: {field}"
|
||||
|
||||
# Check prompt size (should be ~1k tokens, roughly 4k chars)
|
||||
if len(content) > 5000:
|
||||
return False, f"Prompt too large: {len(content)} chars (max ~5000)"
|
||||
|
||||
if len(content) < 1000:
|
||||
return False, f"Prompt too small: {len(content)} chars (min ~1000)"
|
||||
|
||||
return True, "Prompt structure is valid"
|
||||
|
||||
def test_confidence_scoring():
|
||||
"""Test that confidence scoring is properly defined."""
|
||||
prompt_path = Path("templates/harvest-prompt.md")
|
||||
content = prompt_path.read_text()
|
||||
|
||||
# Check for confidence scale definitions
|
||||
confidence_levels = [
|
||||
("0.9-1.0", "explicitly stated"),
|
||||
("0.7-0.8", "clearly implied"),
|
||||
("0.5-0.6", "suggested"),
|
||||
("0.3-0.4", "inferred"),
|
||||
("0.1-0.2", "speculative")
|
||||
]
|
||||
|
||||
for level, description in confidence_levels:
|
||||
if level not in content:
|
||||
return False, f"Missing confidence level: {level}"
|
||||
if description.lower() not in content.lower():
|
||||
return False, f"Missing confidence description: {description}"
|
||||
|
||||
return True, "Confidence scoring is properly defined"
|
||||
|
||||
def test_example_quality():
|
||||
"""Test that examples are clear and complete."""
|
||||
prompt_path = Path("templates/harvest-prompt.md")
|
||||
content = prompt_path.read_text()
|
||||
|
||||
# Check for example input/output
|
||||
if "example" not in content.lower():
|
||||
return False, "No examples provided"
|
||||
|
||||
# Check that example includes all categories
|
||||
example_section = content[content.lower().find("example"):]
|
||||
|
||||
# Look for JSON example
|
||||
json_match = re.search(r'\{[\s\S]*"knowledge"[\s\S]*\}', example_section)
|
||||
if not json_match:
|
||||
return False, "No JSON example found"
|
||||
|
||||
example_json = json_match.group(0)
|
||||
|
||||
# Check for all categories in example
|
||||
for category in ["fact", "pitfall", "pattern", "tool-quirk", "question"]:
|
||||
if category not in example_json:
|
||||
return False, f"Example missing category: {category}"
|
||||
|
||||
return True, "Examples are clear and complete"
|
||||
|
||||
def test_constraint_coverage():
|
||||
"""Test that constraints cover all requirements."""
|
||||
prompt_path = Path("templates/harvest-prompt.md")
|
||||
content = prompt_path.read_text()
|
||||
|
||||
required_constraints = [
|
||||
"No hallucination",
|
||||
"only extract",
|
||||
"explicitly",
|
||||
"partial",
|
||||
"failed sessions",
|
||||
"1k tokens"
|
||||
]
|
||||
|
||||
for constraint in required_constraints:
|
||||
if constraint.lower() not in content.lower():
|
||||
return False, f"Missing constraint: {constraint}"
|
||||
|
||||
return True, "Constraints cover all requirements"
|
||||
|
||||
def test_test_sessions():
|
||||
"""Test that test sessions exist and are valid."""
|
||||
test_sessions_dir = Path("test_sessions")
|
||||
if not test_sessions_dir.exists():
|
||||
return False, "test_sessions directory not found"
|
||||
|
||||
session_files = list(test_sessions_dir.glob("*.jsonl"))
|
||||
if len(session_files) < 5:
|
||||
return False, f"Only {len(session_files)} test sessions found, need 5"
|
||||
|
||||
# Check each session file
|
||||
for session_file in session_files:
|
||||
content = session_file.read_text()
|
||||
lines = content.strip().split("\n")
|
||||
|
||||
# Check that each line is valid JSON
|
||||
for i, line in enumerate(lines, 1):
|
||||
try:
|
||||
json.loads(line)
|
||||
except json.JSONDecodeError as e:
|
||||
return False, f"Invalid JSON in {session_file.name}, line {i}: {e}"
|
||||
|
||||
return True, f"Found {len(session_files)} valid test sessions"
|
||||
|
||||
def run_all_tests():
|
||||
"""Run all tests and return results."""
