Compare commits

..

1 Commits

Author SHA1 Message Date
0f680d70b8 feat: add model fallback verification script (#514)
Some checks failed
Architecture Lint / Linter Tests (pull_request) Successful in 44s
Smoke Test / smoke (pull_request) Failing after 28s
Validate Config / YAML Lint (pull_request) Failing after 20s
Validate Config / JSON Validate (pull_request) Successful in 27s
Validate Config / Python Syntax & Import Check (pull_request) Failing after 1m41s
Validate Config / Shell Script Lint (pull_request) Failing after 44s
Validate Config / Cron Syntax Check (pull_request) Successful in 4s
Validate Config / Deploy Script Dry Run (pull_request) Successful in 6s
Validate Config / Playbook Schema Validation (pull_request) Successful in 13s
PR Checklist / pr-checklist (pull_request) Failing after 12m11s
Architecture Lint / Lint Repository (pull_request) Has been cancelled
Validate Config / Python Test Suite (pull_request) Has been cancelled
- Tests model switches with verification prompts
- Validates context window meets 64K minimum
- Checks primary model and fallback chain
- Supports OpenRouter, Anthropic, Nous, Kimi, Ollama
- Exits with error if no viable model found

Closes #514
2026-04-15 03:20:49 +00:00
3 changed files with 443 additions and 478 deletions

View File

@@ -0,0 +1,443 @@
#!/usr/bin/env python3
"""
Model Fallback Verification Script
Issue #514: [Robustness] Model fallback verification — test before trusting
Tests model switches with verification prompts, validates context windows,
and ensures at least one viable model is available before starting loops.
Usage:
python3 model-fallback-verify.py # Run full verification
python3 model-fallback-verify.py check <model> # Test specific model
python3 model-fallback-verify.py context <model> # Check context window
python3 model-fallback-verify.py list # List available models
"""
import os, sys, json, yaml, urllib.request
from datetime import datetime, timezone
from pathlib import Path
# Configuration
HERMES_HOME = Path(os.environ.get("HERMES_HOME", Path.home() / ".hermes"))
CONFIG_FILE = HERMES_HOME / "config.yaml"
LOG_DIR = HERMES_HOME / "logs"
LOG_FILE = LOG_DIR / "model-verify.log"
MIN_CONTEXT_WINDOW = 64 * 1024 # 64K tokens minimum
# Provider endpoints
PROVIDER_CONFIGS = {
"openrouter": {
"base_url": "https://openrouter.ai/api/v1",
"headers": lambda api_key: {"Authorization": "Bearer " + api_key},
"chat_url": "/chat/completions",
},
"anthropic": {
"base_url": "https://api.anthropic.com/v1",
"headers": lambda api_key: {"x-api-key": api_key, "anthropic-version": "2023-06-01"},
"chat_url": "/messages",
},
"nous": {
"base_url": "https://inference.nousresearch.com/v1",
"headers": lambda api_key: {"Authorization": "Bearer " + api_key},
"chat_url": "/chat/completions",
},
"kimi-coding": {
"base_url": "https://api.kimi.com/coding/v1",
"headers": lambda api_key: {"x-api-key": api_key, "x-api-provider": "kimi-coding"},
"chat_url": "/chat/completions",
},
"custom": {
"base_url": None,
"headers": lambda api_key: {"Authorization": "Bearer " + api_key},
"chat_url": "/chat/completions",
},
}
# Known context windows for common models
KNOWN_CONTEXT_WINDOWS = {
"claude-opus-4-6": 200000,
"claude-sonnet-4": 200000,
"claude-3.5-sonnet": 200000,
"gpt-4o": 128000,
"gpt-4": 128000,
"gpt-3.5-turbo": 16385,
"qwen3:30b": 32768,
"qwen2.5:7b": 32768,
"hermes4:14b": 32768,
"gemma3:1b": 8192,
"gemma4": 32768,
"phi3:3.8b": 128000,
"kimi-k2.5": 128000,
"google/gemini-2.5-pro": 1048576,
"xiaomi/mimo-v2-pro": 131072,
"deepseek/deepseek-r1": 131072,
"deepseek/deepseek-chat-v3-0324": 131072,
}
def log(msg):
"""Log message to file and optionally to console."""
