@loxia-labs/loxia-autopilot-one 1.0.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (80) hide show
  1. package/LICENSE +267 -0
  2. package/README.md +509 -0
  3. package/bin/cli.js +117 -0
  4. package/package.json +94 -0
  5. package/scripts/install-scanners.js +236 -0
  6. package/src/analyzers/CSSAnalyzer.js +297 -0
  7. package/src/analyzers/ConfigValidator.js +690 -0
  8. package/src/analyzers/ESLintAnalyzer.js +320 -0
  9. package/src/analyzers/JavaScriptAnalyzer.js +261 -0
  10. package/src/analyzers/PrettierFormatter.js +247 -0
  11. package/src/analyzers/PythonAnalyzer.js +266 -0
  12. package/src/analyzers/SecurityAnalyzer.js +729 -0
  13. package/src/analyzers/TypeScriptAnalyzer.js +247 -0
  14. package/src/analyzers/codeCloneDetector/analyzer.js +344 -0
  15. package/src/analyzers/codeCloneDetector/detector.js +203 -0
  16. package/src/analyzers/codeCloneDetector/index.js +160 -0
  17. package/src/analyzers/codeCloneDetector/parser.js +199 -0
  18. package/src/analyzers/codeCloneDetector/reporter.js +148 -0
  19. package/src/analyzers/codeCloneDetector/scanner.js +59 -0
  20. package/src/core/agentPool.js +1474 -0
  21. package/src/core/agentScheduler.js +2147 -0
  22. package/src/core/contextManager.js +709 -0
  23. package/src/core/messageProcessor.js +732 -0
  24. package/src/core/orchestrator.js +548 -0
  25. package/src/core/stateManager.js +877 -0
  26. package/src/index.js +631 -0
  27. package/src/interfaces/cli.js +549 -0
  28. package/src/interfaces/webServer.js +2162 -0
  29. package/src/modules/fileExplorer/controller.js +280 -0
  30. package/src/modules/fileExplorer/index.js +37 -0
  31. package/src/modules/fileExplorer/middleware.js +92 -0
  32. package/src/modules/fileExplorer/routes.js +125 -0
  33. package/src/modules/fileExplorer/types.js +44 -0
  34. package/src/services/aiService.js +1232 -0
  35. package/src/services/apiKeyManager.js +164 -0
  36. package/src/services/benchmarkService.js +366 -0
  37. package/src/services/budgetService.js +539 -0
  38. package/src/services/contextInjectionService.js +247 -0
  39. package/src/services/conversationCompactionService.js +637 -0
  40. package/src/services/errorHandler.js +810 -0
  41. package/src/services/fileAttachmentService.js +544 -0
  42. package/src/services/modelRouterService.js +366 -0
  43. package/src/services/modelsService.js +322 -0
  44. package/src/services/qualityInspector.js +796 -0
  45. package/src/services/tokenCountingService.js +536 -0
  46. package/src/tools/agentCommunicationTool.js +1344 -0
  47. package/src/tools/agentDelayTool.js +485 -0
  48. package/src/tools/asyncToolManager.js +604 -0
  49. package/src/tools/baseTool.js +800 -0
  50. package/src/tools/browserTool.js +920 -0
  51. package/src/tools/cloneDetectionTool.js +621 -0
  52. package/src/tools/dependencyResolverTool.js +1215 -0
  53. package/src/tools/fileContentReplaceTool.js +875 -0
  54. package/src/tools/fileSystemTool.js +1107 -0
  55. package/src/tools/fileTreeTool.js +853 -0
  56. package/src/tools/imageTool.js +901 -0
  57. package/src/tools/importAnalyzerTool.js +1060 -0
  58. package/src/tools/jobDoneTool.js +248 -0
  59. package/src/tools/seekTool.js +956 -0
  60. package/src/tools/staticAnalysisTool.js +1778 -0
  61. package/src/tools/taskManagerTool.js +2873 -0
  62. package/src/tools/terminalTool.js +2304 -0
  63. package/src/tools/webTool.js +1430 -0
  64. package/src/types/agent.js +519 -0
  65. package/src/types/contextReference.js +972 -0
  66. package/src/types/conversation.js +730 -0
