ma-agents 2.13.3 → 2.14.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/lib/bmad-workflows/mil498/bmad-mil-generate-ocd.md +1 -1
- package/lib/bmad-workflows/mil498/bmad-mil-generate-sdd.md +1 -1
- package/lib/bmad-workflows/mil498/bmad-mil-generate-sdp.md +1 -1
- package/lib/bmad-workflows/mil498/bmad-mil-generate-srs.md +1 -1
- package/lib/bmad-workflows/mil498/bmad-mil-generate-sss.md +1 -1
- package/lib/bmad-workflows/mil498/bmad-mil-generate-std.md +1 -1
- package/package.json +1 -1
- package/skills/bmad-cyber-generate-certs/SKILL.md +17 -0
- package/skills/bmad-cyber-generate-certs/skill.json +12 -0
- package/skills/bmad-cyber-immunity-estimation/SKILL.md +19 -0
- package/skills/bmad-cyber-immunity-estimation/skill.json +12 -0
- package/skills/bmad-cyber-security-audit/SKILL.md +17 -0
- package/skills/bmad-cyber-security-audit/skill.json +13 -0
- package/skills/bmad-cyber-vault-secrets/SKILL.md +18 -0
- package/skills/bmad-cyber-vault-secrets/skill.json +12 -0
- package/skills/bmad-cyber-verify-docker-users/SKILL.md +13 -0
- package/skills/bmad-cyber-verify-docker-users/skill.json +12 -0
- package/skills/bmad-cyber-verify-image-signature/SKILL.md +12 -0
- package/skills/bmad-cyber-verify-image-signature/skill.json +13 -0
- package/skills/bmad-cyber-vulnerability-scan/SKILL.md +18 -0
- package/skills/bmad-cyber-vulnerability-scan/skill.json +13 -0
- package/skills/bmad-devops-configure-infrastructure/SKILL.md +17 -0
- package/skills/bmad-devops-configure-infrastructure/skill.json +12 -0
- package/skills/bmad-devops-disconnected-deployment/SKILL.md +17 -0
- package/skills/bmad-devops-disconnected-deployment/skill.json +12 -0
- package/skills/bmad-devops-docker-compose-setup/SKILL.md +16 -0
- package/skills/bmad-devops-docker-compose-setup/skill.json +12 -0
- package/skills/bmad-devops-manage-helm/SKILL.md +18 -0
- package/skills/bmad-devops-manage-helm/skill.json +12 -0
- package/skills/bmad-devops-sign-docker-image/SKILL.md +14 -0
- package/skills/bmad-devops-sign-docker-image/skill.json +13 -0
- package/skills/bmad-mil-generate-ocd/SKILL.md +16 -0
- package/skills/bmad-mil-generate-ocd/skill.json +12 -0
- package/skills/bmad-mil-generate-sdd/SKILL.md +16 -0
- package/skills/bmad-mil-generate-sdd/skill.json +12 -0
- package/skills/bmad-mil-generate-sdp/SKILL.md +15 -0
- package/skills/bmad-mil-generate-sdp/skill.json +12 -0
- package/skills/bmad-mil-generate-srs/SKILL.md +18 -0
- package/skills/bmad-mil-generate-srs/skill.json +12 -0
- package/skills/bmad-mil-generate-sss/SKILL.md +15 -0
- package/skills/bmad-mil-generate-sss/skill.json +12 -0
- package/skills/bmad-mil-generate-std/SKILL.md +16 -0
- package/skills/bmad-mil-generate-std/skill.json +12 -0
- package/skills/bmad-sre-check-deployment-status/SKILL.md +22 -0
- package/skills/bmad-sre-check-deployment-status/skill.json +12 -0
- package/skills/bmad-sre-check-secrets/SKILL.md +13 -0
- package/skills/bmad-sre-check-secrets/skill.json +13 -0
- package/skills/bmad-sre-check-system-status/SKILL.md +17 -0
- package/skills/bmad-sre-check-system-status/skill.json +13 -0
- package/skills/bmad-sre-day-2-ops/SKILL.md +15 -0
- package/skills/bmad-sre-day-2-ops/skill.json +12 -0
- package/skills/bmad-sre-deployment-strategies/SKILL.md +17 -0
- package/skills/bmad-sre-deployment-strategies/skill.json +12 -0
- package/skills/bmad-sre-fix-deployments/SKILL.md +15 -0
- package/skills/bmad-sre-fix-deployments/skill.json +12 -0
- package/skills/bmad-sre-gitops-status/SKILL.md +15 -0
- package/skills/bmad-sre-gitops-status/skill.json +13 -0
|
@@ -14,4 +14,4 @@ This workflow generates a MIL-STD-498 OCD document to describe the system from a
|
|
|
14
14
|
- **Section 4 (Nature of proposed changes)**: Overview of the solution.
|
|
15
15
|
- **Section 5 (Operational concept)**: Describe user roles, operational scenarios, and key workflows (from UX/Stories).
|
|
16
16
|
4. **Clarity**: Ensure the document is written in a way that is easily understood by system users and stakeholders.
|
|
17
|
-
5. **Output**: Save the generated document to the `{output_folder}
|
|
17
|
+
5. **Output**: Save the generated document to the `{output_folder}/planning-artifacts/` as `OCD.md`.
|
|
@@ -15,4 +15,4 @@ This workflow generates a MIL-STD-498 SDD document (using the SSDD template) bas
|
|
|
15
15
|
- **Section 4 (CSCI architectural design)**: Define components, their interfaces, and data flow.
|
|
16
16
|
- **Section 5 (CSCI detailed design)**: Map Stories to detailed logic and internal data structures.
|
|
17
17
|
4. **Consistency**: Ensure the design matches the requirements specified in the SRS.
