Some checks failed
lakehouse/auditor 9 blocking issues: todo!() macro call in tests/real-world/scrum_master_pipeline.ts
Phase 0 — docs/recon/local-distillation-recon.md
Inventories the 23 KB JSONL streams + 20 vector corpora + auditor's
kb_index.ts as substrate for the now.md distillation pipeline. Maps
spec modules to existing producers, identifies real gaps, lists 9
schemas to formalize. ZERO implementation in recon — gating doc only.
Phase 1 — auditor/schemas/distillation/
9 schemas + foundation types + 48 tests passing in 502ms:
types.ts shared validators + canonicalSha256
evidence_record.ts EVIDENCE_SCHEMA_VERSION=1, ModelRole enum
scored_run.ts 4 categories pinned, anchor_grounding ∈ [0,1]
receipt.ts git_sha 40-char, sha256 file refs, validation_pass:bool
playbook.ts non-empty source_run_ids + acceptance_criteria
scratchpad_summary.ts validation_status enum, hash sha256
model_ledger.ts success_rate ∈ [0,1], sample_count ≥ 1
rag_sample.ts success_score ∈ {accepted, partially_accepted}
sft_sample.ts quality_score MUST be 'accepted' (no leak)
preference_sample.ts chosen != rejected, source_run_ids must differ
evidence_record.test.ts 10 tests, JSON-fixture round-trip
schemas.test.ts 30 tests, inline fixtures
realdata.test.ts 8 tests, real-JSONL probe
Real-data validation probe (one of the 3 notables from recon):
46 rows across 7 sources, 100% pass. distilled_facts/procedures alive.
Report at data/_kb/realdata_validation_report.md (also written by the
test). Confirms schema fits existing producers without migration.
Phase 2 scaffold — scripts/distillation/transforms.ts
Promoted PROBES from realdata.test.ts into a real TRANSFORMS array
covering 12 source streams (8 Tier 1 validated + 4 Tier 2 from
recon's untested-streams list). Pure functions: no I/O, no model
calls, no clock reads. Caller supplies recorded_at + sig_hash so
materializer is deterministic by construction.
Spec non-negotiables enforced at schema layer (defense in depth):
- provenance{source_file, sig_hash, recorded_at} required everywhere
- schema_version mismatch hard-rejects (forward-compat gate)
- SFT no-leak: validateSftSample REJECTS partially_accepted, rejected,
needs_human_review — three explicit tests
- Every score has WHY (reasons non-empty)
- Every playbook traces to source (source_run_ids non-empty)
- Every preference has WHY (reason non-empty)
- Receipts substantive (git_sha 40-char, sha256 64-char, validation_pass:bool)
Branch carries uncommitted auditor rebuild work (mode.rs + modes.toml
+ inference.ts + static.ts) blocked on upstream Ollama Cloud kimi-k2
500 ISE; held pending recon-driven design decisions.
Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
112 lines
4.1 KiB
TypeScript
112 lines
4.1 KiB
TypeScript
// Receipt — per-pipeline-stage record with everything needed to
|
|
// reproduce the run. Spec non-negotiable: substantive receipts, not
|
|
// "ran successfully". Every field below has a deterministic source so
|
|
// the receipt schema validator catches "I forgot to fill it in" the
|
|
// same way it catches type errors.
|
|
import {
|
|
ValidationResult, requireString, requireNumber, requireIsoTimestamp,
|
|
} from "./types";
|
|
|
|
export const RECEIPT_SCHEMA_VERSION = 1;
|
|
|
|
export interface FileReference {
|
|
path: string; // relative to repo root
|
|
sha256: string; // hex
|
|
bytes?: number; // optional but recommended
|
|
}
|
|
|
|
export interface Receipt {
|
|
schema_version: number;
|
|
command: string; // shell-line or script identifier
|
|
git_sha: string; // 40-char hex (full SHA1)
|
|
git_branch?: string;
|
|
git_dirty?: boolean; // true if working tree had uncommitted changes
|
|
started_at: string; // ISO 8601
|
|
ended_at: string; // ISO 8601
|
|
duration_ms: number;
|
|
input_files: FileReference[];
|
|
output_files: FileReference[];
|
|
record_counts: {
|
|
in: number;
|
|
out: number;
|
|
[key: string]: number; // per-stage extras (filtered, dropped, etc.)