timestamp = datetime.now(timezone.utc).strftime("%Y-%m-%d %H:%M:%S")
log_entry = "[" + timestamp + "] " + msg
LOG_DIR.mkdir(parents=True, exist_ok=True)
with open(LOG_FILE, "a") as f:
f.write(log_entry + "\n")
if "--quiet" not in sys.argv:
print(log_entry)
def load_config():
"""Load Hermes config.yaml."""
if not CONFIG_FILE.exists():
return None
with open(CONFIG_FILE) as f:
return yaml.safe_load(f)
def get_provider_api_key(provider):
"""Get API key for a provider from .env or environment."""
env_file = HERMES_HOME / ".env"
if env_file.exists():
with open(env_file) as f:
for line in f:
line = line.strip()
if line.startswith(provider.upper() + "_API_KEY="):
return line.split("=", 1)[1].strip().strip("'\"")
return os.environ.get(provider.upper() + "_API_KEY")
def get_ollama_models():
"""Get list of available Ollama models."""
ollama_host = os.environ.get("OLLAMA_HOST", "localhost:11434")
try:
resp = urllib.request.urlopen("http://" + ollama_host + "/api/tags", timeout=5)
data = json.loads(resp.read())
return [m["name"] for m in data.get("models", [])]
except:
return []
def test_model(model, provider, api_key=None, base_url=None):
"""
Test a model with a verification prompt.
Returns (success, response, error_message)
"""
if provider == "ollama" or ":" in model:
# Local Ollama model
ollama_host = os.environ.get("OLLAMA_HOST", "localhost:11434")
try:
body = json.dumps({
"model": model,
"prompt": "Say exactly VERIFIED and nothing else.",
"stream": False,
"options": {"num_predict": 10}
}).encode()
req = urllib.request.Request(
"http://" + ollama_host + "/api/generate",
data=body,
headers={"Content-Type": "application/json"}
)
resp = urllib.request.urlopen(req, timeout=30)
result = json.loads(resp.read())
response_text = result.get("response", "").strip()
if "VERIFIED" in response_text.upper():
return True, response_text, None
return False, response_text, "Unexpected response: " + response_text[:100]
except Exception as e:
return False, "", "Ollama error: " + str(e)[:200]
# Cloud provider
config = PROVIDER_CONFIGS.get(provider)
if not config:
return False, "", "Unknown provider: " + provider
url = base_url or config["base_url"]
if not url:
return False, "", "No base URL for provider: " + provider
headers = config["headers"](api_key or "")
headers["Content-Type"] = "application/json"
try:
body = json.dumps({
"model": model,
"max_tokens": 20,
"messages": [{"role": "user", "content": "Say exactly VERIFIED and nothing else."}]
}).encode()
req = urllib.request.Request(
url + config["chat_url"],
data=body,
headers=headers
)
resp = urllib.request.urlopen(req, timeout=30)
result = json.loads(resp.read())
if provider == "anthropic":
content = result.get("content", [{}])[0].get("text", "")
else:
choices = result.get("choices", [{}])
content = choices[0].get("message", {}).get("content", "") if choices else ""
if "VERIFIED" in content.upper():
return True, content, None
return False, content, "Unexpected response: " + content[:100]
except urllib.error.HTTPError as e:
error_body = e.read().decode() if e.fp else str(e)
if e.code == 404:
return False, "", "Model not found (404): " + error_body[:200]
elif e.code == 429:
return True, "", "Rate limited but model exists"
elif e.code >= 500:
return False, "", "Server error (" + str(e.code) + "): " + error_body[:200]
else:
return False, "", "HTTP " + str(e.code) + ": " + error_body[:200]
except Exception as e:
return False, "", "Request error: " + str(e)[:200]
def get_context_window(model, provider):
"""
Get the context window size for a model.