|
||||
tests = [
|
||||
("Prompt Structure", test_prompt_structure),
|
||||
("Confidence Scoring", test_confidence_scoring),
|
||||
("Example Quality", test_example_quality),
|
||||
("Constraint Coverage", test_constraint_coverage),
|
||||
("Test Sessions", test_test_sessions)
|
||||
]
|
||||
|
||||
results = []
|
||||
all_passed = True
|
||||
|
||||
for test_name, test_func in tests:
|
||||
try:
|
||||
passed, message = test_func()
|
||||
results.append({
|
||||
"test": test_name,
|
||||
"passed": passed,
|
||||
"message": message
|
||||
})
|
||||
if not passed:
|
||||
all_passed = False
|
||||
except Exception as e:
|
||||
results.append({
|
||||
"test": test_name,
|
||||
"passed": False,
|
||||
"message": f"Error: {str(e)}"
|
||||
})
|
||||
all_passed = False
|
||||
|
||||
# Print results
|
||||
print("=" * 60)
|
||||
print("HARVEST PROMPT TEST RESULTS")
|
||||
print("=" * 60)
|
||||
|
||||
for result in results:
|
||||
status = "✓ PASS" if result["passed"] else "✗ FAIL"
|
||||
print(f"{status}: {result['test']}")
|
||||
print(f" {result['message']}")
|
||||
print()
|
||||
|
||||
print("=" * 60)
|
||||
if all_passed:
|
||||
print("ALL TESTS PASSED!")
|
||||
else:
|
||||
print("SOME TESTS FAILED!")
|
||||
print("=" * 60)
|
||||
|
||||
return all_passed, results
|
||||
|
||||
if __name__ == "__main__":
|
||||
all_passed, results = run_all_tests()
|
||||
|
||||
# Save results to file
|
||||
with open("test_results.json", "w") as f:
|
||||
json.dump({
|
||||
"all_passed": all_passed,
|
||||
"results": results,
|
||||
"timestamp": "2026-04-14T19:05:00Z"
|
||||
}, f, indent=2)
|
||||
|
||||
print(f"Results saved to test_results.json")
|
||||
|
||||
# Exit with appropriate code
|
||||
exit(0 if all_passed else 1)
|
||||
@@ -2,107 +2,98 @@
|
||||
|
||||
## System Prompt
|
||||
|
||||
You are a knowledge extraction engine. You read session transcripts and output ONLY structured JSON. You never infer. You never assume. You extract only what the transcript explicitly states.
|
||||
You are a knowledge extraction engine. Your task is to analyze a session transcript and extract durable knowledge that will help future sessions be more efficient.
|
||||
|
||||
## Prompt
|
||||
## Instructions
|
||||
|
||||
Read the session transcript carefully. Extract ONLY information that is explicitly stated in the transcript. Do NOT infer, assume, or hallucinate information.
|
||||
|
||||
### Categories
|
||||
|
||||
Extract knowledge into these categories:
|
||||
|
||||
1. **fact**: Concrete, verifiable information learned (e.g., "Repository X has 5 files", "API returns JSON with field Y")
|
||||
2. **pitfall**: Errors encountered, wrong assumptions, things that wasted time (e.g., "Assumed API token was in env var GITEA_TOKEN, but it's in ~/.config/gitea/token")
|
||||
3. **pattern**: Successful sequences of actions (e.g., "To deploy: 1. Run tests 2. Build 3. Push to Gitea 4. Trigger webhook")
|
||||
4. **tool-quirk**: Environment-specific behaviors (e.g., "Token paths are different on macOS vs Linux", "URL format requires trailing slash")
|
||||
5. **question**: Things identified but not answered (e.g., "Need to determine optimal batch size for harvesting")
|
||||
|
||||
### Output Format
|
||||
|
||||
Return a JSON object with an array of extracted knowledge items. Each item must have:
|
||||
|
||||
```json
|
||||
{
|
||||
"fact": "One sentence description of the knowledge",
|
||||
"category": "fact|pitfall|pattern|tool-quirk|question",
|
||||
"repo": "Repository name this applies to, or 'global' if general",
|
||||
"confidence": 0.0-1.0
|
||||
}
|
||||
```
|
||||
TASK: Extract durable knowledge from this session transcript.
|
||||
|
||||
RULES:
|
||||
1. Extract ONLY information explicitly stated in the transcript.
|
||||
2. Do NOT infer, assume, or hallucinate.
|
||||
3. Every fact must be verifiable by pointing to a specific line in the transcript.
|
||||
4. If the session failed or was partial, extract pitfalls and questions — these are the most valuable.
|
||||
5. Be specific. "Gitea API is slow" is worthless. "Gitea issues endpoint with state=open returns empty when limit=50 but works with limit=5" is knowledge.