  67. package/src/types/toolCommand.js +747 -0
  68. package/src/utilities/attachmentValidator.js +292 -0
  69. package/src/utilities/configManager.js +582 -0
  70. package/src/utilities/constants.js +722 -0
  71. package/src/utilities/directoryAccessManager.js +535 -0
  72. package/src/utilities/fileProcessor.js +307 -0
  73. package/src/utilities/logger.js +436 -0
  74. package/src/utilities/tagParser.js +1246 -0
  75. package/src/utilities/toolConstants.js +317 -0
  76. package/web-ui/build/index.html +15 -0
  77. package/web-ui/build/logo.png +0 -0
  78. package/web-ui/build/logo2.png +0 -0
  79. package/web-ui/build/static/index-CjkkcnFA.js +344 -0
  80. package/web-ui/build/static/index-Dy2bYbOa.css +1 -0
@@ -0,0 +1,690 @@
1
+ /**
2
+ * ConfigValidator - Validate configuration files for errors and security issues
3
+ *
4
+ * Validates common configuration files:
5
+ * - package.json, tsconfig.json (JSON Schema)
6
+ * - Dockerfile (hadolint)
7
+ * - docker-compose.yml (yamllint)
8
+ * - Kubernetes YAML (checkov, yamllint)
9
+ * - Terraform (checkov)
10
+ * - .env files (secret detection)
11
+ * - GitHub Actions workflows (yamllint)
12
+ */
13
+
14
+ import { exec } from 'child_process';
15
+ import { promisify } from 'util';
16
+ import path from 'path';
17
+ import fs from 'fs/promises';
18
+ import { STATIC_ANALYSIS } from '../utilities/constants.js';
19
+
20
+ const execAsync = promisify(exec);
21
+
22
+ class ConfigValidator {
23
+ constructor(logger = null) {
24
+ this.logger = logger;
25
+ this.availableScanners = null;
26
+ this.scannerCache = new Map();
27
+ }
28
+
29
+ /**
30
+ * Detect which validation tools are available
31
+ * @returns {Promise<Object>} Available validators
32
+ */
33
+ async detectAvailableValidators() {
34
+ // Return cached result if available
35
+ if (this.availableScanners !== null) {
36
+ return this.availableScanners;
37
+ }
38
+
39
+ const available = {
40
+ checkov: false,
41
+ hadolint: false,
42
+ yamllint: false,
43
+ jsonSchema: false
44
+ };
45
+
46
+ // Check for checkov (Infrastructure as Code scanner)
47
+ try {
48
+ await execAsync('checkov --version', { timeout: 5000 });
49
+ available.checkov = true;
50
+ this.logger?.debug('checkov detected');
51
+ } catch (error) {
52
+ this.logger?.debug('checkov not available', { error: error.message });
53
+ }
54
+
55
+ // Check for hadolint (Dockerfile linter)
56
+ try {
57
+ await execAsync('hadolint --version', { timeout: 5000 });
58
+ available.hadolint = true;
59
+ this.logger?.debug('hadolint detected');
60
+ } catch (error) {
61
+ this.logger?.debug('hadolint not available', { error: error.message });
62
+ }
63
+
64
+ // Check for yamllint (YAML linter)
65
+ try {
66
+ await execAsync('yamllint --version', { timeout: 5000 });
67
+ available.yamllint = true;
68
+ this.logger?.debug('yamllint detected');
69
+ } catch (error) {
70
+ this.logger?.debug('yamllint not available', { error: error.message });
71
+ }
72
+
73
+ // Check for ajv (JSON Schema validation - npm package)
74
+ try {
75
+ await import('ajv');
76
+ available.jsonSchema = true;
77
+ this.logger?.debug('JSON Schema validation available');
78
+ } catch (error) {
79
+ this.logger?.debug('ajv not available', { error: error.message });
80
+ }
81
+
82
+ this.availableScanners = available;
83
+ return available;
84
+ }
85
+
86
+ /**
87
+ * Validate a configuration file
88
+ * @param {string} filePath - Path to config file
89
+ * @param {Object} options - Validation options
90
+ * @returns {Promise<Array>} Validation issues
91
+ */