|
|
18
|
-
5. **Output**: Save the generated document to the `{output_folder}
|
|
18
|
+
5. **Output**: Save the generated document to the `{output_folder}/planning-artifacts/` as `SDD.md`.
|
|
@@ -14,4 +14,4 @@ This workflow generates a MIL-STD-498 SDP document to outline the development ap
|
|
|
14
14
|
- **Section 4 (Software development process)**: Describe the BMAD-METHOD lifecycle used.
|
|
15
15
|
- **Section 5 (Software development activities)**: Detail the tasks, schedules, and milestones.
|
|
16
16
|
4. **Consistency**: Ensure the plan reflects the actual development methodology being followed.
|
|
17
|
-
5. **Output**: Save the generated document to the `{output_folder}
|
|
17
|
+
5. **Output**: Save the generated document to the `{output_folder}/planning-artifacts/` as `SDP.md`.
|
|
@@ -16,4 +16,4 @@ This workflow generates a MIL-STD-498 SRS document by extracting requirements fr
|
|
|
16
16
|
- **Section 3.3 (External Interface Requirements)**: Map Architecture interface definitions here.
|
|
17
17
|
- **Section 3.10 (Computer Resource Requirements)**: Extract hardware/software constraints from the Architecture document.
|
|
18
18
|
4. **Traceability**: Ensure each requirement has a unique CID and is traced to the original PRD entry.
|
|
19
|
-
5. **Output**: Save the generated document to the `{output_folder}
|
|
19
|
+
5. **Output**: Save the generated document to the `{output_folder}/planning-artifacts/` as `SRS.md`.
|
|
@@ -13,4 +13,4 @@ This workflow generates a MIL-STD-498 SSS document for high-level system require
|
|
|
13
13
|
- **Section 3.3 (System external interface requirements)**: Map top-level interfaces.
|
|
14
14
|
- **Section 3.4 (System internal interface requirements)**: Map interfaces between major subsystems.
|
|
15
15
|
4. **High-Level Focus**: Keep requirements at the system/subsystem level, avoiding low-level software details.
|
|
16
|
-
5. **Output**: Save the generated document to the `{output_folder}
|
|
16
|
+
5. **Output**: Save the generated document to the `{output_folder}/planning-artifacts/` as `SSS.md`.
|
|
@@ -14,4 +14,4 @@ This workflow generates a MIL-STD-498 STD document to define the test cases and
|
|
|
14
14
|
- **Section 4 (Test descriptions)**: Map Story acceptance criteria to specific test cases and procedures.
|
|
15
15
|
- **Section 5 (Requirements traceability)**: Link each test case to one or more SRS requirements.
|
|
16
16
|
4. **Verification**: Ensure all requirements in the SRS have at least one test case.
|
|
17
|
-
5. **Output**: Save the generated document to the `{output_folder}
|
|
17
|
+
5. **Output**: Save the generated document to the `{output_folder}/planning-artifacts/` as `STD.md`.
|
package/package.json
CHANGED
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
# BMAD Cyber: Secure Certificate Generation
|
|
2
|
+
|
|
3
|
+
Automated workflow for generating self-signed certificates using the `self-signed-cert` skill.
|
|
4
|
+
|
|
5
|
+
## Instructions
|
|
6
|
+
1. **Load Skill**: Activate the `self-signed-cert` skill instructions.
|
|
7
|
+
2. **Requirement Analysis**: Determine common name (CN) and Subject Alternative Names (SANs).
|
|
8
|
+
3. **Execution**:
|
|
9
|
+
- **Linux/macOS**:
|
|
10
|
+
- `bash scripts/generate-cert.sh root my-internal-ca`
|
|
11
|
+
- `bash scripts/generate-cert.sh cert my-service localhost`
|
|
12
|
+
- **Windows**:
|
|
13
|
+
- `.\scripts\generate-cert.ps1 -Type root -Name my-internal-ca`
|
|
14
|
+
- `.\scripts\generate-cert.ps1 -Type cert -Name my-service -Dns localhost`
|
|
15
|
+
4. **Packaging**: Provide instructions for importing the cert into trust stores (OS, Browsers) or mounting in Kubernetes secrets.
|
|
16
|
+
5. **Security**: Ensure private keys are stored with restricted permissions (600).
|
|
17
|
+
6. **Rotation**: Offer a schedule for certificate renewal.
|
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
{
|
|
2
|
+
"name": "BMAD Cyber: Generate Certs",
|
|
3
|
+
"description": "Automated workflow for generating self-signed certificates using the self-signed-cert skill",
|
|
4
|
+
"version": "1.0.0",
|
|
5
|
+
"author": "Cyber Analyst",
|
|
6
|
+
"tags": [
|
|
7
|
+
"bmad",
|
|
8
|
+
"cyber",
|
|
9
|
+
"security",
|
|
10
|
+
"certificates"
|
|
11
|
+
]
|
|
12
|
+
}
|
|
@@ -0,0 +1,19 @@
|
|
|
1
|
+
# BMAD Cyber: Immunity Estimation
|
|
2
|
+
|
|
3
|
+
Assesses the overall security posture and 'immunity' of the system against common attack vectors.
|
|
4
|
+
|
|
5
|
+
## Instructions
|
|
6
|
+
1. **Attack Surface Analysis**: Identify all entry points (APIs, UI, SSH, 3rd party integrations).
|
|
7
|
+
2. **Control Verification**:
|
|
8
|
+
- Authentication/Authorization presence.
|
|
9
|
+
- Encryption in transit and at rest.
|
|
10
|
+
- Secret management maturity (Hardcoded vs Vault).
|
|
11
|
+
3. **Posture Scoring**: Rate 1-10 on:
|
|
12
|
+
- Code quality/Sanitization.
|
|
13
|
+
- Dependency health.
|
|
14
|
+
- Infrastructure hardening.
|
|
15
|
+
- Visibility/Logging.
