@lumenflow/cli 3.20.0 → 3.22.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/chunk-2D2VOCA4.js +37 -0
- package/dist/chunk-2D5KFYGX.js +284 -0
- package/dist/chunk-2GXVIN57.js +14072 -0
- package/dist/chunk-2MQ7HZWZ.js +26 -0
- package/dist/chunk-2UFQ3A3C.js +643 -0
- package/dist/chunk-3RG5ZIWI.js +10 -0
- package/dist/chunk-4N74J3UT.js +15 -0
- package/dist/chunk-5GTOXFYR.js +392 -0
- package/dist/chunk-5VY6MQMC.js +240 -0
- package/dist/chunk-67XVPMRY.js +1297 -0
- package/dist/chunk-6HO4GWJE.js +164 -0
- package/dist/chunk-6W5XHWYV.js +1890 -0
- package/dist/chunk-6X4EMYJQ.js +64 -0
- package/dist/chunk-6XYXI2NQ.js +772 -0
- package/dist/chunk-7ANSOV6Q.js +285 -0
- package/dist/chunk-A624LFLB.js +1380 -0
- package/dist/chunk-ADN5NHG4.js +126 -0
- package/dist/chunk-B7YJYJKG.js +33 -0
- package/dist/chunk-CCLHCPKG.js +210 -0
- package/dist/chunk-CK36VROC.js +1584 -0
- package/dist/chunk-D3UOFRSB.js +81 -0
- package/dist/chunk-DFR4DJBM.js +230 -0
- package/dist/chunk-DSYBDHYH.js +79 -0
- package/dist/chunk-DWMLTXKQ.js +1176 -0
- package/dist/chunk-E3REJTAJ.js +28 -0
- package/dist/chunk-EA3IVO64.js +633 -0
- package/dist/chunk-EK2AKZKD.js +55 -0
- package/dist/chunk-ELD7JTTT.js +343 -0
- package/dist/chunk-EX6TT2XI.js +195 -0
- package/dist/chunk-EXINSFZE.js +82 -0
- package/dist/chunk-EZ6ZBYBM.js +510 -0
- package/dist/chunk-FBKAPTJ2.js +16 -0
- package/dist/chunk-FVLV5RYH.js +1118 -0
- package/dist/chunk-GDNSBQVK.js +2485 -0
- package/dist/chunk-GPQHMBNN.js +278 -0
- package/dist/chunk-GTFJB67L.js +68 -0
- package/dist/chunk-HANJXVKW.js +1127 -0
- package/dist/chunk-HEVS5YLD.js +269 -0
- package/dist/chunk-HMEVZKPQ.js +9 -0
- package/dist/chunk-HRGSYNLM.js +3511 -0
- package/dist/chunk-ISZR5N4K.js +60 -0
- package/dist/chunk-J6SUPR2C.js +226 -0
- package/dist/chunk-JERYVEIZ.js +244 -0
- package/dist/chunk-JHHWGL2N.js +87 -0
- package/dist/chunk-JONWQUB5.js +775 -0
- package/dist/chunk-K2DIWWDM.js +1766 -0
- package/dist/chunk-KY4PGL5V.js +969 -0
- package/dist/chunk-L737LQ4C.js +1285 -0
- package/dist/chunk-LFTWYIB2.js +497 -0
- package/dist/chunk-LV47RFNJ.js +41 -0
- package/dist/chunk-MKSAITI7.js +15 -0
- package/dist/chunk-MZ7RKIX4.js +212 -0
- package/dist/chunk-NAP6CFSO.js +84 -0
- package/dist/chunk-ND6MY37M.js +16 -0
- package/dist/chunk-NMG736UR.js +683 -0
- package/dist/chunk-NRAXROED.js +32 -0
- package/dist/chunk-NRIZR3A7.js +690 -0
- package/dist/chunk-NX43BG3M.js +233 -0
- package/dist/chunk-O645XLSI.js +297 -0
- package/dist/chunk-OMJD6A3S.js +235 -0
- package/dist/chunk-QB6SJD4T.js +430 -0
- package/dist/chunk-QFSTL4J3.js +276 -0
- package/dist/chunk-QLGDFMFX.js +212 -0
- package/dist/chunk-RIAAGL2E.js +13 -0
- package/dist/chunk-RWO5XMZ6.js +86 -0
- package/dist/chunk-RXRKBBSM.js +149 -0
- package/dist/chunk-RZOZMML6.js +363 -0
- package/dist/chunk-U7I7FS7T.js +113 -0
- package/dist/chunk-UI42RODY.js +717 -0
