Compare commits
6 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
10ae8990e9 | ||
| 27aa29f9c8 | |||
| 39cf447ee0 | |||
| fe5b9c8b75 | |||
| 871188ec12 | |||
| 9482403a23 |
@@ -6,3 +6,4 @@ rules:
|
|||||||
require_ci_to_merge: false # CI runner dead (issue #915)
|
require_ci_to_merge: false # CI runner dead (issue #915)
|
||||||
block_force_pushes: true
|
block_force_pushes: true
|
||||||
block_deletions: true
|
block_deletions: true
|
||||||
|
block_on_outdated_branch: true
|
||||||
|
|||||||
1
.github/BRANCH_PROTECTION.md
vendored
1
.github/BRANCH_PROTECTION.md
vendored
@@ -12,6 +12,7 @@ All repositories must enforce these rules on the `main` branch:
|
|||||||
| Require CI to pass | ⚠ Conditional | Only where CI exists |
|
| Require CI to pass | ⚠ Conditional | Only where CI exists |
|
||||||
| Block force push | ✅ Enabled | Protect commit history |
|
| Block force push | ✅ Enabled | Protect commit history |
|
||||||
| Block branch deletion | ✅ Enabled | Prevent accidental deletion |
|
| Block branch deletion | ✅ Enabled | Prevent accidental deletion |
|
||||||
|
| Require branch up-to-date before merge | ✅ Enabled | Surface conflicts before merge and force contributors to rebase |
|
||||||
|
|
||||||
## Default Reviewer Assignments
|
## Default Reviewer Assignments
|
||||||
|
|
||||||
|
|||||||
@@ -1,34 +0,0 @@
|
|||||||
{
|
|
||||||
"roles": {
|
|
||||||
"lead": ["publish", "checkpoint", "handoff", "read", "audit", "configure_isolation"],
|
|
||||||
"write": ["publish", "checkpoint", "handoff", "read"],
|
|
||||||
"read": ["read"],
|
|
||||||
"audit": ["read", "audit"]
|
|
||||||
},
|
|
||||||
"isolation_profiles": [
|
|
||||||
{
|
|
||||||
"name": "level1-directory",
|
|
||||||
"label": "Level 1 — directory workspace",
|
|
||||||
"level": 1,
|
|
||||||
"mechanism": "directory_workspace",
|
|
||||||
"description": "Single mission cell in an isolated workspace directory.",
|
|
||||||
"supports_resume": true
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "level2-mount-namespace",
|
|
||||||
"label": "Level 2 — mount namespace",
|
|
||||||
"level": 2,
|
|
||||||
"mechanism": "mount_namespace",
|
|
||||||
"description": "Mount-namespace isolation with explicit mission-cell mounts.",
|
|
||||||
"supports_resume": true
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "level3-rootless-podman",
|
|
||||||
"label": "Level 3 — rootless Podman",
|
|
||||||
"level": 3,
|
|
||||||
"mechanism": "rootless_podman",
|
|
||||||
"description": "Rootless Podman cell for the strongest process and filesystem containment.",
|
|
||||||
"supports_resume": true
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
@@ -1,31 +0,0 @@
|
|||||||
# Mission Bus
|
|
||||||
|
|
||||||
The Mission Bus grounds the multi-agent teaming epic with a concrete, executable shared module.
|
|
||||||
|
|
||||||
## What it adds
|
|
||||||
- one unified mission stream for messages, checkpoints, and handoffs
|
|
||||||
- role-based permissions for `lead`, `write`, `read`, and `audit`
|
|
||||||
- cross-agent handoff packets so Agent A can checkpoint and Agent B can resume
|
|
||||||
- declared isolation profiles for Level 1, Level 2, and Level 3 mission cells
|
|
||||||
|
|
||||||
## Files
|
|
||||||
- `nexus/mission_bus.py`
|
|
||||||
- `config/mission_bus_profiles.json`
|
|
||||||
|
|
||||||
## Example
|
|
||||||
|
|
||||||
```python
|
|
||||||
from nexus.mission_bus import MissionBus, MissionRole, load_profiles
|
|
||||||
from pathlib import Path
|
|
||||||
|
|
||||||
bus = MissionBus("mission-883", title="multi-agent teaming", config=load_profiles(Path("config/mission_bus_profiles.json")))
|
|
||||||
bus.register_participant("timmy", MissionRole.LEAD)
|
|
||||||
bus.register_participant("ezra", MissionRole.WRITE)
|
|
||||||
checkpoint = bus.create_checkpoint("ezra", summary="checkpoint", state={"branch": "fix/883"})
|
|
||||||
bus.handoff("ezra", "timmy", checkpoint.checkpoint_id, note="resume from here")
|
|
||||||
packet = bus.build_resume_packet(bus.events[-1].handoff_id)
|
|
||||||
```
|
|
||||||
|
|
||||||
## Scope of this slice
|
|
||||||
This slice does not yet wire a live transport or rootless container launcher.
|
|
||||||
It codifies the mission bus contract, role permissions, handoff packet, and isolation profile surface so later work can execute against a stable interface.
|
|
||||||
@@ -395,6 +395,7 @@
|
|||||||
<div id="memory-connections-panel" class="memory-connections-panel" style="display:none;" aria-label="Memory Connections Panel"></div>
|
<div id="memory-connections-panel" class="memory-connections-panel" style="display:none;" aria-label="Memory Connections Panel"></div>
|
||||||
|
|
||||||
<script src="./boot.js"></script>
|
<script src="./boot.js"></script>
|
||||||
|
<script src="./js/mempalace-fleet-poller.js"></script>
|
||||||
<script>
|
<script>
|
||||||
function openMemoryFilter() { renderFilterList(); document.getElementById('memory-filter').style.display = 'flex'; }
|
function openMemoryFilter() { renderFilterList(); document.getElementById('memory-filter').style.display = 'flex'; }
|
||||||
function closeMemoryFilter() { document.getElementById('memory-filter').style.display = 'none'; }
|
function closeMemoryFilter() { document.getElementById('memory-filter').style.display = 'none'; }
|
||||||
|
|||||||
224
js/mempalace-fleet-poller.js
Normal file
224
js/mempalace-fleet-poller.js
Normal file
@@ -0,0 +1,224 @@
|
|||||||
|
/**
|
||||||
|
* MemPalace Fleet API Polling
|
||||||
|
* Issue #1602: fix: restore MemPalace Fleet API polling (BURN mode improvement)
|
||||||
|
*
|
||||||
|
* Restores Fleet API polling logic that was removed in nightly BURN mode update.
|
||||||
|
* Also restores missing formatBytes utility.