|
|
16
|
+
4. **Immunity Report**:
|
|
17
|
+
- Summarize major gaps.
|
|
18
|
+
- Provide a roadmap for reach 'Immunity Level 5' (Robust).
|
|
19
|
+
5. **Verification**: Recommend automated regression tests for security controls.
|
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
{
|
|
2
|
+
"name": "BMAD Cyber: Immunity Estimation",
|
|
3
|
+
"description": "Assess overall security posture and immunity against common attack vectors",
|
|
4
|
+
"version": "1.0.0",
|
|
5
|
+
"author": "Cyber Analyst",
|
|
6
|
+
"tags": [
|
|
7
|
+
"bmad",
|
|
8
|
+
"cyber",
|
|
9
|
+
"security",
|
|
10
|
+
"assessment"
|
|
11
|
+
]
|
|
12
|
+
}
|
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
# BMAD Cyber: Comprehensive Security Audit
|
|
2
|
+
|
|
3
|
+
Deep-dive audit of infrastructure and application configuration.
|
|
4
|
+
|
|
5
|
+
## Instructions
|
|
6
|
+
1. **Infrastructure Audit**:
|
|
7
|
+
- **K8s**: Check for privileged containers, missing network policies, root users.
|
|
8
|
+
- **Docker**: Check for exposed ports, unnecessary packages in images.
|
|
9
|
+
2. **Code Audit**:
|
|
10
|
+
- Static Analysis (SAST) for common patterns (SQLi, XSS).
|
|
11
|
+
- Check for insecure defaults in frameworks.
|
|
12
|
+
3. **Identity Audit**:
|
|
13
|
+
- Review ServiceAccount permissions (RBAC).
|
|
14
|
+
- Check for hard-coded credentials.
|
|
15
|
+
4. **Final Recommendation**:
|
|
16
|
+
- Provide a prioritized list of hardening tasks.
|
|
17
|
+
- Propose CIDCD guardrails.
|
|
@@ -0,0 +1,13 @@
|
|
|
1
|
+
{
|
|
2
|
+
"name": "BMAD Cyber: Security Audit",
|
|
3
|
+
"description": "Deep-dive audit of infrastructure and application configuration",
|
|
4
|
+
"version": "1.0.0",
|
|
5
|
+
"author": "Cyber Analyst",
|
|
6
|
+
"tags": [
|
|
7
|
+
"bmad",
|
|
8
|
+
"cyber",
|
|
9
|
+
"audit",
|
|
10
|
+
"infrastructure",
|
|
11
|
+
"code"
|
|
12
|
+
]
|
|
13
|
+
}
|
|
@@ -0,0 +1,18 @@
|
|
|
1
|
+
# BMAD Cyber: Vault Secret Management
|
|
2
|
+
|
|
3
|
+
This skill guides the agent through managing secrets, policies, and authentication in HashiCorp Vault.
|
|
4
|
+
|
|
5
|
+
## Instructions
|
|
6
|
+
1. **Check Connection**: Verify `vault status` and authentication.
|
|
7
|
+
2. **Secret Creation/Update**:
|
|
8
|
+
- `vault kv put secret/{path} {key}={value}`
|
|
9
|
+
- Ensure secrets are never logged or echoed in plain text.
|
|
10
|
+
3. **Policy Management**:
|
|
11
|
+
- Define HCL policies for restricted access.
|
|
12
|
+
- `vault policy write {name} {policy_file}`
|
|
13
|
+
4. **Integration**:
|
|
14
|
+
- Manage Kubernetes auth method: `vault auth enable kubernetes`
|
|
15
|
+
- Setup Vault Agent injector configurations.
|
|
16
|
+
5. **Audit**:
|
|
17
|
+
- Check for expired tokens or orphaned secrets.
|
|
18
|
+
- Review access logs if available.
|
|
@@ -0,0 +1,13 @@
|
|
|
1
|
+
# BMAD Cyber: Docker User & Hardening Verification
|
|
2
|
+
|
|
3
|
+
This skill guides the Cyber agent through auditing Docker images for proper user management and least privilege.
|
|
4
|
+
|
|
5
|
+
## Instructions
|
|
6
|
+
1. **Inspect Metadata**:
|
|
7
|
+
- Use the `docker-hardening-verification` skill.
|
|
8
|
+
- Run: `bash skills/docker-hardening-verification/scripts/verify-hardening.sh {image_name}`.
|
|
9
|
+
2. **Audit Result Analysis**:
|
|
10
|
+
- **UID Check**: Confirm the defined user is non-zero.
|
|
11
|
+
- **Permissive Files**: Scan for world-writable files in common paths (/tmp, /etc, /var).
|
|
12
|
+
3. **Governance Check**: Ensure the image follows OpenShift/hardened cluster requirements (no root, arbitrary UID support).
|
|
13
|
+
4. **Reporting**: provide a high-level summary of hardening quality and mandatory fixes.
|
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
# BMAD Cyber: Docker Image Signature Verification
|
|
2
|
+
|
|
3
|
+
This skill guides the Cyber agent through verifying that a Docker image has been properly signed.
|
|
4
|
+
|
|
5
|
+
## Instructions
|
|
6
|
+
1. **Identify Image**: Get the image name and digest.
|
|
7
|
+
2. **Locate Public Key**: Obtain the public key or certificate used for signing.
|
|
8
|
+
3. **Execute Verification**:
|
|
9
|
+
- Use `cosign verify --key {public_key} {image_digest}`.
|
|
10
|
+
- Check the output for valid signatures.
|
|
11
|
+
4. **Policy Compliance**: Verify if the signing entity (certificate CN) matches the expected trusted authorities.
|
|
12
|
+
5. **Report**: Alert the user if the image is unsigned or the signature is invalid.