- package/dist/chunk-UTVMVSCO.js +519 -0
- package/dist/chunk-V6OJGLBA.js +1746 -0
- package/dist/chunk-W2JHVH7D.js +152 -0
- package/dist/chunk-WD3Y7VQN.js +280 -0
- package/dist/chunk-WOCTQ5MS.js +303 -0
- package/dist/chunk-WZR3ZUNN.js +696 -0
- package/dist/chunk-XGI665H7.js +150 -0
- package/dist/chunk-XKY65P2T.js +304 -0
- package/dist/chunk-Y4CQZY65.js +57 -0
- package/dist/chunk-YFEXKLVE.js +194 -0
- package/dist/chunk-YHO3HS5X.js +287 -0
- package/dist/chunk-YLS7AZSX.js +738 -0
- package/dist/chunk-ZE473AO6.js +49 -0
- package/dist/chunk-ZF747T3O.js +644 -0
- package/dist/chunk-ZHCZHZH3.js +43 -0
- package/dist/chunk-ZZNZX2XY.js +87 -0
- package/dist/constants-7QAP3VQ4.js +23 -0
- package/dist/dist-IY3UUMWK.js +33 -0
- package/dist/init-templates.js +30 -22
- package/dist/init-templates.js.map +1 -1
- package/dist/invariants-runner-W5RGHCSU.js +27 -0
- package/dist/lane-lock-6J36HD5O.js +35 -0
- package/dist/mem-checkpoint-core-EANG2GVN.js +14 -0
- package/dist/mem-signal-core-2LZ2WYHW.js +19 -0
- package/dist/memory-store-OLB5FO7K.js +18 -0
- package/dist/service-6BYCOCO5.js +13 -0
- package/dist/spawn-policy-resolver-NTSZYQ6R.js +17 -0
- package/dist/spawn-task-builder-R4E2BHSW.js +22 -0
- package/dist/wu-done-pr-WLFFFEPJ.js +25 -0
- package/dist/wu-done-validation-3J5E36FE.js +30 -0
- package/dist/wu-duplicate-id-detector-5S7JHELK.js +232 -0
- package/dist/wu-spawn-strategy-resolver.js +18 -5
- package/dist/wu-spawn-strategy-resolver.js.map +1 -1
- package/package.json +8 -8
- package/packs/agent-runtime/.turbo/turbo-build.log +1 -1
- package/packs/agent-runtime/.turbo/turbo-typecheck.log +4 -0
- package/packs/agent-runtime/package.json +1 -1
- package/packs/sidekick/.turbo/turbo-build.log +1 -1
- package/packs/sidekick/.turbo/turbo-test.log +12 -0
- package/packs/sidekick/.turbo/turbo-typecheck.log +4 -0
- package/packs/sidekick/package.json +1 -1
- package/packs/software-delivery/.turbo/turbo-build.log +1 -1
- package/packs/software-delivery/.turbo/turbo-typecheck.log +4 -0
- package/packs/software-delivery/package.json +1 -1
- package/templates/core/.lumenflow/constraints.md.template +68 -3
- package/templates/core/LUMENFLOW.md.template +26 -26
- package/templates/core/_frameworks/lumenflow/wu-sizing-guide.md.template +1 -3
- package/templates/core/ai/onboarding/agent-safety-card.md.template +14 -4
- package/templates/core/ai/onboarding/first-wu-mistakes.md.template +96 -0
- package/templates/core/ai/onboarding/quick-ref-commands.md.template +23 -22
- package/templates/core/ai/onboarding/rapid-prototyping.md +2 -1
- package/templates/core/ai/onboarding/starting-prompt.md.template +3 -3
- package/templates/core/ai/onboarding/troubleshooting-wu-done.md.template +69 -1
|
@@ -0,0 +1,37 @@
|
|
|
1
|
+
import {
|
|
2
|
+
TEST_TYPES,
|
|
3
|
+
WU_TYPES
|
|
4
|
+
} from "./chunk-V6OJGLBA.js";
|
|
5
|
+
|
|
6
|
+
// ../core/dist/wu-type-helpers.js