|
||||||
|
*/
|
||||||
|
|
||||||
|
class MemPalaceFleetPoller {
|
||||||
|
constructor(options = {}) {
|
||||||
|
this.apiBase = options.apiBase || this.detectApiBase();
|
||||||
|
this.pollInterval = options.pollInterval || 30000; // 30 seconds
|
||||||
|
this.pollTimer = null;
|
||||||
|
this.lastStats = null;
|
||||||
|
this.isPolling = false;
|
||||||
|
|
||||||
|
// UI elements
|
||||||
|
this.statusEl = document.getElementById('mem-palace-status');
|
||||||
|
this.ratioEl = document.getElementById('compression-ratio');
|
||||||
|
this.docsEl = document.getElementById('docs-mined');
|
||||||
|
this.sizeEl = document.getElementById('aaak-size');
|
||||||
|
|
||||||
|
// Bind methods
|
||||||
|
this.startPolling = this.startPolling.bind(this);
|
||||||
|
this.stopPolling = this.stopPolling.bind(this);
|
||||||
|
this.poll = this.poll.bind(this);
|
||||||
|
this.fetchStats = this.fetchStats.bind(this);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Detect API base URL from current location or URL params
|
||||||
|
*/
|
||||||
|
detectApiBase() {
|
||||||
|
const params = new URLSearchParams(window.location.search);
|
||||||
|
const override = params.get('mempalace');
|
||||||
|
|
||||||
|
if (override) {
|
||||||
|
return `http://${override}`;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Default: same host, port 7771
|
||||||
|
return `${window.location.protocol}//${window.location.hostname}:7771`;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Start polling the Fleet API
|
||||||
|
*/
|
||||||
|
startPolling() {
|
||||||
|
if (this.isPolling) {
|
||||||
|
console.warn('[MemPalace] Already polling');
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
console.log(`[MemPalace] Starting Fleet API polling every ${this.pollInterval / 1000}s`);
|
||||||
|
console.log(`[MemPalace] API base: ${this.apiBase}`);
|
||||||
|
|
||||||
|
this.isPolling = true;
|
||||||
|
|
||||||
|
// Initial fetch
|
||||||
|
this.poll();
|
||||||
|
|
||||||
|
// Set up interval
|
||||||
|
this.pollTimer = setInterval(this.poll, this.pollInterval);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Stop polling
|
||||||
|
*/
|
||||||
|
stopPolling() {
|
||||||
|
if (this.pollTimer) {
|
||||||
|
clearInterval(this.pollTimer);
|
||||||
|
this.pollTimer = null;
|
||||||
|
}
|
||||||
|
|
||||||
|
this.isPolling = false;
|
||||||
|
console.log('[MemPalace] Stopped Fleet API polling');
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Poll the Fleet API for updates
|
||||||
|
*/
|
||||||
|
async poll() {
|
||||||
|
try {
|
||||||
|
const stats = await this.fetchStats();
|
||||||
|
this.updateUI(stats);
|
||||||
|
this.lastStats = stats;
|
||||||
|
|
||||||
|
} catch (error) {
|
||||||
|
console.warn('[MemPalace] Fleet API poll failed:', error.message);
|
||||||
|
this.updateUI(null); // Show disconnected state
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Fetch stats from Fleet API
|
||||||
|
*/
|
||||||
|
async fetchStats() {
|
||||||
|
// Fetch health
|
||||||
|
const healthRes = await fetch(`${this.apiBase}/health`);
|
||||||
|
if (!healthRes.ok) {
|
||||||
|
throw new Error(`Health check failed: ${healthRes.status}`);
|
||||||
|
}
|
||||||
|
const health = await healthRes.json();
|
||||||
|
|
||||||
|
// Fetch wings
|
||||||
|
const wingsRes = await fetch(`${this.apiBase}/wings`);
|
||||||
|
const wings = wingsRes.ok ? await wingsRes.json() : { wings: [] };
|
||||||
|
|
||||||
|
// Count docs per wing by probing /search with broad query
|
||||||
|
let totalDocs = 0;
|
||||||
|
let totalSize = 0;
|
||||||
|
|
||||||
|
for (const wing of (wings.wings || [])) {
|
||||||
|
try {
|
||||||
|
const sr = await fetch(`${this.apiBase}/search?q=*&wing=${wing}&n=1`);
|
||||||
|
if (sr.ok) {
|
||||||
|
const sd = await sr.json();
|
||||||
|
totalDocs += sd.count || 0;
|
||||||
|
}
|
||||||
|
} catch (_) {
|
||||||
|
// Skip wing if search fails
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Calculate stats
|
||||||
|
const compressionRatio = totalDocs > 0 ? Math.max(1, Math.round(totalDocs * 0.3)) : 0;
|
||||||
|
const aaakSize = totalDocs * 64; // rough estimate: 64 bytes per AAAK-compressed doc
|
||||||
|
|
||||||
|
return {
|
||||||
|
status: 'active',
|
||||||
|
apiBase: this.apiBase,
|
||||||
|
health: health,
|
||||||
|
wings: wings.wings || [],
|
||||||
|
totalDocs: totalDocs,
|
||||||
|
compressionRatio: compressionRatio,
|
||||||
|
aaakSize: aaakSize,
|
||||||
|
timestamp: new Date().toISOString()
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Update UI with stats
|
||||||
|
*/
|
||||||
|
updateUI(stats) {
|
||||||
|
if (!stats) {
|
||||||
|
// Disconnected state
|
||||||
|
if (this.statusEl) {
|
||||||
|
this.statusEl.textContent = 'MEMPALACE OFFLINE';
|
||||||
|
this.statusEl.style.color = '#ff4466';
|
||||||
|
this.statusEl.style.textShadow = '0 0 10px #ff4466';
|
||||||
|
}
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Connected state
|
||||||
|
if (this.statusEl) {
|
||||||
|
this.statusEl.textContent = 'MEMPALACE ACTIVE';
|
||||||
|
this.statusEl.style.color = '#4af0c0';
|
||||||
|
this.statusEl.style.textShadow = '0 0 10px #4af0c0';
|
||||||
|
}
|
||||||
|
|
||||||
|
if (this.ratioEl) {
|
||||||
|
this.ratioEl.textContent = `${stats.compressionRatio}x`;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (this.docsEl) {
|
||||||
|
this.docsEl.textContent = String(stats.totalDocs);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (this.sizeEl) {
|
||||||
|
this.sizeEl.textContent = formatBytes(stats.aaakSize);
|
||||||
|
}
|
||||||
|
|
||||||
|
console.log(`[MemPalace] Connected to ${stats.apiBase} — ${stats.totalDocs} docs across ${stats.wings.length} wings`);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Get current stats
|
||||||
|
*/
|
||||||
|
getStats() {
|
||||||
|
return this.lastStats;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Check if connected
|
||||||
|
*/
|
||||||
|
isConnected() {
|
||||||
|
return this.lastStats && this.lastStats.status === 'active';
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Restore formatBytes utility (was removed in BURN mode update)
|
||||||
|
function formatBytes(bytes) {
|
||||||
|
if (bytes === 0) return '0 B';
|
||||||
|
|
||||||
|
const k = 1024;
|
||||||
|
const sizes = ['B', 'KB', 'MB', 'GB', 'TB'];
|
||||||
|
const i = Math.floor(Math.log(bytes) / Math.log(k));
|
||||||
|
|
||||||
|
return parseFloat((bytes / Math.pow(k, i)).toFixed(1)) + ' ' + sizes[i];
|
||||||
|
}
|
||||||
|
|
||||||
|
// Export for use in other modules
|
||||||
|
if (typeof module !== 'undefined' && module.exports) {
|
||||||
|
module.exports = { MemPalaceFleetPoller, formatBytes };
|
||||||
|
}
|
||||||
|
|
||||||
|
// Global instance for browser use
|
||||||
|
if (typeof window !== 'undefined') {
|
||||||
|
window.MemPalaceFleetPoller = MemPalaceFleetPoller;
|
||||||
|
window.formatBytes = formatBytes;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Auto-initialize if MemPalace container exists
|
||||||
|
document.addEventListener('DOMContentLoaded', () => {
|
||||||
|
const container = document.getElementById('mem-palace-container');
|
||||||
|
if (container) {
|
||||||
|
const poller = new MemPalaceFleetPoller();
|
||||||
|
poller.startPolling();
|
||||||
|
|
||||||
|
// Store globally for access
|
||||||
|
window.mempalacePoller = poller;
|
||||||
|
}
|
||||||
|
});
|
||||||
@@ -14,16 +14,6 @@ from nexus.perception_adapter import (
|
|||||||
)
|
)
|
||||||
from nexus.experience_store import ExperienceStore
|
from nexus.experience_store import ExperienceStore
|
||||||
from nexus.trajectory_logger import TrajectoryLogger
|
from nexus.trajectory_logger import TrajectoryLogger
|
||||||
from nexus.mission_bus import (
|
|
||||||
MissionBus,
|
|
||||||
MissionRole,
|
|
||||||
MissionParticipant,
|
|
||||||
MissionMessage,
|
|
||||||
MissionCheckpoint,
|
|
||||||
MissionHandoff,
|
|
||||||
IsolationProfile,
|
|
||||||
load_profiles,
|
|
||||||
)
|
|
||||||
|
|
||||||
try:
|
try:
|
||||||
from nexus.nexus_think import NexusMind
|
from nexus.nexus_think import NexusMind
|
||||||
@@ -38,13 +28,5 @@ __all__ = [
|
|||||||
"Action",
|
"Action",
|
||||||
"ExperienceStore",
|
"ExperienceStore",
|
||||||
"TrajectoryLogger",
|
"TrajectoryLogger",
|
||||||
"MissionBus",
|
|
||||||
"MissionRole",
|
|
||||||
"MissionParticipant",
|
|
||||||
"MissionMessage",
|
|
||||||
"MissionCheckpoint",
|
|
||||||
"MissionHandoff",
|
|
||||||
"IsolationProfile",
|
|
||||||
"load_profiles",
|
|
||||||
"NexusMind",
|
"NexusMind",
|
||||||
]
|
]
|
||||||
|
|||||||
@@ -1,358 +0,0 @@
|
|||||||
"""Mission bus, role permissions, cross-agent handoff, and isolation profiles.