92
+ async validate(filePath, options = {}) {
93
+ const issues = [];
94
+ const available = await this.detectAvailableValidators();
95
+ const fileType = this.detectFileType(filePath);
96
+
97
+ this.logger?.debug('Validating config file', { filePath, fileType });
98
+
99
+ // Route to appropriate validator based on file type
100
+ switch (fileType) {
101
+ case 'dockerfile':
102
+ if (available.hadolint) {
103
+ const hadolintIssues = await this.validateDockerfile(filePath, options);
104
+ issues.push(...hadolintIssues);
105
+ }
106
+ if (available.checkov) {
107
+ const checkovIssues = await this.validateWithCheckov(filePath, 'dockerfile', options);
108
+ issues.push(...checkovIssues);
109
+ }
110
+ break;
111
+
112
+ case 'docker-compose':
113
+ if (available.yamllint) {
114
+ const yamlIssues = await this.validateYAML(filePath, options);
115
+ issues.push(...yamlIssues);
116
+ }
117
+ if (available.checkov) {
118
+ const checkovIssues = await this.validateWithCheckov(filePath, 'docker_compose', options);
119
+ issues.push(...checkovIssues);
120
+ }
121
+ break;
122
+
123
+ case 'kubernetes':
124
+ if (available.yamllint) {
125
+ const yamlIssues = await this.validateYAML(filePath, options);
126
+ issues.push(...yamlIssues);
127
+ }
128
+ if (available.checkov) {
129
+ const checkovIssues = await this.validateWithCheckov(filePath, 'kubernetes', options);
130
+ issues.push(...checkovIssues);
131
+ }
132
+ break;
133
+
134
+ case 'terraform':
135
+ if (available.checkov) {
136
+ const checkovIssues = await this.validateWithCheckov(filePath, 'terraform', options);
137
+ issues.push(...checkovIssues);
138
+ }
139
+ break;
140
+
141
+ case 'package.json':
142
+ if (available.jsonSchema) {
143
+ const schemaIssues = await this.validatePackageJson(filePath, options);
144
+ issues.push(...schemaIssues);
145
+ }
146
+ break;
147
+
148
+ case 'tsconfig.json':
149
+ if (available.jsonSchema) {
150
+ const schemaIssues = await this.validateTsConfig(filePath, options);
151
+ issues.push(...schemaIssues);
152
+ }
153
+ break;
154
+
155
+ case 'github-actions':
156
+ if (available.yamllint) {
157
+ const yamlIssues = await this.validateYAML(filePath, options);
158
+ issues.push(...yamlIssues);
159
+ }
160
+ break;
161
+
162
+ case 'env':
163
+ // Always check .env files for secrets (no external tool needed)
164
+ const secretIssues = await this.validateEnvFile(filePath, options);
165
+ issues.push(...secretIssues);
166
+ break;
167
+
168
+ case 'yaml':
169
+ if (available.yamllint) {
170
+ const yamlIssues = await this.validateYAML(filePath, options);
171
+ issues.push(...yamlIssues);
172
+ }
173
+ break;
174
+
175
+ default:
176
+ this.logger?.warn('Unknown config file type', { filePath, fileType });
177
+ return [];
178
+ }
179
+
180
+ return this.normalizeResults(issues);
181
+ }
182
+
183
+ /**
184
+ * Validate Dockerfile using hadolint
185
+ * @private
186
+ */
187
+ async validateDockerfile(filePath, options = {}) {
188
+ try {
189
+ const result = await execAsync(
190
+ `hadolint --format json "${filePath}"`,
191
+ {
192
+ maxBuffer: 10 * 1024 * 1024,
193
+ timeout: 30000
194
+ }
195
+ );
196
+
197
+ const output = JSON.parse(result.stdout);
198
+ return this.parseHadolintResults(output, filePath);
199
+ } catch (error) {
200
+ // hadolint exits with non-zero if issues found
201
+ if (error.stdout) {
202
+ try {
203
+ const output = JSON.parse(error.stdout);
204
+ return this.parseHadolintResults(output, filePath);
205
+ } catch (parseError) {
206
+ this.logger?.error('Failed to parse hadolint output', {