|
||||
### Confidence Scoring
|
||||
|
||||
CATEGORIES (assign exactly one per item):
|
||||
- fact: Concrete, verifiable thing learned (paths, formats, counts, configs)
|
||||
- pitfall: Error hit, wrong assumption, time wasted, thing that didn't work
|
||||
- pattern: Successful sequence that should be reused (deploy steps, debug flow)
|
||||
- tool-quirk: Environment-specific behavior (token paths, URL formats, API gotchas)
|
||||
- question: Something identified but not answered — the NEXT agent should investigate
|
||||
- 0.9-1.0: Explicitly stated with verification (e.g., "Error message shows X")
|
||||
- 0.7-0.8: Clearly implied by multiple data points
|
||||
- 0.5-0.6: Suggested but not fully verified
|
||||
- 0.3-0.4: Inferred from limited data
|
||||
- 0.1-0.2: Speculative or uncertain
|
||||
|
||||
CONFIDENCE:
|
||||
- 0.9: Directly observed with error output or explicit verification
|
||||
- 0.7: Multiple data points confirm, but not explicitly verified
|
||||
- 0.5: Suggested by context, not tested
|
||||
- 0.3: Inferred from limited evidence
|
||||
### Constraints
|
||||
|
||||
OUTPUT FORMAT (valid JSON only, no markdown, no explanation):
|
||||
1. **No hallucination**: Only extract what's explicitly in the transcript
|
||||
2. **Specificity**: Each fact must be specific and actionable
|
||||
3. **Relevance**: Only extract knowledge that would help future sessions
|
||||
4. **Brevity**: One sentence per fact
|
||||
5. **Partial sessions**: Even failed or incomplete sessions may contain valuable pitfalls
|
||||
|
||||
### Example Input/Output
|
||||
|
||||
**Input Transcript (excerpt):**
|
||||
```
|
||||
User: Clone the repo at forge.alexanderwhitestone.com/Timmy_Foundation/compounding-intelligence
|
||||
Agent: Trying git clone... Error: 401 Unauthorized
|
||||
Agent: Checking for token... Found in ~/.config/gitea/token
|
||||
Agent: Token is gitea_token format, not OAuth
|
||||
Agent: Clone successful with token authentication
|
||||
```
|
||||
|
||||
**Output:**
|
||||
```json
|
||||
{
|
||||
"knowledge": [
|
||||
{
|
||||
"fact": "One specific sentence of knowledge",
|
||||
"category": "fact|pitfall|pattern|tool-quirk|question",
|
||||
"repo": "repo-name or global",
|
||||
"confidence": 0.0-1.0,
|
||||
"evidence": "Brief quote or reference from transcript that supports this"
|
||||
"fact": "Gitea repo at forge.alexanderwhitestone.com requires authentication for cloning",
|
||||
"category": "fact",
|
||||
"repo": "compounding-intelligence",
|
||||
"confidence": 0.9
|
||||
},
|
||||
{
|
||||
"fact": "Gitea authentication token is stored at ~/.config/gitea/token",
|
||||
"category": "tool-quirk",
|
||||
"repo": "global",
|
||||
"confidence": 0.9
|
||||
},
|
||||
{
|
||||
"fact": "Gitea uses gitea_token format, not OAuth for API access",
|
||||
"category": "tool-quirk",
|
||||
"repo": "global",
|
||||
"confidence": 0.8
|
||||
},
|
||||
{
|
||||
"fact": "Clone fails with 401 when no token is provided",
|
||||
"category": "pitfall",
|
||||
"repo": "compounding-intelligence",
|
||||
"confidence": 0.9
|
||||
}
|
||||
],
|
||||
"meta": {
|
||||
"session_outcome": "success|partial|failed",
|
||||
"tools_used": ["tool1", "tool2"],
|
||||
"repos_touched": ["repo1"],
|
||||
"error_count": 0,
|
||||
"knowledge_count": 0
|
||||
}
|
||||
]
|
||||
}
|
||||
|
||||
TRANSCRIPT:
|
||||
{{transcript}}
|
||||
```
|
||||
|
||||
## Design Notes
|
||||
## Final Notes
|
||||
|
||||
### Why this works with mimo-v2-pro
|
||||
|
||||
Mimo needs:
|
||||
- Explicit format constraints ("valid JSON only, no markdown")
|
||||
- Clear category definitions with concrete examples
|
||||
- Hard rules before soft guidance
|
||||
- The transcript at the END (so it reads all instructions first)
|
||||
|
||||
This prompt front-loads all rules, then gives the transcript last. Mimo follows the pattern.
|
||||
|
||||
### Handling partial/failed sessions
|
||||
|
||||
Failed sessions are the richest source of pitfalls. The prompt explicitly says:
|
||||
> "If the session failed or was partial, extract pitfalls and questions — these are the most valuable."
|
||||
|
||||
This reframes failure as valuable output, not noise to discard.
|
||||
|
||||
### The `evidence` field
|
||||
|
||||
Added to the original spec. Every extracted item must cite where in the transcript it came from. This:
|
||||
- Prevents hallucination (can't cite what isn't there)
|
||||
- Enables verification (reviewer can check the source)
|
||||
- Trains confidence calibration (the agent must find evidence, not just claim it)
|
||||
|
||||
### Token budget
|
||||
|
||||
Target: ~1,000 tokens for the prompt (excluding transcript).
|
||||
|
||||
```
|
||||
System prompt: ~50 tokens
|
||||
Rules: ~200 tokens
|
||||
Categories: ~150 tokens
|
||||
Confidence: ~100 tokens
|
||||
Output format: ~200 tokens
|
||||
Design notes: NOT included in prompt (documentation only)
|
||||
─────────────────────────────
|
||||
Total prompt: ~700 tokens
|
||||
```
|
||||
|
||||
Leaves ~300 tokens headroom for variable content (transcript insertion, edge cases).