|
|
||||||
|
|
||||||
Grounded implementation slice for #883.
|
|
||||||
The bus gives a single mission cell a unified event stream, permission-checked
|
|
||||||
roles, checkpoint + resume handoff, and declared isolation profiles for Level
|
|
||||||
1/2/3 execution boundaries.
|
|
||||||
"""
|
|
||||||
|
|
||||||
from __future__ import annotations
|
|
||||||
|
|
||||||
import json
|
|
||||||
import uuid
|
|
||||||
from dataclasses import dataclass, field
|
|
||||||
from datetime import datetime, timezone
|
|
||||||
from enum import Enum
|
|
||||||
from pathlib import Path
|
|
||||||
from typing import Any, Dict, List, Union
|
|
||||||
|
|
||||||
|
|
||||||
DEFAULT_CONFIG = {
|
|
||||||
"roles": {
|
|
||||||
"lead": ["publish", "checkpoint", "handoff", "read", "audit", "configure_isolation"],
|
|
||||||
"write": ["publish", "checkpoint", "handoff", "read"],
|
|
||||||
"read": ["read"],
|
|
||||||
"audit": ["read", "audit"],
|
|
||||||
},
|
|
||||||
"isolation_profiles": [
|
|
||||||
{
|
|
||||||
"name": "level1-directory",
|
|
||||||
"label": "Level 1 — directory workspace",
|
|
||||||
"level": 1,
|
|
||||||
"mechanism": "directory_workspace",
|
|
||||||
"description": "Single mission cell in an isolated workspace directory.",
|
|
||||||
"supports_resume": True,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "level2-mount-namespace",
|
|
||||||
"label": "Level 2 — mount namespace",
|
|
||||||
"level": 2,
|
|
||||||
"mechanism": "mount_namespace",
|
|
||||||
"description": "Mount-namespace isolation with explicit mission-cell mounts.",
|
|
||||||
"supports_resume": True,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "level3-rootless-podman",
|
|
||||||
"label": "Level 3 — rootless Podman",
|
|
||||||
"level": 3,
|
|
||||||
"mechanism": "rootless_podman",
|
|
||||||
"description": "Rootless Podman cell for the strongest process and filesystem containment.",
|
|
||||||
"supports_resume": True,
|
|
||||||
},
|
|
||||||
],
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
def utcnow_iso() -> str:
|
|
||||||
return datetime.now(timezone.utc).isoformat()
|
|
||||||
|
|
||||||
|
|
||||||
def load_profiles(path: Path) -> Dict[str, Any]:
|
|
||||||
if not path.exists():
|
|
||||||
return json.loads(json.dumps(DEFAULT_CONFIG))
|
|
||||||
with open(path, "r", encoding="utf-8") as handle:
|
|
||||||
data = json.load(handle)
|
|
||||||
data.setdefault("roles", DEFAULT_CONFIG["roles"])
|
|
||||||
data.setdefault("isolation_profiles", DEFAULT_CONFIG["isolation_profiles"])
|
|
||||||
return data
|
|
||||||
|
|
||||||
|
|
||||||
class MissionRole(str, Enum):
|
|
||||||
LEAD = "lead"
|
|
||||||
WRITE = "write"
|
|
||||||
READ = "read"
|
|
||||||
AUDIT = "audit"
|
|
||||||
|
|
||||||
|
|
||||||
@dataclass
|
|
||||||
class IsolationProfile:
|
|
||||||
name: str
|
|
||||||
label: str
|
|
||||||
level: int
|
|
||||||
mechanism: str
|
|
||||||
description: str = ""
|
|
||||||
supports_resume: bool = True
|
|
||||||
|
|
||||||
def to_dict(self) -> Dict[str, Any]:
|
|
||||||
return {
|
|
||||||
"name": self.name,
|
|
||||||
"label": self.label,
|
|
||||||
"level": self.level,
|
|
||||||
"mechanism": self.mechanism,
|
|
||||||
"description": self.description,
|
|
||||||
"supports_resume": self.supports_resume,
|
|
||||||
}
|
|
||||||
|
|
||||||
@classmethod
|
|
||||||
def from_dict(cls, data: Dict[str, Any]) -> "IsolationProfile":
|
|
||||||
return cls(
|
|
||||||
name=data["name"],
|
|
||||||
label=data["label"],
|
|
||||||
level=int(data["level"]),
|
|
||||||
mechanism=data["mechanism"],
|
|
||||||
description=data.get("description", ""),
|
|
||||||
supports_resume=bool(data.get("supports_resume", True)),
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
@dataclass
|
|
||||||
class MissionParticipant:
|
|
||||||
name: str
|
|
||||||
role: MissionRole
|
|
||||||
metadata: Dict[str, Any] = field(default_factory=dict)
|
|
||||||
|
|
||||||
def to_dict(self) -> Dict[str, Any]:
|
|
||||||
return {
|
|
||||||
"name": self.name,
|
|
||||||
"role": self.role.value,
|
|
||||||
"metadata": self.metadata,
|
|
||||||
}
|
|
||||||
|
|
||||||
@classmethod
|
|
||||||
def from_dict(cls, data: Dict[str, Any]) -> "MissionParticipant":
|
|
||||||
return cls(name=data["name"], role=MissionRole(data["role"]), metadata=data.get("metadata", {}))
|
|
||||||
|
|
||||||
|
|
||||||
@dataclass
|
|
||||||
class MissionMessage:
|
|
||||||
sender: str
|
|
||||||
topic: str
|
|
||||||
payload: Dict[str, Any]
|
|
||||||
sequence: int
|
|
||||||
timestamp: str = field(default_factory=utcnow_iso)
|
|
||||||
message_id: str = field(default_factory=lambda: str(uuid.uuid4()))
|
|
||||||
event_type: str = field(default="message", init=False)
|
|
||||||
|
|
||||||
def to_dict(self) -> Dict[str, Any]:
|
|
||||||
return {
|
|
||||||
"event_type": self.event_type,
|
|
||||||
"sender": self.sender,
|
|
||||||
"topic": self.topic,
|
|
||||||
"payload": self.payload,
|
|
||||||
"sequence": self.sequence,
|
|
||||||
"timestamp": self.timestamp,
|
|
||||||
"message_id": self.message_id,
|
|
||||||
}
|
|
||||||
|
|
||||||
@classmethod
|
|
||||||
def from_dict(cls, data: Dict[str, Any]) -> "MissionMessage":
|
|
||||||
return cls(
|
|
||||||
sender=data["sender"],
|
|
||||||
topic=data["topic"],
|
|
||||||
payload=data["payload"],
|
|
||||||
sequence=int(data["sequence"]),
|
|
||||||
timestamp=data.get("timestamp", utcnow_iso()),
|
|
||||||
message_id=data.get("message_id") or data.get("messageId") or str(uuid.uuid4()),
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
@dataclass
|
|
||||||
class MissionCheckpoint:
|
|
||||||
sender: str
|
|
||||||
summary: str
|
|
||||||
state: Dict[str, Any]
|
|
||||||
sequence: int
|
|
||||||
artifacts: List[str] = field(default_factory=list)
|
|
||||||
timestamp: str = field(default_factory=utcnow_iso)
|
|
||||||
checkpoint_id: str = field(default_factory=lambda: str(uuid.uuid4()))
|
|
||||||
event_type: str = field(default="checkpoint", init=False)
|
|
||||||
|
|
||||||
def to_dict(self) -> Dict[str, Any]:
|
|
||||||
return {
|
|
||||||
"event_type": self.event_type,
|
|
||||||
"sender": self.sender,
|
|
||||||
"summary": self.summary,
|
|
||||||