207
+ error: parseError.message
208
+ });
209
+ }
210
+ }
211
+ this.logger?.error('hadolint validation failed', { error: error.message });
212
+ return [];
213
+ }
214
+ }
215
+
216
+ /**
217
+ * Parse hadolint results
218
+ * @private
219
+ */
220
+ parseHadolintResults(output, filePath) {
221
+ const issues = [];
222
+
223
+ if (Array.isArray(output)) {
224
+ for (const issue of output) {
225
+ issues.push({
226
+ file: filePath,
227
+ line: issue.line || 1,
228
+ column: issue.column || 1,
229
+ severity: this.mapHadolintSeverity(issue.level),
230
+ rule: issue.code,
231
+ message: issue.message,
232
+ category: 'dockerfile',
233
+ validator: 'hadolint'
234
+ });
235
+ }
236
+ }
237
+
238
+ return issues;
239
+ }
240
+
241
+ /**
242
+ * Validate YAML files using yamllint
243
+ * @private
244
+ */
245
+ async validateYAML(filePath, options = {}) {
246
+ try {
247
+ const result = await execAsync(
248
+ `yamllint -f parsable "${filePath}"`,
249
+ {
250
+ maxBuffer: 10 * 1024 * 1024,
251
+ timeout: 30000
252
+ }
253
+ );
254
+
255
+ return this.parseYamllintResults(result.stdout, filePath);
256
+ } catch (error) {
257
+ // yamllint exits with non-zero if issues found
258
+ if (error.stdout) {
259
+ return this.parseYamllintResults(error.stdout, filePath);
260
+ }
261
+ this.logger?.error('yamllint validation failed', { error: error.message });
262
+ return [];
263
+ }
264
+ }
265
+
266
+ /**
267
+ * Parse yamllint results
268
+ * @private
269
+ */
270
+ parseYamllintResults(output, filePath) {
271
+ const issues = [];
272
+ const lines = output.split('\n').filter(line => line.trim());
273
+
274
+ for (const line of lines) {
275
+ // Format: file:line:column: [level] message (rule)
276
+ const match = line.match(/^(.+?):(\d+):(\d+):\s*\[(\w+)\]\s*(.+?)\s*\((.+?)\)/);
277
+ if (match) {
278
+ const [, file, lineNum, col, level, message, rule] = match;
279
+ issues.push({
280
+ file: filePath,
281
+ line: parseInt(lineNum, 10),
282
+ column: parseInt(col, 10),
283
+ severity: this.mapYamllintSeverity(level),
284
+ rule: rule,
285
+ message: message,
286
+ category: 'yaml',
287
+ validator: 'yamllint'
288
+ });
289
+ }
290
+ }
291
+
292
+ return issues;
293
+ }
294
+
295
+ /**
296
+ * Validate with checkov (Infrastructure as Code)
297
+ * @private
298
+ */
299
+ async validateWithCheckov(filePath, framework, options = {}) {
300
+ try {
301
+ const result = await execAsync(
302
+ `checkov -f "${filePath}" --framework ${framework} --output json --compact`,
303
+ {
304
+ maxBuffer: 10 * 1024 * 1024,
305
+ timeout: 60000
306
+ }
307
+ );
308
+
309
+ const output = JSON.parse(result.stdout);
310
+ return this.parseCheckovResults(output, filePath);
311
+ } catch (error) {
312
+ // checkov exits with non-zero if issues found
313
+ if (error.stdout) {
314
+ try {
315
+ const output = JSON.parse(error.stdout);
316
+ return this.parseCheckovResults(output, filePath);
317
+ } catch (parseError) {
318
+ this.logger?.error('Failed to parse checkov output', {
319
+ error: parseError.message
320
+ });
321
+ }
322
+ }
323
+ this.logger?.error('checkov validation failed', { error: error.message });
324
+ return [];
325
+ }
326
+ }
327
+
328
+ /**
329
+ * Parse checkov results
330
+ * @private
331
+ */
332
+ parseCheckovResults(output, filePath) {
333
+ const issues = [];
334
+
335
+ if (output.results && output.results.failed_checks) {
336
+ for (const check of output.results.failed_checks) {
337
+ issues.push({
338
+ file: filePath,
339
+ line: check.file_line_range ? check.file_line_range[0] : 1,