Returns (window_size, source)
"""
if model in KNOWN_CONTEXT_WINDOWS:
return KNOWN_CONTEXT_WINDOWS[model], "known"
model_lower = model.lower()
if "claude" in model_lower:
return 200000, "inferred (claude)"
elif "gpt-4" in model_lower:
return 128000, "inferred (gpt-4)"
elif "gemini" in model_lower:
return 1048576, "inferred (gemini)"
elif "qwen" in model_lower:
return 32768, "inferred (qwen)"
elif "gemma" in model_lower:
return 8192, "inferred (gemma)"
elif "phi" in model_lower:
return 128000, "inferred (phi)"
return 32768, "default"
def verify_model(model, provider, api_key=None, base_url=None):
"""
Full verification of a model: test prompt + context window.
Returns dict with verification results.
"""
result = {
"model": model,
"provider": provider,
"tested": False,
"responded": False,
"response": "",
"error": None,
"context_window": 0,
"context_source": "unknown",
"meets_minimum": False,
"viable": False,
}
success, response, error = test_model(model, provider, api_key, base_url)
result["tested"] = True
result["responded"] = success
result["response"] = response[:200] if response else ""
result["error"] = error
window, source = get_context_window(model, provider)
result["context_window"] = window
result["context_source"] = source
result["meets_minimum"] = window >= MIN_CONTEXT_WINDOW
result["viable"] = success and result["meets_minimum"]
return result
def get_fallback_chain(config):
"""Get the fallback chain from config or defaults."""
chain = []
model_config = config.get("model", {})
if isinstance(model_config, dict):
primary = model_config.get("default", "")
provider = model_config.get("provider", "")
if primary and provider:
chain.append({"model": primary, "provider": provider, "role": "primary"})
elif model_config:
chain.append({"model": str(model_config), "provider": "unknown", "role": "primary"})
auxiliary = config.get("auxiliary", {})
for aux_name, aux_config in auxiliary.items():
if isinstance(aux_config, dict):
aux_model = aux_config.get("model", "")
aux_provider = aux_config.get("provider", "")
if aux_model and aux_provider and aux_provider != "auto":
chain.append({"model": aux_model, "provider": aux_provider, "role": "auxiliary:" + aux_name})
ollama_models = get_ollama_models()
for model in ollama_models[:3]:
if not any(c["model"] == model for c in chain):
chain.append({"model": model, "provider": "ollama", "role": "local-fallback"})
return chain
def run_verification():
"""Run full model fallback verification."""
log("=== Model Fallback Verification ===")
config = load_config()
if not config:
log("ERROR: No config.yaml found")
return {"success": False, "error": "No config file"}
chain = get_fallback_chain(config)
if not chain:
log("ERROR: No models configured")
return {"success": False, "error": "No models in chain"}
results = []
viable_models = []
for entry in chain:
model = entry["model"]
provider = entry["provider"]
role = entry["role"]
api_key = get_provider_api_key(provider) if provider != "ollama" else None
base_url = None
if provider == "custom":
provider_config = config.get("auxiliary", {}).get("vision", {})
base_url = provider_config.get("base_url")
log("Testing [" + role + "] " + model + " (" + provider + ")...")
result = verify_model(model, provider, api_key, base_url)
result["role"] = role
results.append(result)
status = "PASS" if result["viable"] else "FAIL"
details = []
if not result["responded"]:
details.append("no response: " + str(result["error"]))
if not result["meets_minimum"]:
details.append("context " + str(result["context_window"]) + " < " + str(MIN_CONTEXT_WINDOW))
log(" [" + status + "] " + model + " - " + (", ".join(details) if details else "verified"))
if result["viable"]:
viable_models.append(result)
log("=== Results: " + str(len(viable_models)) + "/" + str(len(results)) + " models viable ===")
if not viable_models:
log("CRITICAL: No viable models found!")
for r in results:
log(" - " + r["model"] + " (" + r["provider"] + "): responded=" + str(r["responded"]) + ", context=" + str(r["context_window"]))
return {"success": False, "results": results, "viable": []}
log("Viable models (in priority order):")
for i, r in enumerate(viable_models, 1):
log(" " + str(i) + ". " + r["model"] + " (" + r["provider"] + ") - context: " + str(r["context_window"]) + " tokens [" + r["role"] + "]")
return {
"success": True,
"results": results,
"viable": viable_models,
"primary": viable_models[0] if viable_models else None,
}
def check_single_model(model):
"""Check a specific model."""
