pathwayd: HTTP service over internal/pathway · 11/11 smoke gate
Network-callable Mem0-style trace memory at :3217, fronted by gateway /v1/pathway/*. Closes the ADR-004 wire-up: store substrate landed in 2a6234f, this lands the HTTP surface + [pathwayd] config + acceptance gate. Smoke proves the architecturally distinctive properties: Revise → History walks the predecessor chain backward (audit trail), Retire excludes from Search default but stays Get-able, AddIdempotent bumps replay_count without replacing — and all survive kill+restart via JSONL log replay. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
This commit is contained in:
parent
2a6234ff82
commit
afbb506dbc
@ -44,6 +44,7 @@ func main() {
|
||||
"queryd_url": cfg.Gateway.QuerydURL,
|
||||
"vectord_url": cfg.Gateway.VectordURL,
|
||||
"embedd_url": cfg.Gateway.EmbeddURL,
|
||||
"pathwayd_url": cfg.Gateway.PathwaydURL,
|
||||
}
|
||||
for k, v := range upstreams {
|
||||
if v == "" {
|
||||
@ -63,6 +64,7 @@ func main() {
|
||||
querydURL := mustParseUpstream("queryd_url", cfg.Gateway.QuerydURL)
|
||||
vectordURL := mustParseUpstream("vectord_url", cfg.Gateway.VectordURL)
|
||||
embeddURL := mustParseUpstream("embedd_url", cfg.Gateway.EmbeddURL)
|
||||
pathwaydURL := mustParseUpstream("pathwayd_url", cfg.Gateway.PathwaydURL)
|
||||
|
||||
storagedProxy := gateway.NewProxyHandler(storagedURL)
|
||||
catalogdProxy := gateway.NewProxyHandler(catalogdURL)
|
||||
@ -70,6 +72,7 @@ func main() {
|
||||
querydProxy := gateway.NewProxyHandler(querydURL)
|
||||
vectordProxy := gateway.NewProxyHandler(vectordURL)
|
||||
embeddProxy := gateway.NewProxyHandler(embeddURL)
|
||||
pathwaydProxy := gateway.NewProxyHandler(pathwaydURL)
|
||||
|
||||
if err := shared.Run("gateway", cfg.Gateway.Bind, func(r chi.Router) {
|
||||
|
||||
@ -88,6 +91,8 @@ func main() {
|
||||
r.Handle("/v1/vectors/*", vectordProxy)
|
||||
// Embedding service — /v1/embed
|
||||
r.Handle("/v1/embed", embeddProxy)
|
||||
// Pathway memory — /v1/pathway/*
|
||||
r.Handle("/v1/pathway/*", pathwaydProxy)
|
||||
}, cfg.Auth); err != nil {
|
||||
slog.Error("server", "err", err)
|
||||
os.Exit(1)
|
||||
|
||||
278
cmd/pathwayd/main.go
Normal file
278
cmd/pathwayd/main.go
Normal file
@ -0,0 +1,278 @@
|
||||
// pathwayd is the pathway memory service. Wraps internal/pathway's
|
||||
// Store with HTTP routes for the Mem0-style operations defined in
|
||||
// ADR-004.
|
||||
//
|
||||
// Routes (all under /pathway):
|
||||
// POST /pathway/add — new trace with fresh UID
|
||||
// POST /pathway/add_idempotent — UID-keyed add or replay-bump
|
||||
// POST /pathway/update — replace content for an existing UID
|
||||
// POST /pathway/revise — new revision linked to predecessor
|
||||
// POST /pathway/retire — mark trace retired (excluded from search)
|
||||
// GET /pathway/get/{uid} — fetch one trace (incl. retired)
|
||||
// GET /pathway/history/{uid} — backward chain via predecessor links
|
||||
// POST /pathway/search — filter-based listing
|
||||
// GET /pathway/stats — total/active/retired counters
|
||||
//
|
||||
// Persistence: optional. Empty [pathwayd].persist_path = in-memory
|
||||
// only (matches vectord G1's pattern). Set a path for durable
|
||||
// per-trace JSONL append.
|
||||
package main
|
||||
|
||||
import (
|
||||
"encoding/json"
|
||||
"errors"
|
||||
"flag"
|
||||
"log/slog"
|
||||
"net/http"
|
||||
"os"
|
||||
"strings"
|
||||
|
||||
"github.com/go-chi/chi/v5"
|
||||
|
||||
"git.agentview.dev/profit/golangLAKEHOUSE/internal/pathway"
|
||||
"git.agentview.dev/profit/golangLAKEHOUSE/internal/shared"
|
||||
)
|
||||
|
||||
const maxRequestBytes = 4 << 20 // 4 MiB cap on request bodies
|
||||
|
||||
func main() {
|
||||
configPath := flag.String("config", "lakehouse.toml", "path to TOML config")
|
||||
flag.Parse()
|
||||
|
||||
cfg, err := shared.LoadConfig(*configPath)
|
||||
if err != nil {
|
||||
slog.Error("config", "err", err)
|
||||
os.Exit(1)
|
||||
}
|
||||
|
||||
// Persistence is optional — empty path = in-memory ephemeral.