|
|
};
|
|
validation_pass: boolean; // explicit — never inferred
|
|
errors: string[];
|
|
warnings: string[];
|
|
}
|
|
|
|
function validateFileRef(v: unknown, field: string, errors: string[]): boolean {
|
|
if (typeof v !== "object" || v === null) {
|
|
errors.push(`${field}: expected object`);
|
|
return false;
|
|
}
|
|
const f = v as Record<string, unknown>;
|
|
let ok = true;
|
|
ok = requireString(f.path, `${field}.path`, errors) && ok;
|
|
if (typeof f.sha256 !== "string" || !/^[0-9a-f]{64}$/.test(f.sha256)) {
|
|
errors.push(`${field}.sha256: must be hex sha256`);
|
|
ok = false;
|
|
}
|
|
if (f.bytes !== undefined && typeof f.bytes !== "number") {
|
|
errors.push(`${field}.bytes: expected number when present`);
|
|
ok = false;
|
|
}
|
|
return ok;
|
|
}
|
|
|
|
export function validateReceipt(input: unknown): ValidationResult<Receipt> {
|
|
const errors: string[] = [];
|
|
if (typeof input !== "object" || input === null) {
|
|
return { valid: false, errors: ["expected object"] };
|
|
}
|
|
const r = input as Record<string, unknown>;
|
|
let ok = true;
|
|
|
|
if (r.schema_version !== RECEIPT_SCHEMA_VERSION) {
|
|
errors.push(`schema_version: expected ${RECEIPT_SCHEMA_VERSION}, got ${JSON.stringify(r.schema_version)}`);
|
|
ok = false;
|
|
}
|
|
ok = requireString(r.command, "command", errors) && ok;
|
|
if (typeof r.git_sha !== "string" || !/^[0-9a-f]{40}$/.test(r.git_sha as string)) {
|
|
errors.push("git_sha: must be 40-char hex");
|
|
ok = false;
|
|
}
|
|
ok = requireIsoTimestamp(r.started_at, "started_at", errors) && ok;
|
|
ok = requireIsoTimestamp(r.ended_at, "ended_at", errors) && ok;
|
|
ok = requireNumber(r.duration_ms, "duration_ms", errors) && ok;
|
|
if (typeof r.validation_pass !== "boolean") {
|
|
errors.push("validation_pass: must be boolean (explicit, never inferred)");
|
|
ok = false;
|
|
}
|
|
if (!Array.isArray(r.input_files)) {
|
|
errors.push("input_files: expected array");
|
|
ok = false;
|
|
} else {
|
|
for (let i = 0; i < r.input_files.length; i++) {
|
|
if (!validateFileRef(r.input_files[i], `input_files[${i}]`, errors)) ok = false;
|
|
}
|
|
}
|
|
if (!Array.isArray(r.output_files)) {
|
|
errors.push("output_files: expected array");
|
|
ok = false;
|
|
} else {
|
|
for (let i = 0; i < r.output_files.length; i++) {
|
|
if (!validateFileRef(r.output_files[i], `output_files[${i}]`, errors)) ok = false;
|
|
}
|
|
}
|
|
if (typeof r.record_counts !== "object" || r.record_counts === null) {
|
|
errors.push("record_counts: expected object");
|
|
ok = false;
|
|
} else {
|
|
const rc = r.record_counts as Record<string, unknown>;
|
|
if (typeof rc.in !== "number") { errors.push("record_counts.in: expected number"); ok = false; }
|
|
if (typeof rc.out !== "number") { errors.push("record_counts.out: expected number"); ok = false; }
|
|
}
|
|
if (!Array.isArray(r.errors)) { errors.push("errors: expected array"); ok = false; }
|
|
if (!Array.isArray(r.warnings)) { errors.push("warnings: expected array"); ok = false; }
|
|
|
|
if (!ok) return { valid: false, errors };
|
|
return { valid: true, value: r as unknown as Receipt };
|
|
}
|