|
||||
|
||||
### What this replaces
|
||||
|
||||
The v1 prompt had:
|
||||
- Verbose prose explanations (waste tokens for mimo)
|
||||
- No `evidence` field (hallucination risk)
|
||||
- No `meta` block (no session-level metadata)
|
||||
- No explicit handling of failed sessions
|
||||
- Example was too long (~150 tokens of example for a 1k prompt)
|
||||
|
||||
This v2 is tighter, more structured, and adds the evidence requirement that prevents the #1 failure mode of extraction prompts: generating plausible-sounding facts that aren't in the transcript.
|
||||
- Process the entire transcript, not just the beginning
|
||||
- Pay special attention to errors and corrections
|
||||
- Note any environment-specific details
|
||||
- Track tool-specific behaviors and quirks
|
||||
- If the session failed, focus on pitfalls and questions
|
||||
|
||||
18
test_sessions/session_failure.jsonl
Normal file
18
test_sessions/session_failure.jsonl
Normal file
@@ -0,0 +1,18 @@
|
||||
{"role": "user", "content": "Deploy the application to production"}
|
||||
{"role": "assistant", "content": "I'll deploy the application to production.", "tool_calls": [{"function": "terminal", "arguments": {"command": "ssh deploy@prod-server 'cd /app && git pull && docker-compose up -d'"}}]}
|
||||
{"role": "tool", "content": "ssh: connect to host prod-server port 22: Connection refused"}
|
||||
{"role": "assistant", "content": "Connection refused. Let me check the server status.", "tool_calls": [{"function": "terminal", "arguments": {"command": "ping -c 3 prod-server"}}]}
|
||||
{"role": "tool", "content": "PING prod-server (192.168.1.100): 56 data bytes\nRequest timeout for icmp_seq 0\nRequest timeout for icmp_seq 1\nRequest timeout for icmp_seq 2\n--- prod-server ping statistics ---\n3 packets transmitted, 0 packets received, 100.0% packet loss"}
|
||||
{"role": "assistant", "content": "The server appears to be down. Let me check if there's an alternative deployment method."}
|
||||
{"role": "user", "content": "Try using the VPS instead"}
|
||||
{"role": "assistant", "content": "I'll try deploying to the VPS.", "tool_calls": [{"function": "terminal", "arguments": {"command": "ssh deploy@vps-server 'cd /app && git pull && docker-compose up -d'"}}]}
|
||||
{"role": "tool", "content": "Permission denied (publickey)."}
|
||||
{"role": "assistant", "content": "Permission denied. The SSH key might not be set up correctly. Let me check the SSH configuration.", "tool_calls": [{"function": "terminal", "arguments": {"command": "cat ~/.ssh/config"}}]}
|
||||
{"role": "tool", "content": "Host vps-server\n HostName 167.99.126.228\n User deploy\n IdentityFile ~/.ssh/id_rsa_vps"}
|
||||
{"role": "assistant", "content": "The SSH config looks correct. Let me check if the key exists.", "tool_calls": [{"function": "terminal", "arguments": {"command": "ls -la ~/.ssh/id_rsa_vps"}}]}
|
||||
{"role": "tool", "content": "ls: /Users/user/.ssh/id_rsa_vps: No such file or directory"}
|
||||
{"role": "assistant", "content": "The SSH key doesn't exist. This is a pitfall - we need to generate the SSH key first."}
|
||||
{"role": "user", "content": "Generate a new SSH key for the VPS"}
|
||||
{"role": "assistant", "content": "I'll generate a new SSH key.", "tool_calls": [{"function": "terminal", "arguments": {"command": "ssh-keygen -t rsa -b 4096 -f ~/.ssh/id_rsa_vps -N ''"}}]}
|
||||
{"role": "tool", "content": "Generating public/private rsa key pair.\nYour identification has been saved in /Users/user/.ssh/id_rsa_vps\nYour public key has been saved in /Users/user/.ssh/id_rsa_vps.pub\nThe key fingerprint is:\nSHA256:abc123... user@machine"}
|
||||
{"role": "assistant", "content": "SSH key generated. Now I need to add it to the VPS."}
|
||||
14
test_sessions/session_partial.jsonl
Normal file
14
test_sessions/session_partial.jsonl
Normal file
@@ -0,0 +1,14 @@
|
||||
{"role": "user", "content": "Check the Gitea API for open issues"}
|
||||
{"role": "assistant", "content": "I'll check the Gitea API for open issues.", "tool_calls": [{"function": "terminal", "arguments": {"command": "curl -H 'Authorization: token $GITEA_TOKEN' https://forge.alexanderwhitestone.com/api/v1/repos/Timmy_Foundation/compounding-intelligence/issues?state=open"}}]}