|
||||
var persistor *pathway.Persistor
|
||||
if cfg.Pathwayd.PersistPath != "" {
|
||||
persistor, err = pathway.NewPersistor(cfg.Pathwayd.PersistPath)
|
||||
if err != nil {
|
||||
slog.Error("pathway persistor", "err", err)
|
||||
os.Exit(1)
|
||||
}
|
||||
}
|
||||
|
||||
store := pathway.NewStore(persistor)
|
||||
if persistor != nil {
|
||||
n, err := store.Load()
|
||||
if err != nil {
|
||||
slog.Warn("pathway load", "err", err, "loaded", n)
|
||||
} else {
|
||||
slog.Info("pathway loaded", "events", n, "path", cfg.Pathwayd.PersistPath)
|
||||
}
|
||||
}
|
||||
|
||||
h := &handlers{store: store}
|
||||
|
||||
if err := shared.Run("pathwayd", cfg.Pathwayd.Bind, h.register, cfg.Auth); err != nil {
|
||||
slog.Error("server", "err", err)
|
||||
os.Exit(1)
|
||||
}
|
||||
}
|
||||
|
||||
type handlers struct {
|
||||
store *pathway.Store
|
||||
}
|
||||
|
||||
func (h *handlers) register(r chi.Router) {
|
||||
r.Post("/pathway/add", h.handleAdd)
|
||||
r.Post("/pathway/add_idempotent", h.handleAddIdempotent)
|
||||
r.Post("/pathway/update", h.handleUpdate)
|
||||
r.Post("/pathway/revise", h.handleRevise)
|
||||
r.Post("/pathway/retire", h.handleRetire)
|
||||
r.Get("/pathway/get/{uid}", h.handleGet)
|
||||
r.Get("/pathway/history/{uid}", h.handleHistory)
|
||||
r.Post("/pathway/search", h.handleSearch)
|
||||
r.Get("/pathway/stats", h.handleStats)
|
||||
}
|
||||
|
||||
// ── request shapes ───────────────────────────────────────────────
|
||||
|
||||
type addRequest struct {
|
||||
Content json.RawMessage `json:"content"`
|
||||
Tags []string `json:"tags,omitempty"`
|
||||
}
|
||||
|
||||
type addIdempotentRequest struct {
|
||||
UID string `json:"uid"`
|
||||
Content json.RawMessage `json:"content"`
|
||||
Tags []string `json:"tags,omitempty"`
|
||||
}
|
||||
|
||||
type updateRequest struct {
|
||||
UID string `json:"uid"`
|
||||
Content json.RawMessage `json:"content"`
|
||||
}
|
||||
|
||||
type reviseRequest struct {
|
||||
PredecessorUID string `json:"predecessor_uid"`
|
||||
Content json.RawMessage `json:"content"`
|
||||
Tags []string `json:"tags,omitempty"`
|
||||
}
|
||||
|
||||
type retireRequest struct {
|
||||
UID string `json:"uid"`
|
||||
}
|
||||
|
||||
type searchRequest struct {
|
||||
Tag string `json:"tag,omitempty"`
|
||||
ContentContains string `json:"content_contains,omitempty"`
|
||||
CreatedAfterNs int64 `json:"created_after_ns,omitempty"`
|
||||
CreatedBeforeNs int64 `json:"created_before_ns,omitempty"`
|
||||
IncludeRetired bool `json:"include_retired,omitempty"`
|
||||
}
|
||||
|
||||
// ── handlers ────────────────────────────────────────────────────
|
||||
|
||||
func (h *handlers) handleAdd(w http.ResponseWriter, r *http.Request) {
|
||||
var req addRequest
|
||||
if !decodeJSON(w, r, &req) {
|
||||
return
|
||||
}
|
||||
tr, err := h.store.Add(req.Content, req.Tags...)
|
||||
if writeStoreError(w, err) {
|
||||
return
|
||||
}
|
||||
writeJSON(w, http.StatusCreated, tr)
|
||||
}
|
||||
|
||||
func (h *handlers) handleAddIdempotent(w http.ResponseWriter, r *http.Request) {
|
||||
var req addIdempotentRequest
|
||||
if !decodeJSON(w, r, &req) {
|
||||
return
|
||||
}
|
||||
tr, err := h.store.AddIdempotent(req.UID, req.Content, req.Tags...)