if ":" in model:
provider = "ollama"
elif "/" in model:
provider = "openrouter"
else:
provider = "unknown"
config = load_config() or {}
api_key = get_provider_api_key(provider) if provider != "ollama" else None
result = verify_model(model, provider, api_key)
if result["viable"]:
print("PASS: " + model)
print(" Context window: " + str(result["context_window"]) + " tokens")
print(" Response: " + result["response"][:100])
else:
print("FAIL: " + model)
if result["error"]:
print(" Error: " + str(result["error"]))
if not result["meets_minimum"]:
print(" Context window: " + str(result["context_window"]) + " < " + str(MIN_CONTEXT_WINDOW) + " minimum")
return result["viable"]
def check_context_window(model):
"""Check context window for a model."""
if ":" in model:
provider = "ollama"
elif "/" in model:
provider = "openrouter"
else:
provider = "unknown"
window, source = get_context_window(model, provider)
meets = window >= MIN_CONTEXT_WINDOW
print("Model: " + model)
print("Provider: " + provider)
print("Context window: " + str(window) + " tokens (" + source + ")")
print("Minimum (" + str(MIN_CONTEXT_WINDOW) + "): " + ("PASS" if meets else "FAIL"))
return meets
def list_models():
"""List all available models."""
config = load_config() or {}
chain = get_fallback_chain(config)
print("Configured models:")
for entry in chain:
print(" " + entry["model"].ljust(30) + " " + entry["provider"].ljust(15) + " [" + entry["role"] + "]")
ollama = get_ollama_models()
if ollama:
print("")
print("Ollama models:")
for m in ollama:
print(" " + m)
def main():
if len(sys.argv) < 2:
result = run_verification()
sys.exit(0 if result["success"] else 1)
cmd = sys.argv[1]
if cmd == "check" and len(sys.argv) > 2:
model = sys.argv[2]
success = check_single_model(model)
sys.exit(0 if success else 1)
elif cmd == "context" and len(sys.argv) > 2:
model = sys.argv[2]
meets = check_context_window(model)
sys.exit(0 if meets else 1)
elif cmd == "list":
list_models()
elif cmd == "test":
result = run_verification()
sys.exit(0 if result["success"] else 1)
else:
print("Usage:")
print(" model-fallback-verify.py Run full verification")
print(" model-fallback-verify.py check <model> Test specific model")
print(" model-fallback-verify.py context <model> Check context window")
print(" model-fallback-verify.py list List available models")
sys.exit(1)
if __name__ == "__main__":
main()

View File

@@ -1,336 +0,0 @@
#!/usr/bin/env python3
"""
deploy_config_validator.py — Pre-deploy config validation for timmy-config sidecar.
Validates YAML config before writing during deploy. Checks:
1. YAML syntax (pyyaml safe_load)
2. Required keys exist for the config type
3. Value types match expected schema
4. No banned providers referenced
5. Provider chain is well-formed
Usage:
# Validate a config file before deploy
python3 scripts/deploy_config_validator.py config.yaml
# Validate stdin (piped from deploy script)
cat config.yaml | python3 scripts/deploy_config_validator.py -
# Validate with expected type
python3 scripts/deploy_config_validator.py --type hermes config.yaml
# JSON output for CI/CD
python3 scripts/deploy_config_validator.py --json config.yaml
Exit codes:
0 — config is valid
1 — validation failed (errors printed to stderr)
2 — usage error
"""
import argparse
import json
import sys
from pathlib import Path
from typing import Any
try:
import yaml
except ImportError:
print("ERROR: PyYAML not installed. Run: pip install pyyaml", file=sys.stderr)
sys.exit(2)
# ── Schema Definitions ────────────────────────────────────────────────────────
# Required keys per config type
REQUIRED_KEYS = {
"hermes": {
"providers": {"type": list, "description": "List of provider configurations"},
},
"wizard": {
"providers": {"type": list, "description": "List of provider configurations"},
},
"ansible_inventory": {
"all": {"type": dict, "description": "Top-level inventory structure"},
},
"cron": {
"jobs": {"type": list, "description": "List of cron job definitions"},
},
"playbook": {
"name": {"type": str, "description": "Playbook name"},
},
"any": {}, # No required keys for generic validation
}
# Provider schema — each provider must have these keys
PROVIDER_REQUIRED = {"name", "model", "base_url"}
PROVIDER_ALLOWED_TYPES = {
"name": str,
"model": str,
"base_url": str,
"api_key_env": str,
"timeout": (int, float),
"reason": str,
}
# Banned provider patterns (from ansible inventory)
BANNED_PROVIDERS = {"anthropic", "claude"}
BANNED_MODEL_PATTERNS = ["claude-*", "anthropic/*", "*sonnet*", "*opus*", "*haiku*"]
# ── Validators ────────────────────────────────────────────────────────────────
class ValidationError:
def __init__(self, path: str, message: str, severity: str = "error"):
self.path = path
self.message = message
self.severity = severity
def __str__(self):
prefix = {"error": "ERROR", "warning": "WARN", "info": "INFO"}.get(self.severity, "???")