|
|
7
|
+
function isNonEmptyArray(value) {
|
|
8
|
+
return Array.isArray(value) && value.length > 0;
|
|
9
|
+
}
|
|
10
|
+
function isDocumentationType(type) {
|
|
11
|
+
return typeof type === "string" && type === WU_TYPES.DOCUMENTATION;
|
|
12
|
+
}
|
|
13
|
+
function isProcessType(type) {
|
|
14
|
+
return typeof type === "string" && type === WU_TYPES.PROCESS;
|
|
15
|
+
}
|
|
16
|
+
function isDocsOrProcessType(type) {
|
|
17
|
+
return isDocumentationType(type) || isProcessType(type);
|
|
18
|
+
}
|
|
19
|
+
function hasAnyTests(tests) {
|
|
20
|
+
if (!tests || typeof tests !== "object")
|
|
21
|
+
return false;
|
|
22
|
+
const t = tests;
|
|
23
|
+
return isNonEmptyArray(t[TEST_TYPES.MANUAL]) || isNonEmptyArray(t[TEST_TYPES.UNIT]) || isNonEmptyArray(t[TEST_TYPES.E2E]) || isNonEmptyArray(t[TEST_TYPES.INTEGRATION]);
|
|
24
|
+
}
|
|
25
|
+
function hasManualTests(tests) {
|
|
26
|
+
if (!tests || typeof tests !== "object")
|
|
27
|
+
return false;
|
|
28
|
+
const t = tests;
|
|
29
|
+
return isNonEmptyArray(t[TEST_TYPES.MANUAL]);
|
|
30
|
+
}
|
|
31
|
+
|
|
32
|
+
export {
|
|
33
|
+
isDocumentationType,
|
|
34
|
+
isDocsOrProcessType,
|
|
35
|
+
hasAnyTests,
|
|
36
|
+
hasManualTests
|
|
37
|
+
};
|
|
@@ -0,0 +1,284 @@
|
|
|
1
|
+
import {
|
|
2
|
+
DomainPackManifestSchema,
|
|
3
|
+
PACK_MANIFEST_FILE_NAME,
|
|
4
|
+
UTF8_ENCODING,
|
|
5
|
+
computeDeterministicPackHash,
|
|
6
|
+
isBroadWildcardScopePattern,
|
|
7
|
+
resolvePackToolEntryPath,
|
|
8
|
+
validateDomainPackToolSafety,
|
|
9
|
+
validatePackImportBoundaries
|
|
10
|
+
} from "./chunk-HANJXVKW.js";
|
|
11
|
+
import {
|
|
12
|
+
WU_OPTIONS,
|
|
13
|
+
createWUParser,
|
|
14
|
+
runCLI
|
|
15
|
+
} from "./chunk-2GXVIN57.js";
|
|
16
|
+
|
|
17
|
+
// src/pack-validate.ts
|
|
18
|
+
import { readFile } from "fs/promises";
|
|
19
|
+
import { join, resolve } from "path";
|
|
20
|
+
import YAML from "yaml";
|
|
21
|
+
var LOG_PREFIX = "[pack:validate]";
|
|
22
|
+
var DEFAULT_PACKS_ROOT = "packages/@lumenflow/packs";
|
|
23
|
+
var HTTPS_PROTOCOL = "https:";
|
|
24
|
+
var NETWORK_URL_PROPERTY = "url";
|
|
25
|
+
var SECURITY_LINT_ERROR = {
|
|
26
|
+
PERMISSION_SCOPE_READ_WRITE: "permission/scope mismatch: read-permission tool cannot request write path access.",
|
|
27
|
+
PERMISSION_SCOPE_WRITE_MISSING: "permission/scope mismatch: write-permission tool must include at least one write path scope.",
|
|
28
|
+
WILDCARD_WRITE: "forbidden wildcard write scope. Replace with constrained path pattern (for example reports/**/*.md).",
|
|
29
|
+
NETWORK_URL_REQUIRED: "network-scoped tools must constrain input_schema.properties.url via const/enum https URL allow-list.",
|
|
30
|
+
NETWORK_URL_INVALID: "network-scoped tool has invalid URL in input_schema.properties.url.",
|
|
31
|
+
NETWORK_URL_SCHEME: "network-scoped tool URL must use https:// in input_schema.properties.url."