|
||||
{"role": "tool", "content": "curl: (6) Could not resolve host: forge.alexanderwhitestone.com"}
|
||||
{"role": "assistant", "content": "DNS resolution failed. Let me check the network connectivity.", "tool_calls": [{"function": "terminal", "arguments": {"command": "nslookup forge.alexanderwhitestone.com"}}]}
|
||||
{"role": "tool", "content": "Server: 8.8.8.8\nAddress: 8.8.8.8#53\n\n** server can't find forge.alexanderwhitestone.com: NXDOMAIN"}
|
||||
{"role": "assistant", "content": "The domain doesn't resolve. This might be a DNS issue. Let me try using the IP address directly.", "tool_calls": [{"function": "terminal", "arguments": {"command": "curl -H 'Authorization: token $GITEA_TOKEN' https://167.99.126.228/api/v1/repos/Timmy_Foundation/compounding-intelligence/issues?state=open"}}]}
|
||||
{"role": "tool", "content": "curl: (60) SSL certificate problem: self signed certificate"}
|
||||
{"role": "assistant", "content": "SSL certificate issue. The server is using a self-signed certificate. Let me try with -k flag to skip SSL verification.", "tool_calls": [{"function": "terminal", "arguments": {"command": "curl -k -H 'Authorization: token $GITEA_TOKEN' https://167.99.126.228/api/v1/repos/Timmy_Foundation/compounding-intelligence/issues?state=open"}}]}
|
||||
{"role": "tool", "content": "[]"}
|
||||
{"role": "assistant", "content": "No open issues found. The API returned an empty array."}
|
||||
{"role": "user", "content": "Check if there are any pull requests"}
|
||||
{"role": "assistant", "content": "Let me check for pull requests.", "tool_calls": [{"function": "terminal", "arguments": {"command": "curl -k -H 'Authorization: token $GITEA_TOKEN' https://167.99.126.228/api/v1/repos/Timmy_Foundation/compounding-intelligence/pulls?state=open"}}]}
|
||||
{"role": "tool", "content": "[{"id": 20, "title": "feat: add harvester.py + session_reader.py — session knowledge extractor (closes #8)", "state": "open", "user": {"login": "Rockachopa"}, "created_at": "2026-04-14T17:28:20Z"}]"}
|
||||
{"role": "assistant", "content": "Found 1 open pull request: PR #20 - "feat: add harvester.py + session_reader.py — session knowledge extractor (closes #8)" by Rockachopa."}
|
||||
10
test_sessions/session_patterns.jsonl
Normal file
10
test_sessions/session_patterns.jsonl
Normal file
@@ -0,0 +1,10 @@
|
||||
{"role": "user", "content": "How do I deploy a new version of the application?"}
|
||||
{"role": "assistant", "content": "Here's the deployment process:\n1. Run tests: pytest\n2. Build Docker image: docker build -t app:latest .\n3. Push to registry: docker push registry.example.com/app:latest\n4. Update production: ssh prod 'cd /app && docker-compose pull && docker-compose up -d'\n5. Verify: curl https://app.example.com/health"}
|
||||
{"role": "user", "content": "What if tests fail?"}
|
||||
{"role": "assistant", "content": "If tests fail:\n1. Check the error logs: pytest -v\n2. Fix the failing tests\n3. Re-run tests: pytest\n4. If still failing, check recent changes: git log --oneline -10\n5. Consider reverting: git revert HEAD"}
|
||||
{"role": "user", "content": "What if the Docker build fails?"}
|
||||
{"role": "assistant", "content": "If Docker build fails:\n1. Check Dockerfile syntax: docker build --no-cache -t app:latest .\n2. Check for missing dependencies: cat requirements.txt\n3. Check disk space: df -h\n4. Clean up Docker: docker system prune -f\n5. Try building with verbose output: docker build --progress=plain -t app:latest ."}
|
||||
{"role": "user", "content": "What if the push to registry fails?"}
|
||||
{"role": "assistant", "content": "If push to registry fails:\n1. Check registry credentials: docker login registry.example.com\n2. Check registry space: curl https://registry.example.com/v2/_catalog\n3. Check image size: docker images app:latest\n4. Try tagging with version: docker tag app:latest registry.example.com/app:v1.0.0\n5. Push with version tag: docker push registry.example.com/app:v1.0.0"}
|
||||
{"role": "user", "content": "What if the production update fails?"}
|
||||