|
||||
if writeStoreError(w, err) {
|
||||
return
|
||||
}
|
||||
writeJSON(w, http.StatusOK, tr)
|
||||
}
|
||||
|
||||
func (h *handlers) handleUpdate(w http.ResponseWriter, r *http.Request) {
|
||||
var req updateRequest
|
||||
if !decodeJSON(w, r, &req) {
|
||||
return
|
||||
}
|
||||
if err := h.store.Update(req.UID, req.Content); writeStoreError(w, err) {
|
||||
return
|
||||
}
|
||||
writeJSON(w, http.StatusOK, map[string]any{"status": "updated"})
|
||||
}
|
||||
|
||||
func (h *handlers) handleRevise(w http.ResponseWriter, r *http.Request) {
|
||||
var req reviseRequest
|
||||
if !decodeJSON(w, r, &req) {
|
||||
return
|
||||
}
|
||||
tr, err := h.store.Revise(req.PredecessorUID, req.Content, req.Tags...)
|
||||
if writeStoreError(w, err) {
|
||||
return
|
||||
}
|
||||
writeJSON(w, http.StatusCreated, tr)
|
||||
}
|
||||
|
||||
func (h *handlers) handleRetire(w http.ResponseWriter, r *http.Request) {
|
||||
var req retireRequest
|
||||
if !decodeJSON(w, r, &req) {
|
||||
return
|
||||
}
|
||||
if err := h.store.Retire(req.UID); writeStoreError(w, err) {
|
||||
return
|
||||
}
|
||||
w.WriteHeader(http.StatusNoContent)
|
||||
}
|
||||
|
||||
func (h *handlers) handleGet(w http.ResponseWriter, r *http.Request) {
|
||||
uid := chi.URLParam(r, "uid")
|
||||
tr, err := h.store.Get(uid)
|
||||
if writeStoreError(w, err) {
|
||||
return
|
||||
}
|
||||
writeJSON(w, http.StatusOK, tr)
|
||||
}
|
||||
|
||||
func (h *handlers) handleHistory(w http.ResponseWriter, r *http.Request) {
|
||||
uid := chi.URLParam(r, "uid")
|
||||
chain, err := h.store.History(uid)
|
||||
if writeStoreError(w, err) {
|
||||
return
|
||||
}
|
||||
writeJSON(w, http.StatusOK, map[string]any{
|
||||
"chain": chain,
|
||||
"length": len(chain),
|
||||
})
|
||||
}
|
||||
|
||||
func (h *handlers) handleSearch(w http.ResponseWriter, r *http.Request) {
|
||||
var req searchRequest
|
||||
if !decodeJSON(w, r, &req) {
|
||||
return
|
||||
}
|
||||
results := h.store.Search(pathway.SearchFilter{
|
||||
Tag: req.Tag,
|
||||
ContentContains: req.ContentContains,
|
||||
CreatedAfterNs: req.CreatedAfterNs,
|
||||
CreatedBeforeNs: req.CreatedBeforeNs,
|
||||
IncludeRetired: req.IncludeRetired,
|
||||
})
|
||||
writeJSON(w, http.StatusOK, map[string]any{
|
||||
"results": results,
|
||||
"count": len(results),
|
||||
})
|
||||
}
|
||||
|
||||
func (h *handlers) handleStats(w http.ResponseWriter, _ *http.Request) {
|
||||
writeJSON(w, http.StatusOK, h.store.Stats())
|
||||
}
|
||||
|
||||
// ── helpers ────────────────────────────────────────────────────
|
||||
|
||||
func decodeJSON(w http.ResponseWriter, r *http.Request, v any) bool {
|
||||
defer r.Body.Close()
|
||||
r.Body = http.MaxBytesReader(w, r.Body, maxRequestBytes)
|
||||
if err := json.NewDecoder(r.Body).Decode(v); err != nil {
|
||||
var maxErr *http.MaxBytesError
|
||||
if errors.As(err, &maxErr) || strings.Contains(err.Error(), "http: request body too large") {
|
||||
http.Error(w, "body too large", http.StatusRequestEntityTooLarge)
|
||||
return false
|
||||
}
|
||||
http.Error(w, "decode body: "+err.Error(), http.StatusBadRequest)
|
||||
return false
|
||||
}
|
||||
return true
|
||||
}
|
||||
|
||||
func writeJSON(w http.ResponseWriter, code int, v any) {
|
||||
w.Header().Set("Content-Type", "application/json")
|
||||
w.WriteHeader(code)
|
||||
if err := json.NewEncoder(w).Encode(v); err != nil {
|
||||
slog.Warn("pathway write json", "err", err)
|
||||
}
|
||||
}
|
||||
|
||||
// writeStoreError maps internal/pathway sentinel errors to HTTP
|
||||
// status codes. Returns true if a response was written (caller
|
||||
// should return). Returns false on success (caller continues).