return f"[{prefix}] {self.path}: {self.message}"
def validate_yaml_syntax(text: str) -> tuple[Any | None, list[ValidationError]]:
"""Validate YAML syntax. Returns (parsed_data, errors)."""
errors = []
# Check for tabs
for i, line in enumerate(text.splitlines(), 1):
if "\t" in line:
errors.append(ValidationError(f"line {i}", "contains tab character (use spaces for YAML)", "warning"))
# Parse
try:
data = yaml.safe_load(text)
except yaml.YAMLError as e:
mark = getattr(e, "problem_mark", None)
if mark:
errors.append(ValidationError(
f"line {mark.line + 1}, col {mark.column + 1}",
f"YAML syntax error: {e.problem}"
))
else:
errors.append(ValidationError("(file)", f"YAML syntax error: {e}"))
return None, errors
if data is None:
errors.append(ValidationError("(file)", "empty or null config", "warning"))
return None, errors
return data, errors
def validate_required_keys(data: dict, config_type: str) -> list[ValidationError]:
"""Check that required keys exist."""
errors = []
schema = REQUIRED_KEYS.get(config_type, REQUIRED_KEYS["any"])
for key, spec in schema.items():
if key not in data:
errors.append(ValidationError(
f".{key}",
f"required key missing: {key} ({spec['description']})"
))
elif not isinstance(data[key], spec["type"]):
errors.append(ValidationError(
f".{key}",
f"expected {spec['type'].__name__}, got {type(data[key]).__name__}"
))
return errors
def validate_provider_chain(data: dict) -> list[ValidationError]:
"""Validate provider configurations."""
errors = []
providers = data.get("providers", [])
if not isinstance(providers, list):
return errors # Caught by required_keys check
for i, provider in enumerate(providers):
path = f".providers[{i}]"
if not isinstance(provider, dict):
errors.append(ValidationError(path, "provider must be a dict"))
continue
# Check required provider keys
for key in PROVIDER_REQUIRED:
if key not in provider:
errors.append(ValidationError(f"{path}.{key}", f"provider missing required key: {key}"))
elif not isinstance(provider[key], str):
errors.append(ValidationError(
f"{path}.{key}",
f"expected string, got {type(provider[key]).__name__}"
))
# Check for banned providers
name = provider.get("name", "").lower()
model = provider.get("model", "").lower()
for banned in BANNED_PROVIDERS:
if banned in name:
errors.append(ValidationError(
f"{path}.name",
f"banned provider: '{provider.get('name')}' (contains '{banned}')"
))
import fnmatch
for pattern in BANNED_MODEL_PATTERNS:
if fnmatch.fnmatch(model, pattern.lower()):
errors.append(ValidationError(
f"{path}.model",
f"banned model pattern: '{provider.get('model')}' matches '{pattern}'"
))
# Check value types
for key, val in provider.items():
expected = PROVIDER_ALLOWED_TYPES.get(key)
if expected and not isinstance(val, expected):
errors.append(ValidationError(
f"{path}.{key}",
f"expected {expected if isinstance(expected, type) else expected.__name__}, got {type(val).__name__}",
"warning"
))
# Check provider chain has at least one entry
if not providers:
errors.append(ValidationError(".providers", "provider chain is empty — no inference available"))
return errors
def validate_value_types(data: dict, path: str = "") -> list[ValidationError]:
"""Recursively check for obviously wrong value types."""