"state": self.state,
|
|
||||||
"artifacts": self.artifacts,
|
|
||||||
"sequence": self.sequence,
|
|
||||||
"timestamp": self.timestamp,
|
|
||||||
"checkpoint_id": self.checkpoint_id,
|
|
||||||
}
|
|
||||||
|
|
||||||
@classmethod
|
|
||||||
def from_dict(cls, data: Dict[str, Any]) -> "MissionCheckpoint":
|
|
||||||
return cls(
|
|
||||||
sender=data["sender"],
|
|
||||||
summary=data["summary"],
|
|
||||||
state=data.get("state", {}),
|
|
||||||
artifacts=list(data.get("artifacts", [])),
|
|
||||||
sequence=int(data["sequence"]),
|
|
||||||
timestamp=data.get("timestamp", utcnow_iso()),
|
|
||||||
checkpoint_id=data.get("checkpoint_id") or data.get("checkpointId") or str(uuid.uuid4()),
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
@dataclass
|
|
||||||
class MissionHandoff:
|
|
||||||
sender: str
|
|
||||||
recipient: str
|
|
||||||
checkpoint_id: str
|
|
||||||
sequence: int
|
|
||||||
note: str = ""
|
|
||||||
timestamp: str = field(default_factory=utcnow_iso)
|
|
||||||
handoff_id: str = field(default_factory=lambda: str(uuid.uuid4()))
|
|
||||||
event_type: str = field(default="handoff", init=False)
|
|
||||||
|
|
||||||
def to_dict(self) -> Dict[str, Any]:
|
|
||||||
return {
|
|
||||||
"event_type": self.event_type,
|
|
||||||
"sender": self.sender,
|
|
||||||
"recipient": self.recipient,
|
|
||||||
"checkpoint_id": self.checkpoint_id,
|
|
||||||
"note": self.note,
|
|
||||||
"sequence": self.sequence,
|
|
||||||
"timestamp": self.timestamp,
|
|
||||||
"handoff_id": self.handoff_id,
|
|
||||||
}
|
|
||||||
|
|
||||||
@classmethod
|
|
||||||
def from_dict(cls, data: Dict[str, Any]) -> "MissionHandoff":
|
|
||||||
return cls(
|
|
||||||
sender=data["sender"],
|
|
||||||
recipient=data["recipient"],
|
|
||||||
checkpoint_id=data["checkpoint_id"] if "checkpoint_id" in data else data["checkpointId"],
|
|
||||||
note=data.get("note", ""),
|
|
||||||
sequence=int(data["sequence"]),
|
|
||||||
timestamp=data.get("timestamp", utcnow_iso()),
|
|
||||||
handoff_id=data.get("handoff_id") or data.get("handoffId") or str(uuid.uuid4()),
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
MissionEvent = Union[MissionMessage, MissionCheckpoint, MissionHandoff]
|
|
||||||
|
|
||||||
|
|
||||||
def event_from_dict(data: Dict[str, Any]) -> MissionEvent:
|
|
||||||
kind = data["event_type"]
|
|
||||||
if kind == "message":
|
|
||||||
return MissionMessage.from_dict(data)
|
|
||||||
if kind == "checkpoint":
|
|
||||||
return MissionCheckpoint.from_dict(data)
|
|
||||||
if kind == "handoff":
|
|
||||||
return MissionHandoff.from_dict(data)
|
|
||||||
raise ValueError(f"Unknown mission event type: {kind}")
|
|
||||||
|
|
||||||
|
|
||||||
class MissionBus:
|
|
||||||
def __init__(self, mission_id: str, title: str = "", config: Dict[str, Any] | None = None):
|
|
||||||
self.mission_id = mission_id
|
|
||||||
self.title = title
|
|
||||||
self.config = config or json.loads(json.dumps(DEFAULT_CONFIG))
|
|
||||||
self.role_permissions = {
|
|
||||||
role: set(perms) for role, perms in self.config.get("roles", {}).items()
|
|
||||||
}
|
|
||||||
self.isolation_profiles = [
|
|
||||||
IsolationProfile.from_dict(entry) for entry in self.config.get("isolation_profiles", [])
|
|
||||||
]
|
|
||||||
self.participants: Dict[str, MissionParticipant] = {}
|
|
||||||
self.events: List[MissionEvent] = []
|
|
||||||
|
|
||||||
def register_participant(self, name: str, role: MissionRole, metadata: Dict[str, Any] | None = None) -> MissionParticipant:
|
|
||||||
participant = MissionParticipant(name=name, role=role, metadata=metadata or {})
|
|
||||||
self.participants[name] = participant
|
|
||||||
return participant
|
|
||||||
|
|
||||||
def allowed(self, name: str, capability: str) -> bool:
|
|
||||||
participant = self.participants.get(name)
|
|
||||||
if participant is None:
|
|
||||||
return False
|
|
||||||
return capability in self.role_permissions.get(participant.role.value, set())
|
|
||||||
|
|
||||||
def _require(self, name: str, capability: str) -> None:
|
|
||||||
if not self.allowed(name, capability):
|
|
||||||
raise PermissionError(f"{name} lacks '{capability}' permission")
|
|
||||||
|
|
||||||
def _next_sequence(self) -> int:
|
|
||||||
return len(self.events) + 1
|
|
||||||
|
|
||||||
def publish(self, sender: str, topic: str, payload: Dict[str, Any]) -> MissionMessage:
|
|
||||||
self._require(sender, "publish")
|
|
||||||
event = MissionMessage(sender=sender, topic=topic, payload=payload, sequence=self._next_sequence())
|
|
||||||
self.events.append(event)
|
|
||||||
return event
|
|
||||||
|
|
||||||
def create_checkpoint(
|
|
||||||
self,
|
|
||||||
sender: str,
|
|
||||||
summary: str,
|
|
||||||
state: Dict[str, Any],
|
|
||||||
artifacts: List[str] | None = None,
|
|
||||||
) -> MissionCheckpoint:
|
|
||||||
self._require(sender, "checkpoint")
|
|
||||||
event = MissionCheckpoint(
|
|
||||||
sender=sender,
|
|
||||||
summary=summary,
|
|
||||||
state=state,
|
|
||||||
artifacts=list(artifacts or []),
|
|
||||||
sequence=self._next_sequence(),
|
|
||||||
)
|
|
||||||
self.events.append(event)
|
|
||||||
return event
|
|
||||||
|
|
||||||
def _get_checkpoint(self, checkpoint_id: str) -> MissionCheckpoint:
|
|
||||||
for event in self.events:
|
|
||||||
if isinstance(event, MissionCheckpoint) and event.checkpoint_id == checkpoint_id:
|
|
||||||
return event
|
|
||||||
raise KeyError(f"Unknown checkpoint: {checkpoint_id}")
|
|
||||||
|
|
||||||
def _get_handoff(self, handoff_id: str) -> MissionHandoff:
|
|
||||||
for event in self.events:
|
|
||||||
if isinstance(event, MissionHandoff) and event.handoff_id == handoff_id:
|
|
||||||
return event
|
|
||||||
raise KeyError(f"Unknown handoff: {handoff_id}")
|
|
||||||
|
|
||||||
def handoff(self, sender: str, recipient: str, checkpoint_id: str, note: str = "") -> MissionHandoff:
|
|
||||||
self._require(sender, "handoff")
|
|
||||||
if recipient not in self.participants:
|
|
||||||
raise KeyError(f"Unknown recipient: {recipient}")
|
|
||||||
self._get_checkpoint(checkpoint_id)
|
|
||||||
event = MissionHandoff(
|
|
||||||
sender=sender,
|
|
||||||
recipient=recipient,
|
|
||||||
checkpoint_id=checkpoint_id,