|
||||
func writeStoreError(w http.ResponseWriter, err error) bool {
|
||||
if err == nil {
|
||||
return false
|
||||
}
|
||||
switch {
|
||||
case errors.Is(err, pathway.ErrNotFound):
|
||||
http.Error(w, err.Error(), http.StatusNotFound)
|
||||
case errors.Is(err, pathway.ErrPredecessorMissing):
|
||||
http.Error(w, err.Error(), http.StatusNotFound)
|
||||
case errors.Is(err, pathway.ErrEmptyUID),
|
||||
errors.Is(err, pathway.ErrInvalidContent):
|
||||
http.Error(w, err.Error(), http.StatusBadRequest)
|
||||
case errors.Is(err, pathway.ErrCycle):
|
||||
http.Error(w, err.Error(), http.StatusConflict)
|
||||
default:
|
||||
slog.Error("pathway store", "err", err)
|
||||
http.Error(w, "internal", http.StatusInternalServerError)
|
||||
}
|
||||
return true
|
||||
}
|
||||
@ -26,6 +26,7 @@ type Config struct {
|
||||
Queryd QuerydConfig `toml:"queryd"`
|
||||
Vectord VectordConfig `toml:"vectord"`
|
||||
Embedd EmbeddConfig `toml:"embedd"`
|
||||
Pathwayd PathwaydConfig `toml:"pathwayd"`
|
||||
S3 S3Config `toml:"s3"`
|
||||
Log LogConfig `toml:"log"`
|
||||
Auth AuthConfig `toml:"auth"`
|
||||
@ -50,8 +51,8 @@ type IngestConfig struct {
|
||||
|
||||
// GatewayConfig adds the upstream URLs the reverse proxy fronts.
|
||||
// Each route family (/v1/storage, /v1/catalog, /v1/ingest, /v1/sql,
|
||||
// /v1/vectors, /v1/embed) has its own upstream so we can scale
|
||||
// services independently or move them to different boxes without
|
||||
// /v1/vectors, /v1/embed, /v1/pathway) has its own upstream so we can
|
||||
// scale services independently or move them to different boxes without
|
||||
// touching gateway code.
|
||||
type GatewayConfig struct {
|
||||
Bind string `toml:"bind"`
|
||||
@ -61,6 +62,7 @@ type GatewayConfig struct {
|
||||
QuerydURL string `toml:"queryd_url"`
|
||||
VectordURL string `toml:"vectord_url"`
|
||||
EmbeddURL string `toml:"embedd_url"`
|
||||
PathwaydURL string `toml:"pathwayd_url"`
|
||||
}
|
||||
|
||||
// EmbeddConfig drives the embed service. ProviderURL points at the
|
||||
@ -85,6 +87,15 @@ type VectordConfig struct {
|
||||
StoragedURL string `toml:"storaged_url"`
|
||||
}
|
||||
|
||||
// PathwaydConfig drives the pathway-memory service (cmd/pathwayd).
|
||||
// PersistPath: file path to the JSONL log; empty = in-memory only
|
||||
// (test/dev). Production sets a stable path under /var/lib/lakehouse
|
||||
// or similar so traces survive restart.
|
||||
type PathwaydConfig struct {
|
||||
Bind string `toml:"bind"`
|
||||
PersistPath string `toml:"persist_path"`
|
||||
}
|
||||
|
||||
// QuerydConfig adds queryd-specific knobs. queryd talks DuckDB
|
||||
// directly to MinIO via DuckDB's httpfs extension (so no storaged
|
||||
// URL needed), and reads the catalog over HTTP for view registration.
|
||||
@ -161,6 +172,7 @@ func DefaultConfig() Config {
|
||||
QuerydURL: "http://127.0.0.1:3214",
|
||||
VectordURL: "http://127.0.0.1:3215",
|
||||
EmbeddURL: "http://127.0.0.1:3216",
|
||||
PathwaydURL: "http://127.0.0.1:3217",
|
||||
},
|
||||
Storaged: ServiceConfig{Bind: "127.0.0.1:3211"},
|
||||
Catalogd: CatalogConfig{Bind: "127.0.0.1:3212", StoragedURL: "http://127.0.0.1:3211"},
|
||||
@ -180,6 +192,11 @@ func DefaultConfig() Config {
|
||||
DefaultModel: "nomic-embed-text",
|
||||
CacheSize: 10_000, // ~30 MiB at d=768; set to 0 to disable
|
||||
},
|
||||
Pathwayd: PathwaydConfig{
|
||||
Bind: "127.0.0.1:3217",
|
||||
// PersistPath empty by default = in-memory only. Production
|
||||
// sets to e.g. /var/lib/lakehouse/pathway/state.jsonl.