340
+ column: 1,
341
+ severity: this.mapCheckovSeverity(check.check_class),
342
+ rule: check.check_id,
343
+ message: check.check_name || check.check_id,
344
+ category: 'security',
345
+ validator: 'checkov',
346
+ remediation: check.guideline,
347
+ cwe: check.cwe,
348
+ references: check.guideline ? [check.guideline] : []
349
+ });
350
+ }
351
+ }
352
+
353
+ return issues;
354
+ }
355
+
356
+ /**
357
+ * Validate package.json using JSON Schema
358
+ * @private
359
+ */
360
+ async validatePackageJson(filePath, options = {}) {
361
+ try {
362
+ const Ajv = (await import('ajv')).default;
363
+ const addFormats = (await import('ajv-formats')).default;
364
+
365
+ const content = await fs.readFile(filePath, 'utf-8');
366
+ const packageJson = JSON.parse(content);
367
+
368
+ const ajv = new Ajv({ allErrors: true, strict: false });
369
+ addFormats(ajv);
370
+
371
+ // Basic package.json schema (simplified)
372
+ const schema = {
373
+ type: 'object',
374
+ required: ['name', 'version'],
375
+ properties: {
376
+ name: { type: 'string', pattern: '^(?:@[a-z0-9-~][a-z0-9-._~]*/)?[a-z0-9-~][a-z0-9-._~]*$' },
377
+ version: { type: 'string' },
378
+ description: { type: 'string' },
379
+ main: { type: 'string' },
380
+ type: { type: 'string', enum: ['module', 'commonjs'] },
381
+ scripts: { type: 'object' },
382
+ dependencies: { type: 'object' },
383
+ devDependencies: { type: 'object' }
384
+ },
385
+ additionalProperties: true
386
+ };
387
+
388
+ const validate = ajv.compile(schema);
389
+ const valid = validate(packageJson);
390
+
391
+ if (!valid && validate.errors) {
392
+ return validate.errors.map(error => ({
393
+ file: filePath,
394
+ line: 1,
395
+ column: 1,
396
+ severity: STATIC_ANALYSIS.SEVERITY.ERROR,
397
+ rule: 'json-schema',
398
+ message: error.instancePath ? `${error.instancePath} ${error.message}` : `must have required property '${error.params.missingProperty}'`,
399
+ category: 'validation',
400
+ validator: 'json-schema'
401
+ }));
402
+ }
403
+
404
+ return [];
405
+ } catch (error) {
406
+ this.logger?.error('package.json validation failed', { error: error.message });
407
+ return [{
408
+ file: filePath,
409
+ line: 1,
410
+ column: 1,
411
+ severity: STATIC_ANALYSIS.SEVERITY.ERROR,
412
+ rule: 'json-parse',
413
+ message: `Invalid JSON: ${error.message}`,
414
+ category: 'syntax',
415
+ validator: 'json-parse'
416
+ }];
417
+ }
418
+ }
419
+
420
+ /**
421
+ * Validate tsconfig.json using JSON Schema
422
+ * @private
423
+ */
424
+ async validateTsConfig(filePath, options = {}) {
425
+ try {
426
+ const content = await fs.readFile(filePath, 'utf-8');
427
+ const tsconfig = JSON.parse(content);
428
+
429
+ const issues = [];
430
+
431
+ // Check for common misconfigurations
432
+ if (tsconfig.compilerOptions) {
433
+ const opts = tsconfig.compilerOptions;
434
+
435
+ // Check for strict mode
436
+ if (!opts.strict) {
437
+ issues.push({
438
+ file: filePath,
439
+ line: 1,
440
+ column: 1,
441
+ severity: STATIC_ANALYSIS.SEVERITY.WARNING,
442
+ rule: 'strict-mode',
443
+ message: 'Consider enabling "strict" mode for better type safety',
444
+ category: 'best-practice',
445
+ validator: 'tsconfig-validator'
446
+ });
447
+ }
448
+
449
+ // Check for noImplicitAny
450
+ if (opts.noImplicitAny === false) {
451
+ issues.push({
452
+ file: filePath,
453
+ line: 1,
454
+ column: 1,
455
+ severity: STATIC_ANALYSIS.SEVERITY.WARNING,
456
+ rule: 'no-implicit-any',
457
+ message: 'Disabling noImplicitAny reduces type safety',
458
+ category: 'best-practice',