|
|
32
|
+
};
|
|
33
|
+
async function validatePack(options) {
|
|
34
|
+
const { packRoot, hashExclusions } = options;
|
|
35
|
+
const absolutePackRoot = resolve(packRoot);
|
|
36
|
+
let manifest;
|
|
37
|
+
const manifestResult = await validateManifest(absolutePackRoot);
|
|
38
|
+
if (manifestResult.status === "pass" && manifestResult.manifest) {
|
|
39
|
+
manifest = manifestResult.manifest;
|
|
40
|
+
}
|
|
41
|
+
const toolEntriesResult = manifest ? validateToolEntries(absolutePackRoot, manifest) : { status: "skip", error: "Skipped: manifest validation failed" };
|
|
42
|
+
const importBoundariesResult = await checkImportBoundaries(absolutePackRoot, hashExclusions);
|
|
43
|
+
const securityLintResult = manifest ? runSecurityLint(manifest) : { status: "skip", error: "Skipped: manifest validation failed" };
|
|
44
|
+
const integrityResult = await computeIntegrity(absolutePackRoot, hashExclusions);
|
|
45
|
+
const allPassed = manifestResult.status === "pass" && toolEntriesResult.status === "pass" && importBoundariesResult.status === "pass" && securityLintResult.status === "pass" && integrityResult.status === "pass";
|
|
46
|
+
return {
|
|
47
|
+
manifest: manifestResult,
|
|
48
|
+
importBoundaries: importBoundariesResult,
|
|
49
|
+
toolEntries: toolEntriesResult,
|
|
50
|
+
securityLint: securityLintResult,
|
|
51
|
+
integrity: integrityResult,
|
|
52
|
+
allPassed
|
|
53
|
+
};
|
|
54
|
+
}
|
|
55
|
+
async function validateManifest(packRoot) {
|
|
56
|
+
try {
|
|
57
|
+
const manifestPath = join(packRoot, PACK_MANIFEST_FILE_NAME);
|
|
58
|
+
const manifestRaw = await readFile(manifestPath, UTF8_ENCODING);
|
|
59
|
+
const parsed = YAML.parse(manifestRaw);
|
|
60
|
+
const manifest = DomainPackManifestSchema.parse(parsed);
|
|
61
|
+
return { status: "pass", manifest };
|
|
62
|
+
} catch (err) {
|
|
63
|
+
const message = err instanceof Error ? err.message : String(err);
|
|
64
|
+
return { status: "fail", error: message };
|
|
65
|
+
}
|
|
66
|
+
}
|
|
67
|
+
function validateToolEntries(packRoot, manifest) {
|
|
68
|
+
try {
|
|
69
|
+
for (const tool of manifest.tools) {
|
|
70
|
+
resolvePackToolEntryPath(packRoot, tool.entry);
|
|
71
|
+
}
|
|
72
|
+
return { status: "pass" };
|
|
73
|
+
} catch (err) {
|
|
74
|
+
const message = err instanceof Error ? err.message : String(err);
|
|
75
|
+
return { status: "fail", error: message };
|
|
76
|
+
}
|
|
77
|
+
}
|
|
78
|
+
async function checkImportBoundaries(packRoot, hashExclusions) {
|
|
79
|
+
try {
|
|
80
|
+
await validatePackImportBoundaries(packRoot, hashExclusions);
|
|
81
|
+
return { status: "pass" };
|
|
82
|
+