|
||||
},
|
||||
Queryd: QuerydConfig{
|
||||
Bind: "127.0.0.1:3214",
|
||||
CatalogdURL: "http://127.0.0.1:3212",
|
||||
|
||||
@ -12,6 +12,7 @@ ingestd_url = "http://127.0.0.1:3213"
|
||||
queryd_url = "http://127.0.0.1:3214"
|
||||
vectord_url = "http://127.0.0.1:3215"
|
||||
embedd_url = "http://127.0.0.1:3216"
|
||||
pathwayd_url = "http://127.0.0.1:3217"
|
||||
|
||||
[storaged]
|
||||
bind = "127.0.0.1:3211"
|
||||
@ -47,6 +48,12 @@ catalogd_url = "http://127.0.0.1:3212"
|
||||
secrets_path = "/etc/lakehouse/secrets-go.toml"
|
||||
refresh_every = "30s"
|
||||
|
||||
[pathwayd]
|
||||
bind = "127.0.0.1:3217"
|
||||
# Empty = in-memory only (dev/test). Production sets a path under
|
||||
# /var/lib/lakehouse/pathway/state.jsonl so traces survive restart.
|
||||
persist_path = ""
|
||||
|
||||
[s3]
|
||||
endpoint = "http://localhost:9000"
|
||||
region = "us-east-1"
|
||||
|
||||
248
scripts/pathway_smoke.sh
Executable file
248
scripts/pathway_smoke.sh
Executable file
@ -0,0 +1,248 @@
|
||||
#!/usr/bin/env bash
|
||||
# Pathway smoke — pathwayd Mem0-style versioned trace memory (ADR-004).
|
||||
# All assertions go through gateway :3110.
|
||||
#
|
||||
# Validates:
|
||||
# - All 9 HTTP routes (add, add_idempotent, update, revise, retire,
|
||||
# get, history, search, stats)
|
||||
# - Revise creates a predecessor link; History walks the chain
|
||||
# backward (the audit-trail property pathway memory exists for)
|
||||
# - Retire excludes from Search default; still accessible via Get
|
||||
# - AddIdempotent on existing UID bumps replay_count, doesn't replace
|
||||
# - Negative paths: 404 on unknown UIDs, 404 on missing predecessor,
|
||||
# 400 on invalid content
|
||||
# - Persistence: kill + restart pathwayd → all traces survive
|
||||
#
|
||||
# Usage: ./scripts/pathway_smoke.sh
|
||||
|
||||
set -euo pipefail
|
||||
cd "$(dirname "$0")/.."
|
||||
|
||||
export PATH="$PATH:/usr/local/go/bin"
|
||||
|
||||
echo "[pathway-smoke] building pathwayd + gateway..."
|
||||
go build -o bin/ ./cmd/pathwayd ./cmd/gateway
|
||||
|
||||
pkill -f "bin/(pathwayd|gateway)" 2>/dev/null || true
|
||||
sleep 0.3
|
||||
|
||||
PIDS=()
|
||||
TMP="$(mktemp -d)"
|
||||
PERSIST="$TMP/pathway.jsonl"
|
||||
CFG="$TMP/pathwayd.toml"
|
||||
|
||||
cleanup() {
|
||||
echo "[pathway-smoke] cleanup"
|
||||
for p in "${PIDS[@]}"; do [ -n "$p" ] && kill "$p" 2>/dev/null || true; done
|
||||
rm -rf "$TMP"
|
||||
}
|
||||
trap cleanup EXIT INT TERM
|
||||
|
||||
# Custom toml — same defaults as lakehouse.toml but with persist_path
|
||||
# pointing at the temp file so kill+restart actually rehydrates.
|
||||
cat > "$CFG" <<EOF
|
||||
[gateway]
|
||||
bind = "127.0.0.1:3110"
|
||||
storaged_url = "http://127.0.0.1:3211"
|
||||
catalogd_url = "http://127.0.0.1:3212"
|
||||
ingestd_url = "http://127.0.0.1:3213"
|
||||
queryd_url = "http://127.0.0.1:3214"
|
||||
vectord_url = "http://127.0.0.1:3215"
|
||||
embedd_url = "http://127.0.0.1:3216"
|
||||
pathwayd_url = "http://127.0.0.1:3217"
|
||||
|
||||
[pathwayd]
|
||||
bind = "127.0.0.1:3217"
|
||||
persist_path = "$PERSIST"
|
||||
EOF
|
||||
|
||||
poll_health() {
|
||||
local port="$1" deadline=$(($(date +%s) + 5))
|
||||
while [ "$(date +%s)" -lt "$deadline" ]; do
|
||||
if curl -sS --max-time 1 "http://127.0.0.1:$port/health" >/dev/null 2>&1; then return 0; fi
|
||||
sleep 0.05
|
||||
done
|
||||
return 1
|
||||
}
|
||||
|
||||
launch_pathwayd() {
|
||||
./bin/pathwayd -config "$CFG" > /tmp/pathwayd.log 2>&1 &
|
||||
PATHWAYD_PID=$!