errors = []
if isinstance(data, dict):
for key, val in data.items():
full_path = f"{path}.{key}" if path else f".{key}"
# Ports should be integers
if key in ("port", "api_port", "hermes_port", "timeout") and val is not None:
if not isinstance(val, (int, float)):
errors.append(ValidationError(full_path, f"expected number, got {type(val).__name__}", "warning"))
# URLs should be strings starting with http
if key in ("base_url", "gitea_url", "url") and val is not None:
if isinstance(val, str) and not val.startswith(("http://", "https://")):
errors.append(ValidationError(full_path, f"URL should start with http:// or https://", "warning"))
# Recurse
errors.extend(validate_value_types(val, full_path))
elif isinstance(data, list):
for i, item in enumerate(data):
errors.extend(validate_value_types(item, f"{path}[{i}]"))
return errors
def validate_config(text: str, config_type: str = "any") -> list[ValidationError]:
"""Run all validations on a config text."""
# Step 1: YAML syntax
data, errors = validate_yaml_syntax(text)
if data is None:
return errors # Can't continue without parsed data
if not isinstance(data, dict):
if config_type != "any":
errors.append(ValidationError("(file)", f"expected dict for {config_type} config, got {type(data).__name__}"))
return errors
# Step 2: Required keys
errors.extend(validate_required_keys(data, config_type))
# Step 3: Provider chain validation (if providers exist)
if "providers" in data:
errors.extend(validate_provider_chain(data))
# Step 4: Value type checking
errors.extend(validate_value_types(data))
return errors
# ── Auto-detect config type ───────────────────────────────────────────────────
def detect_config_type(data: dict) -> str:
"""Guess config type from contents."""
if "providers" in data and "display" in data:
return "hermes"
if "providers" in data and "wizard_name" in data:
return "wizard"
if "all" in data and "children" in data.get("all", {}):
return "ansible_inventory"
if "jobs" in data:
return "cron"
if "name" in data and "hosts" in data:
return "playbook"
return "any"
# ── CLI ───────────────────────────────────────────────────────────────────────
def main():
parser = argparse.ArgumentParser(description="Pre-deploy config validation")
parser.add_argument("file", help="Config file to validate (use - for stdin)")
parser.add_argument("--type", choices=list(REQUIRED_KEYS.keys()),
help="Expected config type (auto-detected if omitted)")
parser.add_argument("--json", action="store_true", help="JSON output")
args = parser.parse_args()
# Read input
if args.file == "-":
text = sys.stdin.read()
filename = "<stdin>"
else:
path = Path(args.file)
if not path.exists():
print(f"ERROR: File not found: {path}", file=sys.stderr)
sys.exit(2)
text = path.read_text(encoding="utf-8", errors="replace")
filename = str(path)
# Detect type
config_type = args.type
if not config_type:
data, _ = validate_yaml_syntax(text)
if data and isinstance(data, dict):
config_type = detect_config_type(data)
else:
config_type = "any"
# Validate
errors = validate_config(text, config_type)
# Output
if args.json:
result = {
"file": filename,
"type": config_type,
"valid": not any(e.severity == "error" for e in errors),
"error_count": sum(1 for e in errors if e.severity == "error"),
"warning_count": sum(1 for e in errors if e.severity == "warning"),
"errors": [{"path": e.path, "message": e.message, "severity": e.severity} for e in errors],
}
print(json.dumps(result, indent=2))
else:
if errors:
print(f"Config validation FAILED: {filename} (type: {config_type})", file=sys.stderr)
for e in errors:
print(f" {e}", file=sys.stderr)
else:
print(f"Config validation PASSED: {filename} (type: {config_type})")
# Exit code
if any(e.severity == "error" for e in errors):
sys.exit(1)
sys.exit(0)
if __name__ == "__main__":
main()

View File

@@ -1,142 +0,0 @@
#!/usr/bin/env python3
"""Tests for deploy_config_validator.py"""
import json
import sys