|
|
||||||
note=note,
|
|
||||||
sequence=self._next_sequence(),
|
|
||||||
)
|
|
||||||
self.events.append(event)
|
|
||||||
return event
|
|
||||||
|
|
||||||
def build_resume_packet(self, handoff_id: str) -> Dict[str, Any]:
|
|
||||||
handoff = self._get_handoff(handoff_id)
|
|
||||||
checkpoint = self._get_checkpoint(handoff.checkpoint_id)
|
|
||||||
return {
|
|
||||||
"mission_id": self.mission_id,
|
|
||||||
"title": self.title,
|
|
||||||
"recipient": handoff.recipient,
|
|
||||||
"sender": handoff.sender,
|
|
||||||
"handoff_note": handoff.note,
|
|
||||||
"checkpoint": checkpoint.to_dict(),
|
|
||||||
"participants": {name: participant.to_dict() for name, participant in self.participants.items()},
|
|
||||||
"isolation_profiles": [profile.to_dict() for profile in self.isolation_profiles],
|
|
||||||
"stream_length": len(self.events),
|
|
||||||
}
|
|
||||||
|
|
||||||
def to_dict(self) -> Dict[str, Any]:
|
|
||||||
return {
|
|
||||||
"mission_id": self.mission_id,
|
|
||||||
"title": self.title,
|
|
||||||
"config": self.config,
|
|
||||||
"participants": {name: participant.to_dict() for name, participant in self.participants.items()},
|
|
||||||
"events": [event.to_dict() for event in self.events],
|
|
||||||
}
|
|
||||||
|
|
||||||
@classmethod
|
|
||||||
def from_dict(cls, data: Dict[str, Any]) -> "MissionBus":
|
|
||||||
bus = cls(data["mission_id"], title=data.get("title", ""), config=data.get("config"))
|
|
||||||
for name, participant_data in data.get("participants", {}).items():
|
|
||||||
bus.participants[name] = MissionParticipant.from_dict(participant_data)
|
|
||||||
bus.events = [event_from_dict(event_data) for event_data in data.get("events", [])]
|
|
||||||
return bus
|
|
||||||
@@ -4,48 +4,61 @@ Sync branch protection rules from .gitea/branch-protection/*.yml to Gitea.
|
|||||||
Correctly uses the Gitea 1.25+ API (not GitHub-style).
|
Correctly uses the Gitea 1.25+ API (not GitHub-style).
|
||||||
"""
|
"""
|
||||||
|
|
||||||
|
from __future__ import annotations
|
||||||
|
|
||||||
|
import json
|
||||||
import os
|
import os
|
||||||
import sys
|
import sys
|
||||||
import json
|
|
||||||
import urllib.request
|
import urllib.request
|
||||||
|
from pathlib import Path
|
||||||
|
|
||||||
import yaml
|
import yaml
|
||||||
|
|
||||||
GITEA_URL = os.getenv("GITEA_URL", "https://forge.alexanderwhitestone.com")
|
GITEA_URL = os.getenv("GITEA_URL", "https://forge.alexanderwhitestone.com")
|
||||||
GITEA_TOKEN = os.getenv("GITEA_TOKEN", "")
|
GITEA_TOKEN = os.getenv("GITEA_TOKEN", "")
|
||||||
ORG = "Timmy_Foundation"
|
ORG = "Timmy_Foundation"
|
||||||
CONFIG_DIR = ".gitea/branch-protection"
|
PROJECT_ROOT = Path(__file__).resolve().parent.parent
|
||||||
|
CONFIG_DIR = PROJECT_ROOT / ".gitea" / "branch-protection"
|
||||||
|
|
||||||
|
|
||||||
def api_request(method: str, path: str, payload: dict | None = None) -> dict:
|
def api_request(method: str, path: str, payload: dict | None = None) -> dict:
|
||||||
url = f"{GITEA_URL}/api/v1{path}"
|
url = f"{GITEA_URL}/api/v1{path}"
|
||||||
data = json.dumps(payload).encode() if payload else None
|
data = json.dumps(payload).encode() if payload else None
|
||||||
req = urllib.request.Request(url, data=data, method=method, headers={
|
req = urllib.request.Request(
|
||||||
"Authorization": f"token {GITEA_TOKEN}",
|
url,
|
||||||
"Content-Type": "application/json",
|
data=data,
|
||||||
})
|
method=method,
|
||||||
|
headers={
|
||||||
|
"Authorization": f"token {GITEA_TOKEN}",
|
||||||
|
"Content-Type": "application/json",
|
||||||
|
},
|
||||||
|
)
|
||||||
with urllib.request.urlopen(req, timeout=30) as resp:
|
with urllib.request.urlopen(req, timeout=30) as resp:
|
||||||
return json.loads(resp.read().decode())
|
return json.loads(resp.read().decode())
|
||||||
|
|
||||||
|
|
||||||
def apply_protection(repo: str, rules: dict) -> bool:
|
def build_branch_protection_payload(branch: str, rules: dict) -> dict:
|
||||||
branch = rules.pop("branch", "main")
|
return {
|
||||||
# Check if protection already exists
|
|
||||||
existing = api_request("GET", f"/repos/{ORG}/{repo}/branch_protections")
|
|
||||||
exists = any(r.get("branch_name") == branch for r in existing)
|
|
||||||
|
|
||||||
payload = {
|
|
||||||
"branch_name": branch,
|
"branch_name": branch,
|
||||||
"rule_name": branch,
|
"rule_name": branch,
|
||||||
"required_approvals": rules.get("required_approvals", 1),
|
"required_approvals": rules.get("required_approvals", 1),
|
||||||
"block_on_rejected_reviews": rules.get("block_on_rejected_reviews", True),
|
"block_on_rejected_reviews": rules.get("block_on_rejected_reviews", True),
|
||||||
"dismiss_stale_approvals": rules.get("dismiss_stale_approvals", True),
|
"dismiss_stale_approvals": rules.get("dismiss_stale_approvals", True),
|
||||||
"block_deletions": rules.get("block_deletions", True),
|
"block_deletions": rules.get("block_deletions", True),
|
||||||
"block_force_push": rules.get("block_force_push", True),
|
"block_force_push": rules.get("block_force_push", rules.get("block_force_pushes", True)),
|
||||||
"block_admin_merge_override": rules.get("block_admin_merge_override", True),
|
"block_admin_merge_override": rules.get("block_admin_merge_override", True),
|
||||||
"enable_status_check": rules.get("require_ci_to_merge", False),
|
"enable_status_check": rules.get("require_ci_to_merge", False),
|
||||||
"status_check_contexts": rules.get("status_check_contexts", []),
|
"status_check_contexts": rules.get("status_check_contexts", []),
|
||||||
|
"block_on_outdated_branch": rules.get("block_on_outdated_branch", False),
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
def apply_protection(repo: str, rules: dict) -> bool:
|
||||||
|
branch = rules.get("branch", "main")
|
||||||
|
existing = api_request("GET", f"/repos/{ORG}/{repo}/branch_protections")
|
||||||
|
exists = any(rule.get("branch_name") == branch for rule in existing)
|
||||||
|
payload = build_branch_protection_payload(branch, rules)
|
||||||
|
|
||||||
try:
|
try:
|
||||||
if exists:
|
if exists:
|
||||||
api_request("PATCH", f"/repos/{ORG}/{repo}/branch_protections/{branch}", payload)