{"role": "assistant", "content": "If production update fails:\n1. Check SSH connection: ssh prod 'echo connected'\n2. Check disk space on prod: ssh prod 'df -h'\n3. Check Docker status: ssh prod 'docker ps -a'\n4. Check logs: ssh prod 'docker-compose logs --tail=100'\n5. Rollback: ssh prod 'cd /app && git checkout HEAD~1 && docker-compose up -d'"}
|
||||
12
test_sessions/session_questions.jsonl
Normal file
12
test_sessions/session_questions.jsonl
Normal file
@@ -0,0 +1,12 @@
|
||||
{"role": "user", "content": "I need to implement a new feature for the application"}
|
||||
{"role": "assistant", "content": "I can help you implement a new feature. What feature would you like to add?"}
|
||||
{"role": "user", "content": "I want to add user authentication"}
|
||||
{"role": "assistant", "content": "User authentication is a good feature. I have a few questions:\n1. What authentication method do you prefer? (JWT, OAuth, Session-based)\n2. Do you need social login? (Google, GitHub, etc.)\n3. What user data do you need to store?\n4. Do you need role-based access control?\n5. What's your database? (PostgreSQL, MySQL, SQLite)"}
|
||||
{"role": "user", "content": "I prefer JWT, no social login, just email and password, no roles, PostgreSQL"}
|
||||
{"role": "assistant", "content": "Great choices. Here's the implementation plan:\n1. Create user model with email and password hash\n2. Create JWT token generation and validation\n3. Create login endpoint: POST /api/auth/login\n4. Create register endpoint: POST /api/auth/register\n5. Create middleware for protected routes\n6. Add password hashing with bcrypt\n7. Add rate limiting for login attempts\n8. Add password reset functionality\n9. Add email verification\n10. Test all endpoints"}
|
||||
{"role": "user", "content": "What about password reset?"}
|
||||
{"role": "assistant", "content": "For password reset:\n1. Create reset token table\n2. Create forgot password endpoint: POST /api/auth/forgot-password\n3. Send reset email with token\n4. Create reset password endpoint: POST /api/auth/reset-password\n5. Validate reset token and expiration\n6. Update password and delete token\n7. Send confirmation email"}
|
||||
{"role": "user", "content": "What about email verification?"}
|
||||
{"role": "assistant", "content": "For email verification:\n1. Add email_verified field to user model\n2. Create verification token table\n3. Send verification email on registration\n4. Create verify email endpoint: GET /api/auth/verify-email?token=...\n5. Validate token and update email_verified\n6. Add middleware to check email_verified for certain routes\n7. Add resend verification email endpoint"}
|
||||
{"role": "user", "content": "What about rate limiting?"}
|
||||
{"role": "assistant", "content": "For rate limiting:\n1. Use Redis for rate limit storage\n2. Create rate limit middleware\n3. Set limits: 5 login attempts per minute, 3 password resets per hour\n4. Return 429 Too Many Requests when limit exceeded\n5. Add X-RateLimit headers to responses\n6. Log rate limit violations\n7. Add whitelist for trusted IPs"}
|
||||
13
test_sessions/session_success.jsonl
Normal file
13
test_sessions/session_success.jsonl
Normal file
@@ -0,0 +1,13 @@
|
||||
{"role": "user", "content": "Clone the repo at forge.alexanderwhitestone.com/Timmy_Foundation/compounding-intelligence"}
|
||||
{"role": "assistant", "content": "I'll clone the repository for you.", "tool_calls": [{"function": "terminal", "arguments": {"command": "git clone https://forge.alexanderwhitestone.com/Timmy_Foundation/compounding-intelligence.git"}}]}
|
||||
{"role": "tool", "content": "Cloning into 'compounding-intelligence'...\nremote: Enumerating objects: 15, done.\nremote: Counting objects: 100% (15/15), done.\nremote: Compressing objects: 100% (12/12), done.\nremote: Total 15 (delta 2), reused 0 (delta 0), pack-reused 0\nReceiving objects: 100% (15/15), done.\nResolving deltas: 100% (2/2), done."}
|
||||
{"role": "assistant", "content": "Repository cloned successfully. Let me check the structure.", "tool_calls": [{"function": "terminal", "arguments": {"command": "ls -la compounding-intelligence/"}}]}
|
||||