import os
import pytest
sys.path.insert(0, os.path.dirname(os.path.dirname(__file__)))
from scripts.deploy_config_validator import (
validate_yaml_syntax,
validate_required_keys,
validate_provider_chain,
validate_value_types,
validate_config,
detect_config_type,
ValidationError,
)
class TestYAMLSyntax:
def test_valid_yaml(self):
data, errors = validate_yaml_syntax("key: value\nlist:\n - a\n - b\n")
assert data is not None
assert len(errors) == 0
def test_invalid_yaml(self):
data, errors = validate_yaml_syntax("key: [unclosed")
assert data is None
assert len(errors) > 0
def test_empty_yaml(self):
data, errors = validate_yaml_syntax("")
assert data is None
assert any("empty" in e.message for e in errors)
def test_tabs_warning(self):
data, errors = validate_yaml_syntax("key:\tvalue\n")
assert any("tab" in e.message for e in errors)
class TestRequiredKeys:
def test_missing_key(self):
errors = validate_required_keys({}, "hermes")
assert any("providers" in e.message for e in errors)
def test_wrong_type(self):
errors = validate_required_keys({"providers": "not-a-list"}, "hermes")
assert any("expected list" in e.message for e in errors)
def test_valid(self):
errors = validate_required_keys({"providers": []}, "hermes")
provider_errors = [e for e in errors if "providers" in e.message and "missing" in e.message]
assert len(provider_errors) == 0
class TestProviderChain:
def test_empty_providers(self):
errors = validate_provider_chain({"providers": []})
assert any("empty" in e.message for e in errors)
def test_missing_name(self):
errors = validate_provider_chain({"providers": [{"model": "test", "base_url": "http://x"}]})
assert any("name" in e.message and "missing" in e.message for e in errors)
def test_banned_provider(self):
errors = validate_provider_chain({"providers": [
{"name": "anthropic", "model": "claude-3", "base_url": "http://x"}
]})
assert any("banned provider" in e.message for e in errors)
def test_banned_model(self):
errors = validate_provider_chain({"providers": [
{"name": "test", "model": "claude-sonnet-4", "base_url": "http://x"}
]})
assert any("banned model" in e.message for e in errors)
def test_valid_providers(self):
errors = validate_provider_chain({"providers": [
{"name": "kimi-coding", "model": "kimi-k2.5", "base_url": "https://api.kimi.com/v1"}
]})
provider_errors = [e for e in errors if e.severity == "error"]
assert len(provider_errors) == 0
class TestValueTypes:
def test_string_port(self):
errors = validate_value_types({"port": "8080"})
assert any("port" in e.path and "number" in e.message for e in errors)
def test_valid_port(self):
errors = validate_value_types({"port": 8080})
port_errors = [e for e in errors if "port" in e.path]
assert len(port_errors) == 0
def test_bad_url(self):
errors = validate_value_types({"base_url": "not-a-url"})
assert any("URL" in e.message for e in errors)
class TestDetectConfigType:
def test_hermes(self):
t = detect_config_type({"providers": [], "display": {}})
assert t == "hermes"
def test_ansible(self):
t = detect_config_type({"all": {"children": {"wizards": {}}}})
assert t == "ansible_inventory"
def test_unknown(self):
t = detect_config_type({"random": "data"})
assert t == "any"
class TestFullValidation:
def test_valid_hermes_config(self):
text = """
providers:
- name: kimi-coding
model: kimi-k2.5
base_url: https://api.kimi.com/coding/v1
timeout: 120
display:
skin: default
"""
errors = validate_config(text, "hermes")
assert not any(e.severity == "error" for e in errors)
def test_banned_provider_catches(self):
text = """
providers:
- name: anthropic
model: claude-sonnet-4
base_url: https://api.anthropic.com
"""
errors = validate_config(text, "hermes")
assert any("banned" in e.message for e in errors)
def test_missing_providers(self):
text = "display:\n skin: default\n"
errors = validate_config(text, "hermes")
assert any("providers" in e.message and "missing" in e.message for e in errors)