|
api_request("PATCH", f"/repos/{ORG}/{repo}/branch_protections/{branch}", payload)
|
||||||
@@ -53,8 +66,8 @@ def apply_protection(repo: str, rules: dict) -> bool:
|
|||||||
api_request("POST", f"/repos/{ORG}/{repo}/branch_protections", payload)
|
api_request("POST", f"/repos/{ORG}/{repo}/branch_protections", payload)
|
||||||
print(f"✅ {repo}:{branch} synced")
|
print(f"✅ {repo}:{branch} synced")
|
||||||
return True
|
return True
|
||||||
except Exception as e:
|
except Exception as exc:
|
||||||
print(f"❌ {repo}:{branch} failed: {e}")
|
print(f"❌ {repo}:{branch} failed: {exc}")
|
||||||
return False
|
return False
|
||||||
|
|
||||||
|
|
||||||
@@ -62,15 +75,18 @@ def main() -> int:
|
|||||||
if not GITEA_TOKEN:
|
if not GITEA_TOKEN:
|
||||||
print("ERROR: GITEA_TOKEN not set")
|
print("ERROR: GITEA_TOKEN not set")
|
||||||
return 1
|
return 1
|
||||||
|
if not CONFIG_DIR.exists():
|
||||||
|
print(f"ERROR: config directory not found: {CONFIG_DIR}")
|
||||||
|
return 1
|
||||||
|
|
||||||
ok = 0
|
ok = 0
|
||||||
for fname in os.listdir(CONFIG_DIR):
|
for cfg_path in sorted(CONFIG_DIR.glob("*.yml")):
|
||||||
if not fname.endswith(".yml"):
|
repo = cfg_path.stem
|
||||||
continue
|
with cfg_path.open() as fh:
|
||||||
repo = fname[:-4]
|
cfg = yaml.safe_load(fh) or {}
|
||||||
with open(os.path.join(CONFIG_DIR, fname)) as f:
|
rules = cfg.get("rules", {})
|
||||||
cfg = yaml.safe_load(f)
|
rules.setdefault("branch", cfg.get("branch", "main"))
|
||||||
if apply_protection(repo, cfg.get("rules", {})):
|
if apply_protection(repo, rules):
|
||||||
ok += 1
|
ok += 1
|
||||||
|
|
||||||
print(f"\nSynced {ok} repo(s)")
|
print(f"\nSynced {ok} repo(s)")
|
||||||
|
|||||||
248
tests/test_mempalace_fleet_poller.js
Normal file
248
tests/test_mempalace_fleet_poller.js
Normal file
@@ -0,0 +1,248 @@
|
|||||||
|
/**
|
||||||
|
* Tests for MemPalace Fleet API Poller
|
||||||
|
* Issue #1602: fix: restore MemPalace Fleet API polling
|
||||||
|
*/
|
||||||
|
|
||||||
|
const test = require('node:test');
|
||||||
|
const assert = require('node:assert/strict');
|
||||||
|
const fs = require('node:fs');
|
||||||
|
const path = require('node:path');
|
||||||
|
|
||||||
|
const ROOT = path.resolve(__dirname, '..');
|
||||||
|
|
||||||
|
// Mock DOM environment
|
||||||
|
class Element {
|
||||||
|
constructor(tagName = 'div', id = '') {
|
||||||
|
this.tagName = String(tagName).toUpperCase();
|
||||||
|
this.id = id;
|
||||||
|
this.style = {};
|
||||||
|
this.children = [];
|
||||||
|
this.parentNode = null;
|
||||||
|
this.previousElementSibling = null;
|
||||||
|
this.innerHTML = '';
|
||||||
|
this.textContent = '';
|
||||||
|
this.className = '';
|
||||||
|
this.dataset = {};
|
||||||
|
this.attributes = {};
|
||||||
|
this._queryMap = new Map();
|
||||||
|
this.classList = {
|
||||||
|
add: (...names) => {
|
||||||
|
const set = new Set(this.className.split(/\s+/).filter(Boolean));
|
||||||
|
names.forEach((name) => set.add(name));
|
||||||
|
this.className = Array.from(set).join(' ');
|
||||||
|
},
|
||||||
|
remove: (...names) => {
|
||||||
|
const remove = new Set(names);
|
||||||
|
this.className = this.className
|
||||||
|
.split(/\s+/)
|
||||||
|
.filter((name) => name && !remove.has(name))
|
||||||
|
.join(' ');
|
||||||
|
}
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
appendChild(child) {
|
||||||
|
child.parentNode = this;
|
||||||
|
this.children.push(child);
|
||||||
|
return child;
|
||||||
|
}
|
||||||
|
|
||||||
|
removeChild(child) {
|
||||||
|
this.children = this.children.filter((candidate) => candidate !== child);
|
||||||
|
if (child.parentNode === this) child.parentNode = null;
|
||||||
|
return child;
|
||||||
|
}
|
||||||
|
|
||||||
|
addEventListener() {}
|
||||||
|
removeEventListener() {}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create mock document
|
||||||
|
const mockDocument = {
|
||||||
|
createElement: (tag) => new Element(tag),
|
||||||
|
getElementById: () => null,
|
||||||
|
addEventListener: () => {},
|
||||||
|
removeEventListener: () => {},
|
||||||
|
body: {
|
||||||
|
appendChild: () => {},
|
||||||
|
removeChild: () => {}
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
// Create mock fetch
|
||||||
|
const mockFetch = async (url) => {
|
||||||
|
if (url.includes('/health')) {
|
||||||
|
return {
|
||||||
|
ok: true,
|
||||||
|
status: 200,
|
||||||
|
json: async () => ({ status: 'ok', palace: '/test/path', palace_exists: true })
|
||||||
|
};
|
||||||
|
} else if (url.includes('/wings')) {
|
||||||
|
return {
|
||||||
|
ok: true,
|
||||||
|
status: 200,
|
||||||
|
json: async () => ({ wings: ['wing1', 'wing2'] })
|
||||||
|
};
|
||||||
|
} else if (url.includes('/search')) {
|
||||||
|
return {
|
||||||
|
ok: true,
|
||||||
|
status: 200,
|
||||||
|
json: async () => ({ results: [], count: 10, query: '*' })
|
||||||
|
};
|
||||||
|
}
|
||||||
|
throw new Error(`Unexpected URL: ${url}`);
|
||||||
|
};
|
||||||
|
|
||||||
|
// Load mempalace-fleet-poller.js
|
||||||
|
const pollerPath = path.join(ROOT, 'js', 'mempalace-fleet-poller.js');
|
||||||
|
const pollerCode = fs.readFileSync(pollerPath, 'utf8');
|
||||||
|
|
||||||
|
// Create VM context
|
||||||
|
const context = {
|
||||||
|
module: { exports: {} },
|
||||||
|
exports: {},
|
||||||
|
console,
|
||||||
|
document: mockDocument,
|
||||||
|
window: { location: { protocol: 'http:', hostname: 'localhost' } },
|
||||||
|
URLSearchParams: class {
|
||||||
|
constructor(search) { this.search = search; }
|
||||||
|
get() { return null; }
|
||||||
|
},
|
||||||
|
setInterval: () => {},
|
||||||
|
clearInterval: () => {},
|
||||||
|
fetch: mockFetch // Add fetch to context
|
||||||
|
};
|
||||||
|
|
||||||
|
// Execute in context
|
||||||
|
const vm = require('node:vm');
|
||||||
|
vm.runInNewContext(pollerCode, context);
|
||||||
|
|
||||||
|
// Get exports
|
||||||
|
const { MemPalaceFleetPoller, formatBytes } = context.module.exports;
|
||||||
|
|
||||||
|
test('MemPalaceFleetPoller loads correctly', () => {
|
||||||
|
assert.ok(MemPalaceFleetPoller, 'MemPalaceFleetPoller should be defined');
|
||||||
|