|
|
@@ -0,0 +1,18 @@
|
|
|
1
|
+
# BMAD Cyber: Vulnerability Scan Orchestration
|
|
2
|
+
|
|
3
|
+
Orchestrates multiple security-focused skills from the `ma-agents` package to provide a comprehensive security scan.
|
|
4
|
+
|
|
5
|
+
## Instructions
|
|
6
|
+
1. **Select Scanners**: Based on project tech stack, trigger:
|
|
7
|
+
- **JS/TS**: `js-ts-security-skill`
|
|
8
|
+
- **Python**: `python-security-skill`
|
|
9
|
+
- **Docker**: `verify-hardened-docker-skill`
|
|
10
|
+
2. **Run Tools**:
|
|
11
|
+
- Execute `npm audit` or `yarn audit`.
|
|
12
|
+
- Run `pip-audit` for Python environments.
|
|
13
|
+
- Run `trivy image {image}` for containers.
|
|
14
|
+
3. **Aggregate Results**: Collect all findings into a unified report.
|
|
15
|
+
4. **Prioritization**: Rank vulnerabilities by CVSS score and exploitability.
|
|
16
|
+
5. **Remediation**:
|
|
17
|
+
- Propose version upgrades.
|
|
18
|
+
- Propose configuration hardening steps.
|
|
@@ -0,0 +1,13 @@
|
|
|
1
|
+
{
|
|
2
|
+
"name": "BMAD Cyber: Vulnerability Scan",
|
|
3
|
+
"description": "Orchestrate security-focused skills for a comprehensive security scan",
|
|
4
|
+
"version": "1.0.0",
|
|
5
|
+
"author": "Cyber Analyst",
|
|
6
|
+
"tags": [
|
|
7
|
+
"bmad",
|
|
8
|
+
"cyber",
|
|
9
|
+
"security",
|
|
10
|
+
"scan",
|
|
11
|
+
"vulnerability"
|
|
12
|
+
]
|
|
13
|
+
}
|
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
# BMAD DevOps: Configure Infrastructure
|
|
2
|
+
|
|
3
|
+
This skill focuses on defining and configuring core infrastructure components in a Kubernetes environment.
|
|
4
|
+
|
|
5
|
+
## Instructions
|
|
6
|
+
1. **Storage Definition**:
|
|
7
|
+
- Define `PersistentVolume` (PV) with appropriate access modes and storage classes.
|
|
8
|
+
- Define `PersistentVolumeClaim` (PVC) for application workloads.
|
|
9
|
+
2. **Networking**:
|
|
10
|
+
- Configure `Service` type `LoadBalancer` or `Ingress` controllers.
|
|
11
|
+
- Define `NetworkPolicies` for secure communication.
|
|
12
|
+
3. **Disconnected Environments**:
|
|
13
|
+
- Provide templates for local storage provisioners (e.g., hostPath, Local Persistent Volumes).
|
|
14
|
+
- Configure static IP assignments for on-prem load balancers.
|
|
15
|
+
4. **Validation**:
|
|
16
|
+
- Verify binding status: `kubectl get pv,pvc`
|
|
17
|
+
- Verify endpoint availability: `kubectl get endpoints`
|
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
{
|
|
2
|
+
"name": "BMAD DevOps: Configure Infrastructure",
|
|
3
|
+
"description": "Define and configure core infrastructure components in a Kubernetes environment",
|
|
4
|
+
"version": "1.0.0",
|
|
5
|
+
"author": "DevOps Agent",
|
|
6
|
+
"tags": [
|
|
7
|
+
"bmad",
|
|
8
|
+
"devops",
|
|
9
|
+
"kubernetes",
|
|
10
|
+
"infrastructure"
|
|
11
|
+
]
|
|
12
|
+
}
|
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
# BMAD DevOps: Disconnected Environment Deployment
|
|
2
|
+
|
|
3
|
+
Strategies and actions for deploying applications in air-gapped or restricted on-prem environments.
|
|
4
|
+
|
|
5
|
+
## Instructions
|
|
6
|
+
1. **Dependency Gathering**:
|
|
7
|
+
- Identify all required container images.
|
|
8
|
+
- Export images: `docker save {image_list} | gzip > images.tar.gz`
|
|
9
|
+
- Package Helm charts: `helm package {chart_path}`
|
|
10
|
+
2. **Target Readiness**:
|
|
11
|
+
- Verify local registry availability.
|
|
12
|
+
- Import images: `docker load < images.tar.gz`
|
|
13
|
+
3. **Deployment**:
|
|
14
|
+
- Use `--set image.repository={local_registry}/{repo}` for Helm.
|
|
15
|
+
- Verify offline connectivity between components.
|
|
16
|
+
4. **Troubleshooting**:
|
|
17
|
+
- Check for 'ImagePullBackOff' due to incorrect registry paths.
|
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
{
|
|
2
|
+
"name": "BMAD DevOps: Disconnected Deployment",
|
|
3
|
+
"description": "Strategies for deploying applications in air-gapped or restricted on-prem environments",
|
|
4
|
+
"version": "1.0.0",
|
|
5
|
+
"author": "DevOps Agent",
|
|
6
|
+
"tags": [
|
|
7
|
+
"bmad",
|
|
8
|
+
"devops",
|
|
9
|
+
"air-gap",
|
|
10
|
+
"disconnected"
|
|
11
|
+
]
|
|
12
|
+
}
|
|
@@ -0,0 +1,16 @@
|
|
|
1
|
+
# BMAD DevOps: Docker Compose Management
|
|
2
|
+
|
|
3
|
+
This skill handles multi-container orchestration using Docker Compose, optimized for development and on-prem deployments.
|
|
4
|
+
|
|
5
|
+
## Instructions
|
|
6
|
+
1. **Define Services**: Map application components to Docker services.
|
|
7
|
+
2. **Environment Sync**: Setup `.env` file management for different environments (on-prem, dev).