} catch (err) {
|
|
83
|
+
const message = err instanceof Error ? err.message : String(err);
|
|
84
|
+
return { status: "fail", error: message };
|
|
85
|
+
}
|
|
86
|
+
}
|
|
87
|
+
async function computeIntegrity(packRoot, hashExclusions) {
|
|
88
|
+
try {
|
|
89
|
+
const hash = await computeDeterministicPackHash({
|
|
90
|
+
packRoot,
|
|
91
|
+
exclusions: hashExclusions
|
|
92
|
+
});
|
|
93
|
+
return { status: "pass", hash };
|
|
94
|
+
} catch (err) {
|
|
95
|
+
const message = err instanceof Error ? err.message : String(err);
|
|
96
|
+
return { status: "fail", error: message };
|
|
97
|
+
}
|
|
98
|
+
}
|
|
99
|
+
function isObjectRecord(value) {
|
|
100
|
+
return typeof value === "object" && value !== null;
|
|
101
|
+
}
|
|
102
|
+
function extractNetworkUrls(tool) {
|
|
103
|
+
const inputSchema = tool.input_schema;
|
|
104
|
+
if (!isObjectRecord(inputSchema)) {
|
|
105
|
+
return [];
|
|
106
|
+
}
|
|
107
|
+
const properties = inputSchema.properties;
|
|
108
|
+
if (!isObjectRecord(properties)) {
|
|
109
|
+
return [];
|
|
110
|
+
}
|
|
111
|
+
const urlSchema = properties[NETWORK_URL_PROPERTY];
|
|
112
|
+
if (!isObjectRecord(urlSchema)) {
|
|
113
|
+
return [];
|
|
114
|
+
}
|
|
115
|
+
if (typeof urlSchema.const === "string") {
|
|
116
|
+
return [urlSchema.const];
|
|
117
|
+
}
|
|
118
|
+
if (!Array.isArray(urlSchema.enum)) {
|
|
119
|
+
return [];
|
|
120
|
+
}
|
|
121
|
+
return urlSchema.enum.filter((candidate) => typeof candidate === "string");
|
|
122
|
+
}
|
|
123
|
+
function lintPermissionScopeConsistency(tool) {
|
|
124
|
+
const pathScopes = tool.required_scopes.filter(
|
|
125
|
+
(scope) => scope.type === "path"
|
|
126
|
+
);
|
|
127
|
+
const hasWritePathScope = pathScopes.some((scope) => scope.access === "write");
|
|
128
|
+
const issues = [];
|
|
129
|
+
if (tool.permission === "read" && hasWritePathScope) {
|
|
130
|
+
issues.push(SECURITY_LINT_ERROR.PERMISSION_SCOPE_READ_WRITE);
|
|
131
|
+
}
|
|
132
|
+
if (tool.permission === "write" && pathScopes.length > 0 && !hasWritePathScope) {
|
|
133
|
+
issues.push(SECURITY_LINT_ERROR.PERMISSION_SCOPE_WRITE_MISSING);
|
|
134
|
+
}
|
|
135
|
+
return issues;
|
|
136
|
+
}
|
|
137
|
+
function runSecurityLint(manifest) {
|
|
138
|
+
const issues = /* @__PURE__ */ new Set();
|
|
139
|
+
for (const tool of manifest.tools) {
|
|
140
|
+
for (const issue of lintPermissionScopeConsistency(tool)) {
|
|
141
|
+
issues.add(`Tool "${tool.name}": ${issue}`);
|
|
142
|
+
}
|
|
143
|
+
for (const issue of validateDomainPackToolSafety(tool)) {
|
|
144
|
+
issues.add(`Tool "${tool.name}": ${issue}`);
|
|
145
|
+
}
|
|
146
|
+