assert.ok(typeof MemPalaceFleetPoller === 'function', 'MemPalaceFleetPoller should be a constructor');
|
||||||
|
});
|
||||||
|
|
||||||
|
test('MemPalaceFleetPoller can be instantiated', () => {
|
||||||
|
const poller = new MemPalaceFleetPoller();
|
||||||
|
assert.ok(poller, 'MemPalaceFleetPoller instance should be created');
|
||||||
|
assert.ok(poller.apiBase, 'Should have apiBase');
|
||||||
|
assert.equal(poller.pollInterval, 30000, 'Should have default poll interval');
|
||||||
|
assert.ok(!poller.isPolling, 'Should not be polling initially');
|
||||||
|
});
|
||||||
|
|
||||||
|
test('MemPalaceFleetPoller detects API base', () => {
|
||||||
|
const poller = new MemPalaceFleetPoller();
|
||||||
|
assert.ok(poller.apiBase.includes('localhost:7771'), 'Should detect localhost:7771');
|
||||||
|
});
|
||||||
|
|
||||||
|
test('MemPalaceFleetPoller can start and stop polling', () => {
|
||||||
|
const poller = new MemPalaceFleetPoller();
|
||||||
|
|
||||||
|
// Start polling
|
||||||
|
poller.startPolling();
|
||||||
|
assert.ok(poller.isPolling, 'Should be polling after start');
|
||||||
|
|
||||||
|
// Stop polling
|
||||||
|
poller.stopPolling();
|
||||||
|
assert.ok(!poller.isPolling, 'Should not be polling after stop');
|
||||||
|
});
|
||||||
|
|
||||||
|
test('MemPalaceFleetPoller can fetch stats', async () => {
|
||||||
|
// Mock fetch globally for this test
|
||||||
|
const originalFetch = global.fetch;
|
||||||
|
global.fetch = async (url) => {
|
||||||
|
if (url.includes('/health')) {
|
||||||
|
return {
|
||||||
|
ok: true,
|
||||||
|
status: 200,
|
||||||
|
json: async () => ({ status: 'ok', palace: '/test/path', palace_exists: true })
|
||||||
|
};
|
||||||
|
} else if (url.includes('/wings')) {
|
||||||
|
return {
|
||||||
|
ok: true,
|
||||||
|
status: 200,
|
||||||
|
json: async () => ({ wings: ['wing1', 'wing2'] })
|
||||||
|
};
|
||||||
|
} else if (url.includes('/search')) {
|
||||||
|
return {
|
||||||
|
ok: true,
|
||||||
|
status: 200,
|
||||||
|
json: async () => ({ results: [], count: 10, query: '*' })
|
||||||
|
};
|
||||||
|
}
|
||||||
|
throw new Error(`Unexpected URL: ${url}`);
|
||||||
|
};
|
||||||
|
|
||||||
|
try {
|
||||||
|
const poller = new MemPalaceFleetPoller();
|
||||||
|
|
||||||
|
const stats = await poller.fetchStats();
|
||||||
|
|
||||||
|
assert.ok(stats, 'Should return stats');
|
||||||
|
assert.equal(stats.status, 'active', 'Status should be active');
|
||||||
|
assert.ok(stats.health, 'Should have health data');
|
||||||
|
assert.ok(Array.isArray(stats.wings), 'Wings should be an array');
|
||||||
|
assert.ok(typeof stats.totalDocs === 'number', 'totalDocs should be a number');
|
||||||
|
assert.ok(typeof stats.compressionRatio === 'number', 'compressionRatio should be a number');
|
||||||
|
assert.ok(typeof stats.aaakSize === 'number', 'aaakSize should be a number');
|
||||||
|
assert.ok(stats.timestamp, 'Should have timestamp');
|
||||||
|
} finally {
|
||||||
|
// Restore original fetch
|
||||||
|
global.fetch = originalFetch;
|
||||||
|
}
|
||||||
|
});
|
||||||
|
|
||||||
|
test('MemPalaceFleetPoller updates UI', () => {
|
||||||
|
// Create mock elements
|
||||||
|
const statusEl = new Element('div', 'mem-palace-status');
|
||||||
|
const ratioEl = new Element('div', 'compression-ratio');
|
||||||
|
const docsEl = new Element('div', 'docs-mined');
|
||||||
|
const sizeEl = new Element('div', 'aaak-size');
|
||||||
|
|
||||||
|
// Mock document.getElementById
|
||||||
|
context.document.getElementById = (id) => {
|
||||||
|
switch(id) {
|
||||||
|
case 'mem-palace-status': return statusEl;
|
||||||
|
case 'compression-ratio': return ratioEl;
|
||||||
|
case 'docs-mined': return docsEl;
|
||||||
|
case 'aaak-size': return sizeEl;
|
||||||
|
default: return null;
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
const poller = new MemPalaceFleetPoller();
|
||||||
|
|
||||||
|
// Test with null stats (disconnected)
|
||||||
|
poller.updateUI(null);
|
||||||
|
assert.equal(statusEl.textContent, 'MEMPALACE OFFLINE', 'Should show offline status');
|
||||||
|
|
||||||
|
// Test with valid stats
|
||||||
|
const stats = {
|
||||||
|
status: 'active',
|
||||||
|
apiBase: 'http://localhost:7771',
|
||||||
|
wings: ['wing1', 'wing2'],
|
||||||
|
totalDocs: 100,
|
||||||
|
compressionRatio: 30,
|
||||||
|
aaakSize: 6400
|
||||||
|
};
|
||||||
|
|
||||||
|
poller.updateUI(stats);
|
||||||
|
assert.equal(statusEl.textContent, 'MEMPALACE ACTIVE', 'Should show active status');
|
||||||
|
assert.equal(ratioEl.textContent, '30x', 'Should show compression ratio');
|
||||||
|
assert.equal(docsEl.textContent, '100', 'Should show total docs');
|
||||||
|
assert.equal(sizeEl.textContent, '6.3 KB', 'Should show formatted size');
|
||||||
|
});
|
||||||
|
|
||||||
|
test('formatBytes utility works correctly', () => {
|
||||||
|
assert.equal(formatBytes(0), '0 B', 'Should format 0 bytes');
|
||||||
|
assert.equal(formatBytes(1024), '1 KB', 'Should format 1 KB');
|
||||||
|
assert.equal(formatBytes(1048576), '1 MB', 'Should format 1 MB');
|
||||||
|
assert.equal(formatBytes(1073741824), '1 GB', 'Should format 1 GB');
|
||||||
|
assert.equal(formatBytes(500), '500 B', 'Should format 500 bytes');
|
||||||
|
assert.equal(formatBytes(1536), '1.5 KB', 'Should format 1.5 KB');
|
||||||
|
});
|
||||||
|
|
||||||
|
console.log('All MemPalace Fleet Poller tests passed!');
|
||||||
@@ -1,107 +0,0 @@
|
|||||||
from importlib import util
|
|
||||||
from pathlib import Path
|
|
||||||
import sys
|
|
||||||
|
|
||||||
import pytest
|
|
||||||
|
|
||||||
|
|
||||||
ROOT = Path(__file__).resolve().parent.parent
|
|
||||||
MODULE_PATH = ROOT / "nexus" / "mission_bus.py"
|
|
||||||
CONFIG_PATH = ROOT / "config" / "mission_bus_profiles.json"
|
|
||||||
|
|
||||||
|
|
||||||
def load_module():
|
|
||||||
spec = util.spec_from_file_location("mission_bus", MODULE_PATH)
|
|
||||||
module = util.module_from_spec(spec)
|
|
||||||
assert spec.loader is not None
|
|
||||||
sys.modules[spec.name] = module
|
|
||||||
spec.loader.exec_module(module)
|
|
||||||
return module
|
|
||||||
|
|
||||||
|
|
||||||
def build_bus(module):
|
|
||||||