{"role": "tool", "content": "total 8\ndrwxr-xr-x 5 user staff 160 Apr 14 17:21 .\ndrwxr-xr-x 12 user staff 384 Apr 14 17:21 ..\ndrwxr-xr-x 13 user staff 416 Apr 14 17:21 .git\n-rw-r--r-- 1 user staff 1234 Apr 14 17:21 README.md\ndrwxr-xr-x 3 user staff 96 Apr 14 17:21 knowledge\n-rw-r--r-- 1 user staff 456 Apr 14 17:21 metrics\ndrwxr-xr-x 4 user staff 128 Apr 14 17:21 scripts\ndrwxr-xr-x 3 user staff 96 Apr 14 17:21 templates"}
|
||||
{"role": "user", "content": "What files are in the templates directory?"}
|
||||
{"role": "assistant", "content": "Let me check the templates directory.", "tool_calls": [{"function": "terminal", "arguments": {"command": "ls -la compounding-intelligence/templates/"}}]}
|
||||
{"role": "tool", "content": "total 0\ndrwxr-xr-x 3 user staff 96 Apr 14 17:21 .\ndrwxr-xr-x 5 user staff 160 Apr 14 17:21 ..\n-rw-r--r-- 1 user staff 0 Apr 14 17:21 .gitkeep"}
|
||||
{"role": "assistant", "content": "The templates directory currently only contains a .gitkeep file. No templates have been added yet."}
|
||||
{"role": "user", "content": "Create a harvest-prompt.md template in the templates directory."}
|
||||
{"role": "assistant", "content": "I'll create the harvest-prompt.md template for you.", "tool_calls": [{"function": "terminal", "arguments": {"command": "cat > compounding-intelligence/templates/harvest-prompt.md << 'EOF'\n# Knowledge Extraction Prompt\n\nExtract knowledge from session transcripts.\nEOF"}}]}
|
||||
{"role": "tool", "content": ""}
|
||||
{"role": "assistant", "content": "Template created successfully. The harvest-prompt.md file is now in the templates directory."}
|
||||
186
tests/test_license_checker.py
Normal file
186
tests/test_license_checker.py
Normal file
@@ -0,0 +1,186 @@
|
||||
#!/usr/bin/env python3
|
||||
"""Tests for license_checker.py — Pipeline 5.4"""
|
||||
|
||||
import json
|
||||
import os
|
||||
import sys
|
||||
import tempfile
|
||||
import unittest
|
||||
|
||||
# Add scripts dir to path
|
||||
sys.path.insert(0, os.path.dirname(__file__))
|
||||
|
||||
from license_checker import (
|
||||
normalize_license,
|
||||
check_compatibility,
|
||||
parse_requirements_txt,
|
||||
parse_package_json,
|
||||
parse_pyproject_toml,
|
||||
parse_go_mod,
|
||||
detect_project_license,
|
||||
scan_dep_files,
|
||||
generate_report,
|
||||
format_text,
|
||||
Severity,
|
||||
DepLicense,
|
||||
)
|
||||
|
||||
|
||||
class TestNormalizeLicense(unittest.TestCase):
|
||||
def test_mit_aliases(self):
|
||||
for alias in ["mit", "MIT License", "The MIT License", "MIT license"]:
|
||||
self.assertEqual(normalize_license(alias), "MIT")
|
||||
|
||||
def test_apache_aliases(self):
|
||||
for alias in ["Apache 2.0", "Apache-2.0", "apache software license"]:
|
||||
self.assertEqual(normalize_license(alias), "Apache-2.0")
|
||||
|
||||
def test_gpl_aliases(self):
|
||||
self.assertEqual(normalize_license("GPL-3.0"), "GPL-3.0")
|
||||
self.assertEqual(normalize_license("gplv3"), "GPL-3.0")
|
||||
|
||||
def test_unknown(self):
|
||||
self.assertEqual(normalize_license(""), "UNKNOWN")
|
||||
self.assertEqual(normalize_license("UNKNOWN"), "UNKNOWN")
|
||||
|
||||
def test_already_spdx(self):
|
||||
self.assertEqual(normalize_license("BSD-3-Clause"), "BSD-3-Clause")
|
||||
|
||||
|
||||
class TestCheckCompatibility(unittest.TestCase):
|
||||
def test_permissive_ok(self):
|
||||
sev, msg = check_compatibility("MIT", "MIT")
|
||||
self.assertEqual(sev, Severity.OK)
|
||||
|
||||
def test_gpl_in_mit_error(self):
|
||||
sev, msg = check_compatibility("GPL-3.0", "MIT")
|
||||
self.assertEqual(sev, Severity.ERROR)
|
||||
|
||||
def test_unknown_warning(self):
|
||||
sev, msg = check_compatibility("UNKNOWN", "MIT")
|
||||
self.assertEqual(sev, Severity.WARNING)
|
||||
|
||||
def test_apache_in_mit_ok(self):
|
||||
sev, msg = check_compatibility("Apache-2.0", "MIT")
|
||||
self.assertEqual(sev, Severity.OK)
|
||||
|
||||
def test_lgpl_in_mit_error(self):
|
||||
sev, msg = check_compatibility("LGPL-3.0", "MIT")
|
||||
self.assertEqual(sev, Severity.ERROR)
|
||||
|
||||
|
||||
class TestParseRequirements(unittest.TestCase):
|
||||
def test_basic(self):
|
||||
with tempfile.NamedTemporaryFile(mode="w", suffix=".txt", delete=False) as f:
|
||||
