- Fix broken API_KEY_REGEX in linter_v2.py (was invalid regex causing runtime crash) - Fix syntax error in architecture_linter.py (malformed character class) - Add --repo flag and --json output to linter_v2 - Add LinterResult class for structured programmatic access - Port v1 sovereignty rules (cloud API endpoint/provider checks) into v2 - Skip .git, node_modules, __pycache__ dirs; skip .env.example files - Add tests/test_linter.py (19 tests covering all checks) - Add .gitea/workflows/architecture-lint.yml for CI enforcement - All files pass python3 -m py_compile Refs: #437
34 lines
1.1 KiB
Python
34 lines
1.1 KiB
Python
#!/usr/bin/env python3
|
|
import os
|
|
import sys
|
|
import re
|
|
|
|
# Architecture Linter
|
|
# Ensuring all changes align with the Frontier Local Agenda.
|
|
|
|
SOVEREIGN_RULES = [
|
|
(r"https?://(api\.openai\.com|api\.anthropic\.com)", "CRITICAL: External cloud API detected. Use local custom_provider instead."),
|
|
(r"provider: (openai|anthropic)", "WARNING: Direct cloud provider used. Ensure fallback_model is configured."),
|
|
(r"api_key:\s*['\"][A-Za-z0-9_\-]{16,}['\"]", "SECURITY: Hardcoded API key detected. Use environment variables.")
|
|
]
|
|
|
|
def lint_file(path):
|
|
print(f"Linting {path}...")
|
|
content = open(path).read()
|
|
violations = 0
|
|
for pattern, msg in SOVEREIGN_RULES:
|
|
if re.search(pattern, content):
|
|
print(f" [!] {msg}")
|
|
violations += 1
|
|
return violations
|
|
|
|
def main():
|
|
print("--- Ezra's Architecture Linter ---")
|
|
files = [f for f in sys.argv[1:] if os.path.isfile(f)]
|
|
total_violations = sum(lint_file(f) for f in files)
|
|
print(f"\nLinting complete. Total violations: {total_violations}")
|
|
sys.exit(1 if total_violations > 0 else 0)
|
|
|
|
if __name__ == "__main__":
|
|
main()
|