const hasNetworkScope = tool.required_scopes.some((scope) => scope.type === "network");
|
|
147
|
+
for (const scope of tool.required_scopes) {
|
|
148
|
+
if (scope.type !== "path") {
|
|
149
|
+
continue;
|
|
150
|
+
}
|
|
151
|
+
if ((tool.permission === "write" || tool.permission === "admin") && scope.access === "write" && isBroadWildcardScopePattern(scope.pattern)) {
|
|
152
|
+
issues.add(`Tool "${tool.name}": ${SECURITY_LINT_ERROR.WILDCARD_WRITE}`);
|
|
153
|
+
}
|
|
154
|
+
}
|
|
155
|
+
if (!hasNetworkScope) {
|
|
156
|
+
continue;
|
|
157
|
+
}
|
|
158
|
+
const allowedUrls = extractNetworkUrls(tool);
|
|
159
|
+
if (allowedUrls.length === 0) {
|
|
160
|
+
issues.add(`Tool "${tool.name}": ${SECURITY_LINT_ERROR.NETWORK_URL_REQUIRED}`);
|
|
161
|
+
continue;
|
|
162
|
+
}
|
|
163
|
+
for (const allowedUrl of allowedUrls) {
|
|
164
|
+
let parsedUrl;
|
|
165
|
+
try {
|
|
166
|
+
parsedUrl = new URL(allowedUrl);
|
|
167
|
+
} catch {
|
|
168
|
+
issues.add(
|
|
169
|
+
`Tool "${tool.name}" URL "${allowedUrl}": ${SECURITY_LINT_ERROR.NETWORK_URL_INVALID}`
|
|
170
|
+
);
|
|
171
|
+
continue;
|
|
172
|
+
}
|
|
173
|
+
if (parsedUrl.protocol !== HTTPS_PROTOCOL) {
|
|
174
|
+
issues.add(
|
|
175
|
+
`Tool "${tool.name}" URL "${allowedUrl}": ${SECURITY_LINT_ERROR.NETWORK_URL_SCHEME}`
|
|
176
|
+
);
|
|
177
|
+
}
|
|
178
|
+
}
|
|
179
|
+
}
|
|
180
|
+
if (issues.size > 0) {
|
|
181
|
+
return {
|
|
182
|
+
status: "fail",
|
|
183
|
+
error: [...issues].join("\n")
|
|
184
|
+
};
|
|
185
|
+
}
|
|
186
|
+
return { status: "pass" };
|
|
187
|
+
}
|
|
188
|
+
var CHECK_LABELS = {
|
|
189
|
+
manifest: "Manifest schema",
|
|
190
|
+
importBoundaries: "Import boundaries",
|
|
191
|
+
toolEntries: "Tool entry resolution",
|
|
192
|
+
securityLint: "Security lint",
|
|
193
|
+
integrity: "Integrity hash"
|
|
194
|
+
};
|
|
195
|
+
var STATUS_INDICATORS = {
|
|
196
|
+
pass: "PASS",
|
|
197
|
+
fail: "FAIL",
|
|
198
|
+
skip: "SKIP"
|
|
199
|
+
};
|
|
200
|
+
function formatValidationReport(result) {
|
|
201
|
+
const lines = [];
|
|
202
|
+
lines.push("Pack Validation Report");
|
|
203
|
+
lines.push("=====================");
|
|
204
|
+
lines.push("");
|
|
205
|
+
const checks = [
|
|
206
|
+
["manifest", result.manifest],
|
|
207
|
+
["importBoundaries", result.importBoundaries],
|
|
208
|
+
["toolEntries", result.toolEntries],
|
|
209
|
+
["securityLint", result.securityLint],
|
|
210
|
+
["integrity", result.integrity]
|
|
211
|
+
];
|
|
212
|
+
for (const [key, check] of checks) {
|
|
213
|
+
const label = CHECK_LABELS[key];
|
|
214
|
+
const indicator = STATUS_INDICATORS[check.status];
|
|
215
|