459
+ validator: 'tsconfig-validator'
460
+ });
461
+ }
462
+ }
463
+
464
+ return issues;
465
+ } catch (error) {
466
+ this.logger?.error('tsconfig.json validation failed', { error: error.message });
467
+ return [{
468
+ file: filePath,
469
+ line: 1,
470
+ column: 1,
471
+ severity: STATIC_ANALYSIS.SEVERITY.ERROR,
472
+ rule: 'json-parse',
473
+ message: `Invalid JSON: ${error.message}`,
474
+ category: 'syntax',
475
+ validator: 'json-parse'
476
+ }];
477
+ }
478
+ }
479
+
480
+ /**
481
+ * Validate .env file for security issues
482
+ * @private
483
+ */
484
+ async validateEnvFile(filePath, options = {}) {
485
+ try {
486
+ const content = await fs.readFile(filePath, 'utf-8');
487
+ const issues = [];
488
+ const lines = content.split('\n');
489
+
490
+ const secretPatterns = [
491
+ { pattern: /password|passwd|pwd/i, name: 'password' },
492
+ { pattern: /api[_-]?key/i, name: 'API key' },
493
+ { pattern: /secret/i, name: 'secret' },
494
+ { pattern: /token/i, name: 'token' },
495
+ { pattern: /private[_-]?key/i, name: 'private key' },
496
+ { pattern: /aws[_-]?access/i, name: 'AWS credentials' }
497
+ ];
498
+
499
+ lines.forEach((line, index) => {
500
+ const trimmed = line.trim();
501
+
502
+ // Skip comments and empty lines
503
+ if (!trimmed || trimmed.startsWith('#')) return;
504
+
505
+ // Check for hardcoded values (not references to other env vars)
506
+ if (trimmed.includes('=')) {
507
+ const [key, value] = trimmed.split('=');
508
+ const keyLower = key.toLowerCase();
509
+ const valueTrimmed = value?.trim() || '';
510
+
511
+ // Check if value looks like a real secret (not empty, not a placeholder)
512
+ const looksLikeSecret = valueTrimmed &&
513
+ valueTrimmed !== '' &&
514
+ !valueTrimmed.startsWith('$') && // Not env var reference
515
+ valueTrimmed !== 'your-key-here' &&
516
+ valueTrimmed !== 'changeme' &&
517
+ valueTrimmed.length > 5;
518
+
519
+ if (looksLikeSecret) {
520
+ for (const { pattern, name } of secretPatterns) {
521
+ if (pattern.test(keyLower)) {
522
+ issues.push({
523
+ file: filePath,
524
+ line: index + 1,
525
+ column: 1,
526
+ severity: STATIC_ANALYSIS.SEVERITY.CRITICAL,
527
+ rule: 'hardcoded-secret',
528
+ message: `Potential hardcoded ${name} detected in .env file`,
529
+ category: 'security',
530
+ validator: 'env-validator',
531
+ remediation: 'Use environment-specific .env files and add .env to .gitignore'
532
+ });
533
+ break;
534
+ }
535
+ }
536
+ }
537
+ }
538
+ });
539
+
540
+ return issues;
541
+ } catch (error) {
542
+ this.logger?.error('.env validation failed', { error: error.message });
543
+ return [];
544
+ }
545
+ }
546
+
547
+ /**
548
+ * Detect configuration file type
549
+ * @private
550
+ */
551
+ detectFileType(filePath) {
552
+ const basename = path.basename(filePath).toLowerCase();
553
+ const dirname = path.dirname(filePath);
554
+
555
+ // Exact filename matches
556
+ if (basename === 'dockerfile') return 'dockerfile';
557
+ if (basename === 'docker-compose.yml' || basename === 'docker-compose.yaml') return 'docker-compose';
558
+ if (basename === 'package.json') return 'package.json';
559
+ if (basename === 'tsconfig.json') return 'tsconfig.json';
560
+ if (basename === '.env' || basename.endsWith('.env')) return 'env';
561
+
562
+ // Path-based detection
563
+ if (dirname.includes('.github/workflows')) return 'github-actions';
564
+ if (dirname.includes('kubernetes') || dirname.includes('k8s')) return 'kubernetes';
565
+
566
+ // Extension-based detection
567
+ const ext = path.extname(filePath).toLowerCase();