|
||||
PIDS+=($PATHWAYD_PID)
|
||||
poll_health 3217 || { echo "pathwayd failed"; tail /tmp/pathwayd.log; return 1; }
|
||||
}
|
||||
|
||||
launch_gateway() {
|
||||
./bin/gateway -config "$CFG" > /tmp/gateway.log 2>&1 &
|
||||
PIDS+=($!)
|
||||
poll_health 3110 || { echo "gateway failed"; tail /tmp/gateway.log; return 1; }
|
||||
}
|
||||
|
||||
echo "[pathway-smoke] launching pathwayd → gateway..."
|
||||
launch_pathwayd
|
||||
launch_gateway
|
||||
|
||||
FAILED=0
|
||||
|
||||
# ── 1. Add ────────────────────────────────────────────────────────
|
||||
echo "[pathway-smoke] Add → fresh UID + replay_count=1:"
|
||||
RESP="$(curl -sS -X POST http://127.0.0.1:3110/v1/pathway/add \
|
||||
-H 'Content-Type: application/json' \
|
||||
-d '{"content":{"approach":"forklift-OSHA-30","outcome":"hired"},"tags":["staffing","fill"]}')"
|
||||
UID_A="$(echo "$RESP" | jq -r '.uid')"
|
||||
RC_A="$(echo "$RESP" | jq -r '.replay_count')"
|
||||
if [ -n "$UID_A" ] && [ "$UID_A" != "null" ] && [ "$RC_A" = "1" ]; then
|
||||
echo " ✓ uid=$UID_A replay_count=1"
|
||||
else
|
||||
echo " ✗ resp: $RESP"; FAILED=1
|
||||
fi
|
||||
|
||||
# ── 2. Get ────────────────────────────────────────────────────────
|
||||
echo "[pathway-smoke] Get → returns same trace:"
|
||||
RESP="$(curl -sS "http://127.0.0.1:3110/v1/pathway/get/$UID_A")"
|
||||
APPROACH="$(echo "$RESP" | jq -r '.content.approach')"
|
||||
if [ "$APPROACH" = "forklift-OSHA-30" ]; then
|
||||
echo " ✓ content.approach round-trips"
|
||||
else
|
||||
echo " ✗ resp: $RESP"; FAILED=1
|
||||
fi
|
||||
|
||||
# ── 3. AddIdempotent (replay) ─────────────────────────────────────
|
||||
echo "[pathway-smoke] AddIdempotent same UID → replay_count++:"
|
||||
RESP="$(curl -sS -X POST http://127.0.0.1:3110/v1/pathway/add_idempotent \
|
||||
-H 'Content-Type: application/json' \
|
||||
-d "{\"uid\":\"$UID_A\",\"content\":{\"approach\":\"forklift-OSHA-30\",\"outcome\":\"hired\"}}")"
|
||||
RC_REPLAY="$(echo "$RESP" | jq -r '.replay_count')"
|
||||
if [ "$RC_REPLAY" = "2" ]; then
|
||||
echo " ✓ replay_count bumped to 2"
|
||||
else
|
||||
echo " ✗ replay_count=$RC_REPLAY"; FAILED=1
|
||||
fi
|
||||
|
||||
# ── 4. Update ─────────────────────────────────────────────────────
|
||||
echo "[pathway-smoke] Update → in-place content replace:"
|
||||
HTTP="$(curl -sS -o "$TMP/upd.json" -w '%{http_code}' -X POST http://127.0.0.1:3110/v1/pathway/update \
|
||||
-H 'Content-Type: application/json' \
|
||||
-d "{\"uid\":\"$UID_A\",\"content\":{\"approach\":\"forklift-OSHA-30\",\"outcome\":\"hired\",\"note\":\"cert verified\"}}")"
|
||||
if [ "$HTTP" = "200" ]; then
|
||||
NOTE="$(curl -sS "http://127.0.0.1:3110/v1/pathway/get/$UID_A" | jq -r '.content.note')"
|
||||
if [ "$NOTE" = "cert verified" ]; then
|
||||
echo " ✓ Update applied and persisted"
|
||||
else
|
||||
echo " ✗ note=$NOTE after update"; FAILED=1
|
||||
fi
|
||||
else
|
||||
echo " ✗ Update HTTP=$HTTP"; FAILED=1
|
||||
fi
|
||||
|
||||
# ── 5. Revise → predecessor link ──────────────────────────────────
|
||||
echo "[pathway-smoke] Revise → new UID with predecessor link:"