+
lines.push(` [${indicator}] ${label}`);
|
|
216
|
+
if (check.status === "fail" && check.error) {
|
|
217
|
+
lines.push(` Error: ${check.error}`);
|
|
218
|
+
}
|
|
219
|
+
if (key === "integrity" && "hash" in check && check.hash) {
|
|
220
|
+
lines.push(` Hash: sha256:${check.hash}`);
|
|
221
|
+
}
|
|
222
|
+
}
|
|
223
|
+
lines.push("");
|
|
224
|
+
lines.push(`Result: ${result.allPassed ? "ALL CHECKS PASSED" : "VALIDATION FAILED"}`);
|
|
225
|
+
return lines.join("\n");
|
|
226
|
+
}
|
|
227
|
+
var PACK_VALIDATE_OPTIONS = {
|
|
228
|
+
packId: {
|
|
229
|
+
name: "id",
|
|
230
|
+
flags: "--id <packId>",
|
|
231
|
+
description: "Pack ID to validate (resolves under --packs-root)"
|
|
232
|
+
},
|
|
233
|
+
packsRoot: {
|
|
234
|
+
name: "packsRoot",
|
|
235
|
+
flags: "--packs-root <dir>",
|
|
236
|
+
description: `Root directory containing packs (default: "${DEFAULT_PACKS_ROOT}")`
|
|
237
|
+
},
|
|
238
|
+
packRoot: {
|
|
239
|
+
name: "packRoot",
|
|
240
|
+
flags: "--pack-root <dir>",
|
|
241
|
+
description: "Direct path to pack directory (overrides --id and --packs-root)"
|
|
242
|
+
}
|
|
243
|
+
};
|
|
244
|
+
async function main() {
|
|
245
|
+
const opts = createWUParser({
|
|
246
|
+
name: "pack-validate",
|
|
247
|
+
description: "Validate a LumenFlow domain pack for integrity",
|
|
248
|
+
options: [
|
|
249
|
+
PACK_VALIDATE_OPTIONS.packId,
|
|
250
|
+
PACK_VALIDATE_OPTIONS.packsRoot,
|
|
251
|
+
PACK_VALIDATE_OPTIONS.packRoot,
|
|
252
|
+
WU_OPTIONS.force
|
|
253
|
+
]
|
|
254
|
+
});
|
|
255
|
+
const packId = opts.id;
|
|
256
|
+
const packsRoot = opts.packsRoot ?? DEFAULT_PACKS_ROOT;
|
|
257
|
+
const directPackRoot = opts.packRoot;
|
|
258
|
+
let resolvedPackRoot;
|
|
259
|
+
if (directPackRoot) {
|
|
260
|
+
resolvedPackRoot = resolve(directPackRoot);
|
|
261
|
+
} else if (packId) {
|
|
262
|
+
resolvedPackRoot = resolve(packsRoot, packId);
|
|
263
|
+
} else {
|
|
264
|
+
console.error(`${LOG_PREFIX} Error: Provide --id <packId> or --pack-root <dir>`);
|
|
265
|
+
process.exit(1);
|
|
266
|
+
}
|
|
267
|
+
console.log(`${LOG_PREFIX} Validating pack at: ${resolvedPackRoot}`);
|
|
268
|
+
const result = await validatePack({ packRoot: resolvedPackRoot });
|
|
269
|
+
const report = formatValidationReport(result);
|
|
270
|
+
console.log(report);
|
|
271
|
+
if (!result.allPassed) {
|
|
272
|
+
process.exit(1);
|
|
273
|
+
}
|
|
274
|
+
}
|
|
275
|
+
if (import.meta.main) {
|
|
276
|
+
void runCLI(main);
|
|
277
|
+
}
|
|
278
|
+
|
|
279
|
+
export {
|
|
280
|
+
LOG_PREFIX,
|
|
281
|
+
validatePack,
|
|
282
|
+
formatValidationReport,
|
|
283
|
+
main
|
|
284
|
+
};
|