|
|
8
|
+
3. **Disconnected Operations**:
|
|
9
|
+
- Build images with `--pull=false` if registry is unavailable.
|
|
10
|
+
- Use local image tags.
|
|
11
|
+
4. **Orchestration**:
|
|
12
|
+
- Setup dependencies with `depends_on` and health checks.
|
|
13
|
+
- Configure volumes for persistence.
|
|
14
|
+
5. **Execution**:
|
|
15
|
+
- `docker-compose up -d`
|
|
16
|
+
- `docker-compose ps`
|
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
{
|
|
2
|
+
"name": "BMAD DevOps: Docker Compose Setup",
|
|
3
|
+
"description": "Multi-container orchestration using Docker Compose optimized for dev and on-prem",
|
|
4
|
+
"version": "1.0.0",
|
|
5
|
+
"author": "DevOps Agent",
|
|
6
|
+
"tags": [
|
|
7
|
+
"bmad",
|
|
8
|
+
"devops",
|
|
9
|
+
"docker",
|
|
10
|
+
"docker-compose"
|
|
11
|
+
]
|
|
12
|
+
}
|
|
@@ -0,0 +1,18 @@
|
|
|
1
|
+
# BMAD DevOps: Manage Helm
|
|
2
|
+
|
|
3
|
+
This skill handles the creation and management of Helm charts and Helm umbrellas for complex systems.
|
|
4
|
+
|
|
5
|
+
## Instructions
|
|
6
|
+
1. **Analyze System**: Determine if a single chart or an umbrella chart (multiple sub-charts) is needed.
|
|
7
|
+
2. **Chart Creation**:
|
|
8
|
+
- `helm create {chart_name}`
|
|
9
|
+
- Structure for disconnected environments: Ensure all chart dependencies are bundled (vendorized).
|
|
10
|
+
3. **Helm Umbrella Setup**:
|
|
11
|
+
- Configure `Chart.yaml` with sub-chart dependencies.
|
|
12
|
+
- Setup `values.yaml` to override sub-chart values.
|
|
13
|
+
4. **On-prem Optimization**:
|
|
14
|
+
- Prepare `chart-save` and `chart-load` routines for air-gapped systems.
|
|
15
|
+
- Configure local registry mirrors.
|
|
16
|
+
5. **Validation**:
|
|
17
|
+
- `helm lint {chart_path}`
|
|
18
|
+
- `helm template {chart_path}`
|
|
@@ -0,0 +1,14 @@
|
|
|
1
|
+
# BMAD DevOps: Docker Image Signing
|
|
2
|
+
|
|
3
|
+
This skill guides the DevOps agent through the process of cryptographically signing a Docker image.
|
|
4
|
+
|
|
5
|
+
## Instructions
|
|
6
|
+
1. **Select Image**: Identify the image to sign.
|
|
7
|
+
2. **Get Digest**: Retrieve the immutable digest: `docker inspect --format='{{index .RepoDigests 0}}' {image_name}`.
|
|
8
|
+
3. **Prepare Certificate**: Locate the certificate file provided by the user.
|
|
9
|
+
4. **Execute Signing**:
|
|
10
|
+
- Use the `docker-image-signing` skill.
|
|
11
|
+
- Path: `skills/docker-image-signing/scripts/sign-image.sh`
|
|
12
|
+
- Run: `bash skills/docker-image-signing/scripts/sign-image.sh {image_digest} {cert_file} {key_file}`
|
|
13
|
+
5. **Verify**: Confirm the signature using `cosign verify`.
|
|
14
|
+
6. **Report**: provide the signed image reference to the user.
|
|
@@ -0,0 +1,13 @@
|
|
|
1
|
+
{
|
|
2
|
+
"name": "BMAD DevOps: Sign Docker Image",
|
|
3
|
+
"description": "Cryptographically sign Docker images for secure supply chain",
|
|
4
|
+
"version": "1.0.0",
|
|
5
|
+
"author": "DevOps Agent",
|
|
6
|
+
"tags": [
|
|
7
|
+
"bmad",
|
|
8
|
+
"devops",
|
|
9
|
+
"security",
|
|
10
|
+
"docker",
|
|
11
|
+
"signing"
|
|
12
|
+
]
|
|
13
|
+
}
|
|
@@ -0,0 +1,16 @@
|
|
|
1
|
+
# Generate Mil-498 OCD
|
|
2
|
+
|
|
3
|
+
This skill generates an Operational Concept Description (OCD) based on the MIL-STD-498 template and BMAD-METHOD records (PRD, Architecture, and UX).
|
|
4
|
+
|
|
5
|
+
## Instructions
|
|
6
|
+
1. **Template**: Load the MIL-STD-498 OCD template from `{project-root}/_bmad/bmm/templates/mil498/OCD.md`.
|
|
7
|
+
2. **Input Data**:
|
|
8
|
+
- Extract the operational need and mission overview from the **PRD**.
|
|
9
|
+
- Use the **Architecture** to describe the system's operational environment.
|
|
10
|
+
- Extract user scenarios and workflows from the **UX Design** and **Stories**.
|
|
11
|
+
3. **Mapping**:
|
|
12
|
+
- **Section 3 (Current system or situation)**: Describe the "as-is" state.
|
|
13
|
+
- **Section 4 (Nature of proposed changes)**: Overview of the solution.
|
|
14
|
+
- **Section 5 (Operational concept)**: Describe user roles, operational scenarios, and key workflows (from UX/Stories).
|
|
15
|
+
4. **Clarity**: Ensure the document is written in a way that is easily understood by system users and stakeholders.
|
|
16
|
+
5. **Output**: Save the generated document to the `{output_folder}/planning-artifacts/` as `OCD.md`.