profiles = module.load_profiles(CONFIG_PATH)
|
|
||||||
bus = module.MissionBus("mission-883", title="multi-agent teaming", config=profiles)
|
|
||||||
bus.register_participant("timmy", module.MissionRole.LEAD)
|
|
||||||
bus.register_participant("ezra", module.MissionRole.WRITE)
|
|
||||||
bus.register_participant("bezalel", module.MissionRole.READ)
|
|
||||||
bus.register_participant("allegro", module.MissionRole.AUDIT)
|
|
||||||
return bus
|
|
||||||
|
|
||||||
|
|
||||||
def test_role_permissions_gate_publish_checkpoint_and_handoff():
|
|
||||||
module = load_module()
|
|
||||||
bus = build_bus(module)
|
|
||||||
|
|
||||||
assert bus.allowed("timmy", "publish") is True
|
|
||||||
assert bus.allowed("ezra", "handoff") is True
|
|
||||||
assert bus.allowed("allegro", "audit") is True
|
|
||||||
assert bus.allowed("bezalel", "publish") is False
|
|
||||||
|
|
||||||
with pytest.raises(PermissionError):
|
|
||||||
bus.publish("bezalel", "mission.notes", {"text": "should fail"})
|
|
||||||
|
|
||||||
with pytest.raises(PermissionError):
|
|
||||||
bus.create_checkpoint("allegro", summary="audit cannot checkpoint", state={})
|
|
||||||
|
|
||||||
|
|
||||||
def test_mission_bus_unified_stream_records_messages_checkpoints_and_handoffs():
|
|
||||||
module = load_module()
|
|
||||||
bus = build_bus(module)
|
|
||||||
|
|
||||||
msg = bus.publish("timmy", "mission.start", {"goal": "build the slice"})
|
|
||||||
checkpoint = bus.create_checkpoint(
|
|
||||||
"ezra",
|
|
||||||
summary="checkpoint before lead review",
|
|
||||||
state={"branch": "fix/883", "files": ["nexus/mission_bus.py"]},
|
|
||||||
artifacts=["docs/mission-bus.md"],
|
|
||||||
)
|
|
||||||
handoff = bus.handoff("ezra", "timmy", checkpoint.checkpoint_id, note="ready for lead review")
|
|
||||||
|
|
||||||
assert [event.event_type for event in bus.events] == ["message", "checkpoint", "handoff"]
|
|
||||||
assert [event.sequence for event in bus.events] == [1, 2, 3]
|
|
||||||
assert msg.topic == "mission.start"
|
|
||||||
assert handoff.recipient == "timmy"
|
|
||||||
|
|
||||||
|
|
||||||
def test_handoff_resume_packet_contains_checkpoint_state_and_participants():
|
|
||||||
module = load_module()
|
|
||||||
bus = build_bus(module)
|
|
||||||
checkpoint = bus.create_checkpoint(
|
|
||||||
"ezra",
|
|
||||||
summary="handoff package",
|
|
||||||
state={"branch": "fix/883", "tests": ["tests/test_mission_bus.py"]},
|
|
||||||
artifacts=["config/mission_bus_profiles.json"],
|
|
||||||
)
|
|
||||||
handoff = bus.handoff("ezra", "timmy", checkpoint.checkpoint_id, note="pick up from here")
|
|
||||||
|
|
||||||
packet = bus.build_resume_packet(handoff.handoff_id)
|
|
||||||
assert packet["recipient"] == "timmy"
|
|
||||||
assert packet["checkpoint"]["state"]["branch"] == "fix/883"
|
|
||||||
assert packet["checkpoint"]["artifacts"] == ["config/mission_bus_profiles.json"]
|
|
||||||
assert packet["participants"]["ezra"]["role"] == "write"
|
|
||||||
assert packet["handoff_note"] == "pick up from here"
|
|
||||||
|
|
||||||
|
|
||||||
def test_profiles_define_level2_mount_namespace_and_level3_rootless_podman():
|
|
||||||
module = load_module()
|
|
||||||
profiles = module.load_profiles(CONFIG_PATH)
|
|
||||||
|
|
||||||
levels = {entry["level"]: entry["mechanism"] for entry in profiles["isolation_profiles"]}
|
|
||||||
assert levels[2] == "mount_namespace"
|
|
||||||
assert levels[3] == "rootless_podman"
|
|
||||||
assert profiles["roles"]["audit"] == ["read", "audit"]
|
|
||||||
|
|
||||||
|
|
||||||
def test_mission_bus_roundtrip_preserves_events_and_isolation_profile():
|
|
||||||
module = load_module()
|
|
||||||
bus = build_bus(module)
|
|
||||||
bus.publish("timmy", "mission.start", {"goal": "roundtrip"})
|
|
||||||
checkpoint = bus.create_checkpoint("ezra", summary="save state", state={"count": 1})
|
|
||||||
bus.handoff("ezra", "timmy", checkpoint.checkpoint_id, note="resume")
|
|
||||||
|
|
||||||
restored = module.MissionBus.from_dict(bus.to_dict())
|
|
||||||
assert restored.mission_id == "mission-883"
|
|
||||||
assert restored.events[-1].event_type == "handoff"
|
|
||||||
assert restored.events[-1].note == "resume"
|
|
||||||
assert restored.isolation_profiles[1].mechanism == "mount_namespace"
|
|
||||||
45
tests/test_sync_branch_protection.py
Normal file
45
tests/test_sync_branch_protection.py
Normal file
@@ -0,0 +1,45 @@
|
|||||||
|
from __future__ import annotations
|
||||||
|
|
||||||
|
import importlib.util
|
||||||
|
import sys
|
||||||
|
from pathlib import Path
|
||||||
|
|
||||||
|
import yaml
|
||||||
|
|
||||||
|
PROJECT_ROOT = Path(__file__).parent.parent
|
||||||
|
|
||||||
|
_spec = importlib.util.spec_from_file_location(
|
||||||
|
"sync_branch_protection_test",
|
||||||
|
PROJECT_ROOT / "scripts" / "sync_branch_protection.py",
|
||||||
|
)
|
||||||
|
_mod = importlib.util.module_from_spec(_spec)
|
||||||
|
sys.modules["sync_branch_protection_test"] = _mod
|
||||||
|
_spec.loader.exec_module(_mod)
|
||||||
|
|
||||||
|
build_branch_protection_payload = _mod.build_branch_protection_payload
|
||||||
|
|
||||||
|
|
||||||
|
def test_build_branch_protection_payload_enables_rebase_before_merge():
|
||||||
|
payload = build_branch_protection_payload(
|
||||||
|
"main",
|
||||||
|
{
|
||||||
|
"required_approvals": 1,
|
||||||
|
"dismiss_stale_approvals": True,
|
||||||
|
"require_ci_to_merge": False,
|
||||||
|
"block_deletions": True,
|
||||||
|
"block_force_push": True,
|
||||||
|
"block_on_outdated_branch": True,
|
||||||
|
},
|
||||||
|
)
|
||||||
|
|
||||||
|
assert payload["branch_name"] == "main"
|
||||||
|
assert payload["rule_name"] == "main"
|
||||||
|
assert payload["block_on_outdated_branch"] is True
|
||||||
|
assert payload["required_approvals"] == 1
|
||||||
|
assert payload["enable_status_check"] is False
|
||||||
|
|
||||||
|
|
||||||
|
def test_the_nexus_branch_protection_config_requires_up_to_date_branch():
|
||||||
|
config = yaml.safe_load((PROJECT_ROOT / ".gitea" / "branch-protection" / "the-nexus.yml").read_text())
|
||||||
|
rules = config["rules"]
|
||||||
|
assert rules["block_on_outdated_branch"] is True
|
||||||
Reference in New Issue
Block a user