|
||||
RESP="$(curl -sS -X POST http://127.0.0.1:3110/v1/pathway/revise \
|
||||
-H 'Content-Type: application/json' \
|
||||
-d "{\"predecessor_uid\":\"$UID_A\",\"content\":{\"approach\":\"forklift-OSHA-30+CDL\",\"outcome\":\"upgraded\"},\"tags\":[\"staffing\",\"revision\"]}")"
|
||||
UID_B="$(echo "$RESP" | jq -r '.uid')"
|
||||
PRED="$(echo "$RESP" | jq -r '.predecessor_uid')"
|
||||
if [ "$UID_B" != "$UID_A" ] && [ "$PRED" = "$UID_A" ]; then
|
||||
echo " ✓ revision uid=$UID_B predecessor=$UID_A"
|
||||
else
|
||||
echo " ✗ uid=$UID_B pred=$PRED"; FAILED=1
|
||||
fi
|
||||
|
||||
# ── 6. History → 2-trace chain ────────────────────────────────────
|
||||
echo "[pathway-smoke] History → walks chain backward:"
|
||||
RESP="$(curl -sS "http://127.0.0.1:3110/v1/pathway/history/$UID_B")"
|
||||
LEN="$(echo "$RESP" | jq -r '.length')"
|
||||
HEAD="$(echo "$RESP" | jq -r '.chain[0].uid')"
|
||||
TAIL="$(echo "$RESP" | jq -r '.chain[1].uid')"
|
||||
if [ "$LEN" = "2" ] && [ "$HEAD" = "$UID_B" ] && [ "$TAIL" = "$UID_A" ]; then
|
||||
echo " ✓ chain length=2, [0]=$UID_B [1]=$UID_A"
|
||||
else
|
||||
echo " ✗ len=$LEN head=$HEAD tail=$TAIL"; FAILED=1
|
||||
fi
|
||||
|
||||
# ── 7. Search by tag ──────────────────────────────────────────────
|
||||
echo "[pathway-smoke] Search tag=staffing → finds both traces:"
|
||||
COUNT="$(curl -sS -X POST http://127.0.0.1:3110/v1/pathway/search \
|
||||
-H 'Content-Type: application/json' -d '{"tag":"staffing"}' | jq -r '.count')"
|
||||
if [ "$COUNT" = "2" ]; then
|
||||
echo " ✓ tag search count=2"
|
||||
else
|
||||
echo " ✗ count=$COUNT"; FAILED=1
|
||||
fi
|
||||
|
||||
# ── 8. Retire → excluded from search default, still in Get ────────
|
||||
echo "[pathway-smoke] Retire → excluded from Search but Get-able:"
|
||||
HTTP="$(curl -sS -o /dev/null -w '%{http_code}' -X POST http://127.0.0.1:3110/v1/pathway/retire \
|
||||
-H 'Content-Type: application/json' -d "{\"uid\":\"$UID_A\"}")"
|
||||
if [ "$HTTP" != "204" ]; then echo " ✗ retire HTTP=$HTTP"; FAILED=1; fi
|
||||
|
||||
# Default search excludes retired → only revision (UID_B) remains
|
||||
COUNT_DEFAULT="$(curl -sS -X POST http://127.0.0.1:3110/v1/pathway/search \
|
||||
-H 'Content-Type: application/json' -d '{"tag":"staffing"}' | jq -r '.count')"
|
||||
# IncludeRetired=true brings UID_A back
|
||||
COUNT_ALL="$(curl -sS -X POST http://127.0.0.1:3110/v1/pathway/search \
|
||||
-H 'Content-Type: application/json' -d '{"tag":"staffing","include_retired":true}' | jq -r '.count')"
|
||||
# Get on retired UID still returns the trace (audit trail intact)
|
||||
RETIRED_FLAG="$(curl -sS "http://127.0.0.1:3110/v1/pathway/get/$UID_A" | jq -r '.retired')"
|
||||
if [ "$COUNT_DEFAULT" = "1" ] && [ "$COUNT_ALL" = "2" ] && [ "$RETIRED_FLAG" = "true" ]; then
|
||||
echo " ✓ retired excluded from default Search, included with flag, still Get-able"
|
||||
else
|
||||
echo " ✗ default=$COUNT_DEFAULT all=$COUNT_ALL retired=$RETIRED_FLAG"; FAILED=1
|
||||
fi
|
||||
|
||||
# ── 9. Stats ──────────────────────────────────────────────────────
|