|
|
@@ -0,0 +1,16 @@
|
|
|
1
|
+
# Generate Mil-498 SDD
|
|
2
|
+
|
|
3
|
+
This skill generates a Software Design Description (SDD) based on the MIL-STD-498 template and BMAD-METHOD records (PRD, Architecture, UX, Epics, and Stories).
|
|
4
|
+
|
|
5
|
+
## Instructions
|
|
6
|
+
1. **Template**: Load the MIL-STD-498 SSDD template from `{project-root}/_bmad/bmm/templates/mil498/SSDD.md`.
|
|
7
|
+
2. **Input Data**:
|
|
8
|
+
- Use the **Architecture** document for high-level structure.
|
|
9
|
+
- Extract detailed component logic from **Epics** and **Stories**.
|
|
10
|
+
- Use **UX Design** for interface layouts and interaction flows.
|
|
11
|
+
3. **Mapping**:
|
|
12
|
+
- **Section 3 (CSCI-wide design decisions)**: Map architectural decisions and design constraints.
|
|
13
|
+
- **Section 4 (CSCI architectural design)**: Define components, their interfaces, and data flow.
|
|
14
|
+
- **Section 5 (CSCI detailed design)**: Map Stories to detailed logic and internal data structures.
|
|
15
|
+
4. **Consistency**: Ensure the design matches the requirements specified in the SRS.
|
|
16
|
+
5. **Output**: Save the generated document to the `{output_folder}/planning-artifacts/` as `SDD.md`.
|
|
@@ -0,0 +1,15 @@
|
|
|
1
|
+
# Generate Mil-498 SDP
|
|
2
|
+
|
|
3
|
+
This skill generates a Software Development Plan (SDP) based on the MIL-STD-498 template and BMAD-METHOD records (Product Brief and PRD).
|
|
4
|
+
|
|
5
|
+
## Instructions
|
|
6
|
+
1. **Template**: Load the MIL-STD-498 SDP template from `{project-root}/_bmad/bmm/templates/mil498/SDP.md`.
|
|
7
|
+
2. **Input Data**:
|
|
8
|
+
- Extract project overview and constraints from the **Product Brief**.
|
|
9
|
+
- Use the **PRD** for scope and high-level requirements.
|
|
10
|
+
3. **Mapping**:
|
|
11
|
+
- **Section 3 (Project organization and resources)**: Define the team structure and resource requirements.
|
|
12
|
+
- **Section 4 (Software development process)**: Describe the BMAD-METHOD lifecycle used.
|
|
13
|
+
- **Section 5 (Software development activities)**: Detail the tasks, schedules, and milestones.
|
|
14
|
+
4. **Consistency**: Ensure the plan reflects the actual development methodology being followed.
|
|
15
|
+
5. **Output**: Save the generated document to the `{output_folder}/planning-artifacts/` as `SDP.md`.
|
|
@@ -0,0 +1,18 @@
|
|
|
1
|
+
# Generate Mil-498 SRS
|
|
2
|
+
|
|
3
|
+
This skill generates a Software Requirements Specification (SRS) based on the MIL-STD-498 template and BMAD-METHOD records (PRD, Architecture, UX, and Epics).
|
|
4
|
+
|
|
5
|
+
## Instructions
|
|
6
|
+
1. **Template**: Load the MIL-STD-498 SRS template from `{project-root}/_bmad/bmm/templates/mil498/SRS.md`.
|
|
7
|
+
2. **Input Data**:
|
|
8
|
+
- Gather requirements from the **PRD**.
|
|
9
|
+
- Extract interface requirements from the **Architecture** document.
|
|
10
|
+
- Extract user interface constraints from the **UX Design** document.
|
|
11
|
+
- Map functional requirements to the **Epics**.
|
|
12
|
+
3. **Mapping**:
|
|
13
|
+
- **Section 3.1 (Required States and Modes)**: Map system states defined in the PRD/Architecture.
|
|
14
|
+
- **Section 3.2 (CSCI Capability Requirements)**: Map functional requirements from PRD and Epics.
|
|
15
|
+
- **Section 3.3 (External Interface Requirements)**: Map Architecture interface definitions here.
|
|
16
|
+
- **Section 3.10 (Computer Resource Requirements)**: Extract hardware/software constraints from the Architecture document.
|
|
17
|
+
4. **Traceability**: Ensure each requirement has a unique CID and is traced to the original PRD entry.
|
|
18
|
+
5. **Output**: Save the generated document to the `{output_folder}/planning-artifacts/` as `SRS.md`.
|
|
@@ -0,0 +1,15 @@
|
|
|
1
|
+
# Generate Mil-498 SSS
|
|
2
|
+
|
|
3
|
+
This skill generates a System/Subsystem Specification (SSS) based on the MIL-STD-498 template and BMAD-METHOD records (Product Brief and PRD).
|
|
4
|
+
|
|
5
|
+
## Instructions
|
|
6
|
+
1. **Template**: Load the MIL-STD-498 SSS template from `{project-root}/_bmad/bmm/templates/mil498/SSS.md`.
|
|
7
|
+
2. **Input Data**:
|
|
8
|
+
- Use the **Product Brief** for high-level system objectives.
|
|
9
|
+
- Extract system-level functional and non-functional requirements from the **PRD**.
|
|
10
|
+
3. **Mapping**:
|
|
11
|
+
- **Section 3.1 (System capability requirements)**: Map top-level functional requirements.
|
|
12
|
+
- **Section 3.3 (System external interface requirements)**: Map top-level interfaces.
|
|
13
|
+
- **Section 3.4 (System internal interface requirements)**: Map interfaces between major subsystems.
|
|
14
|
+
4. **High-Level Focus**: Keep requirements at the system/subsystem level, avoiding low-level software details.
|
|
15
|
+
5. **Output**: Save the generated document to the `{output_folder}/planning-artifacts/` as `SSS.md`.