f.write("requests>=2.28.0\nflask==2.3.0\n# comment\npytest\n")
|
||||
f.flush()
|
||||
deps = parse_requirements_txt(f.name)
|
||||
os.unlink(f.name)
|
||||
names = [d.name for d in deps]
|
||||
self.assertIn("requests", names)
|
||||
self.assertIn("flask", names)
|
||||
self.assertIn("pytest", names)
|
||||
self.assertEqual(len(deps), 3)
|
||||
|
||||
def test_skip_flags(self):
|
||||
with tempfile.NamedTemporaryFile(mode="w", suffix=".txt", delete=False) as f:
|
||||
f.write("-r other.txt\n--index-url https://pypi.org\nreal-dep\n")
|
||||
f.flush()
|
||||
deps = parse_requirements_txt(f.name)
|
||||
os.unlink(f.name)
|
||||
self.assertEqual(len(deps), 1)
|
||||
self.assertEqual(deps[0].name, "real-dep")
|
||||
|
||||
|
||||
class TestParsePackageJson(unittest.TestCase):
|
||||
def test_basic(self):
|
||||
data = {
|
||||
"dependencies": {"express": "^4.18.0", "lodash": "^4.17.21"},
|
||||
"devDependencies": {"jest": "^29.0.0"},
|
||||
}
|
||||
with tempfile.NamedTemporaryFile(mode="w", suffix=".json", delete=False) as f:
|
||||
json.dump(data, f)
|
||||
f.flush()
|
||||
deps = parse_package_json(f.name)
|
||||
os.unlink(f.name)
|
||||
names = [d.name for d in deps]
|
||||
self.assertIn("express", names)
|
||||
self.assertIn("jest", names)
|
||||
self.assertEqual(len(deps), 3)
|
||||
|
||||
|
||||
class TestParseGoMod(unittest.TestCase):
|
||||
def test_basic(self):
|
||||
content = """module example.com/mymod
|
||||
|
||||
go 1.21
|
||||
|
||||
require (
|
||||
github.com/gin-gonic/gin v1.9.1
|
||||
github.com/stretchr/testify v1.8.4
|
||||
)
|
||||
"""
|
||||
with tempfile.NamedTemporaryFile(mode="w", suffix=".mod", delete=False) as f:
|
||||
f.write(content)
|
||||
f.flush()
|
||||
deps = parse_go_mod(f.name)
|
||||
os.unlink(f.name)
|
||||
self.assertEqual(len(deps), 2)
|
||||
self.assertEqual(deps[0].name, "github.com/gin-gonic/gin")
|
||||
|
||||
|
||||
class TestDetectProjectLicense(unittest.TestCase):
|
||||
def test_mit_file(self):
|
||||
with tempfile.TemporaryDirectory() as d:
|
||||
with open(os.path.join(d, "LICENSE"), "w") as f:
|
||||
f.write("MIT License\n\nCopyright (c) 2024...\n")
|
||||
self.assertEqual(detect_project_license(d), "MIT")
|
||||
|
||||
def test_apache_file(self):
|
||||
with tempfile.TemporaryDirectory() as d:
|
||||
with open(os.path.join(d, "LICENSE"), "w") as f:
|
||||
f.write("Apache License Version 2.0...")
|
||||
self.assertEqual(detect_project_license(d), "Apache-2.0")
|
||||
|
||||
def test_no_license(self):
|
||||
with tempfile.TemporaryDirectory() as d:
|
||||
self.assertEqual(detect_project_license(d), "UNKNOWN")
|
||||
|
||||
|
||||
class TestScanDeps(unittest.TestCase):
|
||||
def test_multi_ecosystem(self):
|
||||
with tempfile.TemporaryDirectory() as d:
|
||||
with open(os.path.join(d, "requirements.txt"), "w") as f:
|
||||
f.write("flask\nrequests\n")
|
||||
with open(os.path.join(d, "package.json"), "w") as f:
|
||||
json.dump({"dependencies": {"express": "^4.0.0"}}, f)
|
||||
deps = scan_dep_files(d)
|
||||
names = [d.name for d in deps]
|
||||
self.assertIn("flask", names)
|
||||
self.assertIn("express", names)
|
||||
|
||||
|
||||
class TestGenerateReport(unittest.TestCase):
|
||||
def test_basic(self):
|
||||
deps = [
|
||||
DepLicense(name="flask", license="BSD-3-Clause", source="requirements.txt"),
|
||||
DepLicense(name="gpl-pkg", license="GPL-3.0", source="requirements.txt"),
|
||||
DepLicense(name="unknown-pkg", license="UNKNOWN", source="requirements.txt"),
|
||||
]
|
||||
report = generate_report(deps, "MIT")
|
||||
self.assertEqual(report.summary["ok"], 1)
|
||||
self.assertEqual(report.summary["error"], 1)
|
||||
self.assertEqual(report.summary["warning"], 1)
|
||||
self.assertEqual(len(report.errors), 1)
|
||||
self.assertIn("gpl-pkg", report.errors[0])
|
||||
|
||||
def test_format_text(self):
|
||||
deps = [DepLicense(name="flask", license="BSD-3-Clause", source="requirements.txt")]
|
||||
report = generate_report(deps, "MIT")
|
||||
text = format_text(report)
|
||||
self.assertIn("LICENSE COMPATIBILITY REPORT", text)
|
||||
self.assertIn("flask", text)
|
||||
|
||||
|
||||
if __name__ == "__main__":
|
||||
unittest.main()
|
||||
Reference in New Issue
Block a user