||||
echo "[pathway-smoke] Stats → total/active/retired counters:"
|
||||
STATS="$(curl -sS http://127.0.0.1:3110/v1/pathway/stats)"
|
||||
T="$(echo "$STATS" | jq -r '.Total')"
|
||||
A="$(echo "$STATS" | jq -r '.Active')"
|
||||
R="$(echo "$STATS" | jq -r '.Retired')"
|
||||
if [ "$T" = "2" ] && [ "$A" = "1" ] && [ "$R" = "1" ]; then
|
||||
echo " ✓ total=2 active=1 retired=1"
|
||||
else
|
||||
echo " ✗ total=$T active=$A retired=$R"; FAILED=1
|
||||
fi
|
||||
|
||||
# ── 10. Negative paths ────────────────────────────────────────────
|
||||
echo "[pathway-smoke] Negative paths → 4xx semantics:"
|
||||
GET_404="$(curl -sS -o /dev/null -w '%{http_code}' http://127.0.0.1:3110/v1/pathway/get/no-such-uid)"
|
||||
UPD_404="$(curl -sS -o /dev/null -w '%{http_code}' -X POST http://127.0.0.1:3110/v1/pathway/update \
|
||||
-H 'Content-Type: application/json' -d '{"uid":"no-such-uid","content":{}}')"
|
||||
REV_404="$(curl -sS -o /dev/null -w '%{http_code}' -X POST http://127.0.0.1:3110/v1/pathway/revise \
|
||||
-H 'Content-Type: application/json' -d '{"predecessor_uid":"no-such-uid","content":{}}')"
|
||||
RET_404="$(curl -sS -o /dev/null -w '%{http_code}' -X POST http://127.0.0.1:3110/v1/pathway/retire \
|
||||
-H 'Content-Type: application/json' -d '{"uid":"no-such-uid"}')"
|
||||
ADD_400="$(curl -sS -o /dev/null -w '%{http_code}' -X POST http://127.0.0.1:3110/v1/pathway/add \
|
||||
-H 'Content-Type: application/json' -d '{"content":not-json}')"
|
||||
if [ "$GET_404" = "404" ] && [ "$UPD_404" = "404" ] && [ "$REV_404" = "404" ] && [ "$RET_404" = "404" ] && [ "$ADD_400" = "400" ]; then
|
||||
echo " ✓ get/update/revise/retire on unknown → 404; bad content → 400"
|
||||
else
|
||||
echo " ✗ get=$GET_404 upd=$UPD_404 rev=$REV_404 ret=$RET_404 add=$ADD_400"; FAILED=1
|
||||
fi
|
||||
|
||||
# ── 11. Persistence → kill + restart preserves all traces ─────────
|
||||
echo "[pathway-smoke] kill + restart pathwayd → state survives:"
|
||||
kill $PATHWAYD_PID 2>/dev/null || true
|
||||
wait $PATHWAYD_PID 2>/dev/null || true
|
||||
sleep 0.3
|
||||
launch_pathwayd
|
||||
sleep 0.2
|
||||
|
||||
# Both traces should reappear, retired flag preserved, replay_count preserved
|
||||
RESP_A="$(curl -sS "http://127.0.0.1:3110/v1/pathway/get/$UID_A")"
|
||||
RESP_B="$(curl -sS "http://127.0.0.1:3110/v1/pathway/get/$UID_B")"
|
||||
RC_AFTER="$(echo "$RESP_A" | jq -r '.replay_count')"
|
||||
RETIRED_AFTER="$(echo "$RESP_A" | jq -r '.retired')"
|
||||
PRED_AFTER="$(echo "$RESP_B" | jq -r '.predecessor_uid')"
|
||||
if [ "$RC_AFTER" = "2" ] && [ "$RETIRED_AFTER" = "true" ] && [ "$PRED_AFTER" = "$UID_A" ]; then
|
||||
echo " ✓ replay_count, retired flag, predecessor link all preserved"
|
||||
else
|
||||
echo " ✗ replay_count=$RC_AFTER retired=$RETIRED_AFTER pred=$PRED_AFTER"; FAILED=1
|
||||
fi
|
||||
|
||||
if [ "$FAILED" -eq 0 ]; then
|
||||
echo "[pathway-smoke] Pathway acceptance gate: PASSED"
|
||||
exit 0
|
||||
else
|
||||
echo "[pathway-smoke] Pathway acceptance gate: FAILED"
|
||||
exit 1
|
||||
fi
|
||||
Loading…
x
Reference in New Issue
Block a user