|
|
@@ -0,0 +1,16 @@
|
|
|
1
|
+
# Generate Mil-498 STD
|
|
2
|
+
|
|
3
|
+
This skill generates a Software Test Description (STD) based on the MIL-STD-498 template and BMAD-METHOD records (Architecture, Epics, and Stories).
|
|
4
|
+
|
|
5
|
+
## Instructions
|
|
6
|
+
1. **Template**: Load the MIL-STD-498 STD template from `{project-root}/_bmad/bmm/templates/mil498/STD.md`.
|
|
7
|
+
2. **Input Data**:
|
|
8
|
+
- Use the **Architecture** to define the test environment.
|
|
9
|
+
- Extract test scenarios from **Epics**.
|
|
10
|
+
- Extract detailed acceptance criteria from **Stories**.
|
|
11
|
+
3. **Mapping**:
|
|
12
|
+
- **Section 3 (Test preparations)**: Describe hardware/software needed for testing.
|
|
13
|
+
- **Section 4 (Test descriptions)**: Map Story acceptance criteria to specific test cases and procedures.
|
|
14
|
+
- **Section 5 (Requirements traceability)**: Link each test case to one or more SRS requirements.
|
|
15
|
+
4. **Verification**: Ensure all requirements in the SRS have at least one test case.
|
|
16
|
+
5. **Output**: Save the generated document to the `{output_folder}/planning-artifacts/` as `STD.md`.
|
|
@@ -0,0 +1,22 @@
|
|
|
1
|
+
# BMAD SRE: Check Deployment Status
|
|
2
|
+
|
|
3
|
+
This skill guides the agent through checking the status of a specific deployment in a Kubernetes cluster.
|
|
4
|
+
|
|
5
|
+
## Parameters
|
|
6
|
+
- `{namespace}`: The namespace of the deployment (default: `default`)
|
|
7
|
+
- `{deployment_name}`: The name of the deployment to check
|
|
8
|
+
|
|
9
|
+
## Instructions
|
|
10
|
+
1. **Identify Resource**: Determine the `{deployment_name}` and `{namespace}` from user input or context.
|
|
11
|
+
2. **Run Diagnostics**:
|
|
12
|
+
- `kubectl get deployment {deployment_name} -n {namespace}`
|
|
13
|
+
- `kubectl describe deployment {deployment_name} -n {namespace}`
|
|
14
|
+
3. **Check Pods**:
|
|
15
|
+
- `kubectl get pods -l app={deployment_name} -n {namespace}`
|
|
16
|
+
- Identify any pods that are NOT in `Running` state.
|
|
17
|
+
4. **Analyze Events**:
|
|
18
|
+
- Look at the `Events` section of the `describe` output for error messages (e.g., `ImagePullBackOff`, `CrashLoopBackOff`).
|
|
19
|
+
5. **Report**:
|
|
20
|
+
- Summarize the current status.
|
|
21
|
+
- Highlight any issues found.
|
|
22
|
+
- Suggest next steps (e.g., "Check logs", "Check resource limits").
|
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
{
|
|
2
|
+
"name": "BMAD SRE: Check Deployment Status",
|
|
3
|
+
"description": "Guides checking the status of a specific deployment in a Kubernetes cluster",
|
|
4
|
+
"version": "1.0.0",
|
|
5
|
+
"author": "SRE Agent",
|
|
6
|
+
"tags": [
|
|
7
|
+
"bmad",
|
|
8
|
+
"sre",
|
|
9
|
+
"kubernetes",
|
|
10
|
+
"diagnostics"
|
|
11
|
+
]
|
|
12
|
+
}
|
|
@@ -0,0 +1,13 @@
|
|
|
1
|
+
# BMAD SRE: Check Secrets
|
|
2
|
+
|
|
3
|
+
This skill helps identify and resolve problems related to Kubernetes Secrets.
|
|
4
|
+
|
|
5
|
+
## Instructions
|
|
6
|
+
1. **Check Visibility**: `kubectl get secret -n {namespace}`
|
|
7
|
+
2. **Verify Mounting**:
|
|
8
|
+
- Check if the deployment actually mounts the secret.
|
|
9
|
+
- `kubectl get deployment {deployment_name} -o yaml | grep secret`
|
|
10
|
+
3. **Check Permissions**: Verify ServiceAccount has permissions to read the secret (RBAC).
|
|
11
|
+
4. **Content Verification**: (Safety first!) Offer to check if keys exist WITHOUT displaying sensitive values unless explicitly requested.
|
|
12
|
+
- `kubectl get secret {name} -n {namespace} -o jsonpath='{.data}'`
|
|
13
|
+
5. **Common Errors**: Look for "Secret not found" or "Authorization" errors in pod events.
|
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
# BMAD SRE: Check System Status
|
|
2
|
+
|
|
3
|
+
This skill provides a high-level overview of the health of the container runtime and orchestration environment.
|
|
4
|
+
|
|
5
|
+
## Instructions
|
|
6
|
+
1. **Detect Runtime**: Check if reachable:
|
|
7
|
+
- `kubectl cluster-info` (Kubernetes)
|
|
8
|
+
- `docker info` (Docker)
|
|
9
|
+
- `podman info` (Podman)
|
|
10
|
+
2. **Resource Overview**:
|
|
11
|
+
- **K8s**: `kubectl get nodes`, `kubectl get pods -A | grep -v Running`
|
|
12
|
+
- **Docker**: `docker ps`, `docker stats --no-stream`
|
|
13
|
+
- **Podman**: `podman ps`, `podman stats --no-stream`
|
|
14
|
+
3. **Cross-Platform Diagnostics**:
|
|
15
|
+
- Check for resource exhaustion (High CPU/Memory).
|
|
16
|
+
- Verify network connectivity between key services.
|
|
17
|
+
4. **Summary Table**: Present a status table of all detected environments.