568
+ if (ext === '.tf' || ext === '.tfvars') return 'terraform';
569
+ if (ext === '.yml' || ext === '.yaml') return 'yaml';
570
+ if (ext === '.json') return 'json';
571
+
572
+ return 'unknown';
573
+ }
574
+
575
+ /**
576
+ * Normalize all validator results to common format
577
+ * @private
578
+ */
579
+ normalizeResults(results) {
580
+ return results.map(result => ({
581
+ file: result.file,
582
+ line: result.line || 1,
583
+ column: result.column || 1,
584
+ severity: result.severity || STATIC_ANALYSIS.SEVERITY.WARNING,
585
+ rule: result.rule || 'unknown',
586
+ message: result.message || 'Validation issue detected',
587
+ category: result.category || 'validation',
588
+ validator: result.validator,
589
+ cwe: result.cwe || null,
590
+ remediation: result.remediation || null,
591
+ references: result.references || []
592
+ }));
593
+ }
594
+
595
+ /**
596
+ * Map hadolint severity to our standard
597
+ * @private
598
+ */
599
+ mapHadolintSeverity(level) {
600
+ const map = {
601
+ 'error': STATIC_ANALYSIS.SEVERITY.ERROR,
602
+ 'warning': STATIC_ANALYSIS.SEVERITY.WARNING,
603
+ 'info': STATIC_ANALYSIS.SEVERITY.INFO,
604
+ 'style': STATIC_ANALYSIS.SEVERITY.INFO
605
+ };
606
+ return map[level?.toLowerCase()] || STATIC_ANALYSIS.SEVERITY.WARNING;
607
+ }
608
+
609
+ /**
610
+ * Map yamllint severity to our standard
611
+ * @private
612
+ */
613
+ mapYamllintSeverity(level) {
614
+ const map = {
615
+ 'error': STATIC_ANALYSIS.SEVERITY.ERROR,
616
+ 'warning': STATIC_ANALYSIS.SEVERITY.WARNING
617
+ };
618
+ return map[level?.toLowerCase()] || STATIC_ANALYSIS.SEVERITY.WARNING;
619
+ }
620
+
621
+ /**
622
+ * Map checkov severity to our standard
623
+ * @private
624
+ */
625
+ mapCheckovSeverity(checkClass) {
626
+ // checkov uses check_class to categorize severity
627
+ // Most security issues are treated as errors
628
+ return STATIC_ANALYSIS.SEVERITY.ERROR;
629
+ }
630
+
631
+ /**
632
+ * Get validator status report
633
+ * @returns {Promise<Object>} Validator availability and status
634
+ */
635
+ async getValidatorStatus() {
636
+ const available = await this.detectAvailableValidators();
637
+ return {
638
+ validators: available,
639
+ recommendations: this.getInstallRecommendations(available)
640
+ };
641
+ }
642
+
643
+ /**
644
+ * Get installation recommendations for missing validators
645
+ * @private
646
+ */
647
+ getInstallRecommendations(available) {
648
+ const recommendations = [];
649
+
650
+ if (!available.checkov) {
651
+ recommendations.push({
652
+ validator: 'checkov',
653
+ reason: 'Infrastructure as Code security scanning (Docker, Kubernetes, Terraform)',
654
+ install: 'pip install checkov',
655
+ priority: 'high'
656
+ });
657
+ }
658
+
659
+ if (!available.hadolint) {
660
+ recommendations.push({
661
+ validator: 'hadolint',
662
+ reason: 'Dockerfile linting and best practices',
663
+ install: 'Download from https://github.com/hadolint/hadolint/releases',
664
+ priority: 'high'
665
+ });
666
+ }
667
+
668
+ if (!available.yamllint) {
669
+ recommendations.push({
670
+ validator: 'yamllint',
671
+ reason: 'YAML file validation',
672
+ install: 'pip install yamllint',
673
+ priority: 'medium'
674
+ });
675
+ }
676
+
677
+ if (!available.jsonSchema) {
678
+ recommendations.push({
679
+ validator: 'ajv (JSON Schema)',
680
+ reason: 'JSON configuration validation',
681
+ install: 'npm install ajv ajv-formats',
682
+ priority: 'medium'
683
+ });
684
+ }
685
+
686
+ return recommendations;
687
+ }
688
+ }
689
+
690
+ export default ConfigValidator;