|
|
@@ -0,0 +1,13 @@
|
|
|
1
|
+
{
|
|
2
|
+
"name": "BMAD SRE: Check System Status",
|
|
3
|
+
"description": "Overview of the health of the container runtime and orchestration environment",
|
|
4
|
+
"version": "1.0.0",
|
|
5
|
+
"author": "SRE Agent",
|
|
6
|
+
"tags": [
|
|
7
|
+
"bmad",
|
|
8
|
+
"sre",
|
|
9
|
+
"kubernetes",
|
|
10
|
+
"docker",
|
|
11
|
+
"diagnostics"
|
|
12
|
+
]
|
|
13
|
+
}
|
|
@@ -0,0 +1,15 @@
|
|
|
1
|
+
# BMAD SRE: Day 2 Operations & Maintenance
|
|
2
|
+
|
|
3
|
+
Focuses on long-term stability, cluster-to-config verification, and periodic maintenance.
|
|
4
|
+
|
|
5
|
+
## Instructions
|
|
6
|
+
1. **Config Verification**:
|
|
7
|
+
- Check current cluster status against the master configuration templates.
|
|
8
|
+
- Verify consistency of secrets, configmaps, and resource limits.
|
|
9
|
+
2. **Resource Optimization**:
|
|
10
|
+
- Review `top nodes` and `top pods`.
|
|
11
|
+
- Identify over-provisioned or under-utilized resources.
|
|
12
|
+
3. **Maintenance Tasks**:
|
|
13
|
+
- Node drain/uncordon (safe handling).
|
|
14
|
+
- Certificate rotation check.
|
|
15
|
+
4. **Automation**: Propose cronjobs for periodic backups or diagnostic reports.
|
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
{
|
|
2
|
+
"name": "BMAD SRE: Day 2 Operations",
|
|
3
|
+
"description": "Long-term stability, cluster-to-config verification, and periodic maintenance",
|
|
4
|
+
"version": "1.0.0",
|
|
5
|
+
"author": "SRE Agent",
|
|
6
|
+
"tags": [
|
|
7
|
+
"bmad",
|
|
8
|
+
"sre",
|
|
9
|
+
"maintenance",
|
|
10
|
+
"optimization"
|
|
11
|
+
]
|
|
12
|
+
}
|
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
# BMAD SRE: Deployment Strategies
|
|
2
|
+
|
|
3
|
+
Guides on implementing and monitoring advanced deployment techniques like Blue-Green, Canary, and Rolling Updates.
|
|
4
|
+
|
|
5
|
+
## Instructions
|
|
6
|
+
1. **Select Strategy**:
|
|
7
|
+
- **Rolling Update**: Standard Kubernetes strategy.
|
|
8
|
+
- **Canary**: Gradual traffic shift (requires Service Mesh or specialized CRDs like Argo Rollouts).
|
|
9
|
+
- **Blue-Green**: Instant switch between versions.
|
|
10
|
+
2. **Strategy Status**:
|
|
11
|
+
- `kubectl get rollouts` (Argo Rollouts)
|
|
12
|
+
- Monitor success metrics (HTTP 2xx vs 5xx) during transition.
|
|
13
|
+
3. **Health Verification**:
|
|
14
|
+
- Verify healthy startup before increasing traffic.
|
|
15
|
+
- Automatically propose rollbacks if SLOs are breached.
|
|
16
|
+
4. **Execution**:
|
|
17
|
+
- Trigger rollout update or promotion.
|
|
@@ -0,0 +1,15 @@
|
|
|
1
|
+
# BMAD SRE: Deployment Fix
|
|
2
|
+
|
|
3
|
+
This skill provides automated troubleshooting steps to resolve common deployment issues.
|
|
4
|
+
|
|
5
|
+
## Instructions
|
|
6
|
+
1. **Detect Issue**: Based on `check-deployment-status` output, identify the root cause.
|
|
7
|
+
2. **Image issues**: If `ImagePullBackOff`, verify image name and registry secrets.
|
|
8
|
+
3. **CrashLoopBackOff**:
|
|
9
|
+
- `kubectl logs {deployment_name} -n {namespace} --previous`
|
|
10
|
+
- Check for missing env vars or config maps.
|
|
11
|
+
4. **Pending State**:
|
|
12
|
+
- Check node resources: `kubectl describe node`
|
|
13
|
+
- Verify PersistentVolumeClaims (PVCs).
|
|
14
|
+
5. **Scaling**: If resource-related, suggest scaling or adjusting `resources.requests/limits`.
|
|
15
|
+
6. **Action**: Offer to apply a fix (e.g., `kubectl apply -f ...` or `kubectl set image ...`).
|
|
@@ -0,0 +1,15 @@
|
|
|
1
|
+
# BMAD SRE: GitOps Status & Drift Detection
|
|
2
|
+
|
|
3
|
+
This skill monitors and reports the synchronization state between your git repository and the cluster using ArgoCD or Flux.
|
|
4
|
+
|
|
5
|
+
## Instructions
|
|
6
|
+
1. **Identify Tool**: Detect if ArgoCD or Flux is in use.
|
|
7
|
+
2. **Sync Status**:
|
|
8
|
+
- **ArgoCD**: `argocd app list`, `argocd app get {app_name}`
|
|
9
|
+
- **Flux**: `flux get kustomizations`, `flux get helmreleases`
|
|
10
|
+
3. **Drift Detection**:
|
|
11
|
+
- Identify "OutOfSync" resources.
|
|
12
|
+
- Compare live state with desired state in git.
|
|
13
|
+
4. **Action**:
|
|
14
|
+
- Offer to trigger a sync: `argocd app sync {app_name}` or `flux reconcile kustomization {name}`.
|
|
15
|
+
- Analyze reasons for permanent drift (e.g., manual cluster changes).
|