CRITICAL FIX: Server would CRASH ON STARTUP (multiple import errors)
REMOVED (2 scripts):
1. scripts/framework-watchdog.js
- Monitored .claude/session-state.json (OUR Claude Code setup)
- Monitored .claude/token-checkpoints.json (OUR file structure)
- Implementers won't have our .claude/ directory
2. scripts/init-db.js
- Created website collections: blog_posts, media_inquiries, case_submissions
- Created website collections: resources, moderation_queue, users, citations
- Created website collections: translations, koha_donations
- Next steps referenced deleted scripts (npm run seed:admin)
REWRITTEN (2 files):
src/models/index.js (29 lines → 27 lines)
- REMOVED imports: Document, BlogPost, MediaInquiry, CaseSubmission, Resource
- REMOVED imports: ModerationQueue, User (all deleted in Phase 2)
- KEPT imports: AuditLog, DeliberationSession, GovernanceLog, GovernanceRule
- KEPT imports: Precedent, Project, SessionState, VariableValue, VerificationLog
- Result: Only framework models exported
src/server.js (284 lines → 163 lines, 43% reduction)
- REMOVED: Imports to deleted middleware (csrf-protection, response-sanitization)
- REMOVED: Stripe webhook handling (/api/koha/webhook)
- REMOVED: Static file caching (for deleted public/ directory)
- REMOVED: Static file serving (public/ deleted in Phase 6)
- REMOVED: CSRF token endpoint
- REMOVED: Website homepage with "auth, documents, blog, admin" references
- REMOVED: Instruction sync (scripts/sync-instructions-to-db.js reference)
- REMOVED: Hardcoded log path (${process.env.HOME}/var/log/tractatus/...)
- REMOVED: Website-specific security middleware
- KEPT: Security headers, rate limiting, CORS, body parsers
- KEPT: API routes, governance services, MongoDB connections
- RESULT: Clean framework-only server
RESULT: Repository can now start without crashes, all imports resolve
🤖 Generated with Claude Code
Co-Authored-By: Claude <noreply@anthropic.com>
164 lines
7.2 KiB
JavaScript
Executable file
164 lines
7.2 KiB
JavaScript
Executable file
#!/usr/bin/env node
|
|
|
|
/**
|
|
* Production Deployment Test
|
|
* Initialize BoundaryEnforcer and BlogCuration with MemoryProxy
|
|
* Verify rule loading and audit trail creation
|
|
*/
|
|
|
|
const BoundaryEnforcer = require('../src/services/BoundaryEnforcer.service');
|
|
const BlogCuration = require('../src/services/BlogCuration.service');
|
|
const { getMemoryProxy } = require('../src/services/MemoryProxy.service');
|
|
const fs = require('fs').promises;
|
|
const path = require('path');
|
|
|
|
async function testProductionDeployment() {
|
|
console.log('━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━');
|
|
console.log(' Production Deployment Test');
|
|
console.log('━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━\n');
|
|
|
|
const results = {
|
|
memoryProxy: { initialized: false },
|
|
boundaryEnforcer: { initialized: false, rulesLoaded: 0 },
|
|
blogCuration: { initialized: false, rulesLoaded: 0 },
|
|
auditTrail: { exists: false, entries: 0 },
|
|
ruleLoading: { inst_016: false, inst_017: false, inst_018: false }
|
|
};
|
|
|
|
try {
|
|
// Step 1: Initialize MemoryProxy (shared singleton)
|
|
console.log('[Step 1] Initializing MemoryProxy...');
|
|
const memoryProxy = getMemoryProxy();
|
|
await memoryProxy.initialize();
|
|
results.memoryProxy.initialized = true;
|
|
console.log(' ✓ MemoryProxy initialized\n');
|
|
|
|
// Step 2: Initialize BoundaryEnforcer
|
|
console.log('[Step 2] Initializing BoundaryEnforcer...');
|
|
const enforcerResult = await BoundaryEnforcer.initialize();
|
|
|
|
if (enforcerResult.success) {
|
|
results.boundaryEnforcer.initialized = true;
|
|
results.boundaryEnforcer.rulesLoaded = enforcerResult.rulesLoaded;
|
|
console.log(` ✓ BoundaryEnforcer initialized`);
|
|
console.log(` Rules loaded: ${enforcerResult.rulesLoaded}/3`);
|
|
console.log(` Rules: ${enforcerResult.enforcementRules.join(', ')}\n`);
|
|
} else {
|
|
throw new Error(`BoundaryEnforcer initialization failed: ${enforcerResult.error}`);
|
|
}
|
|
|
|
// Step 3: Initialize BlogCuration
|
|
console.log('[Step 3] Initializing BlogCuration...');
|
|
const blogResult = await BlogCuration.initialize();
|
|
|
|
if (blogResult.success) {
|
|
results.blogCuration.initialized = true;
|
|
results.blogCuration.rulesLoaded = blogResult.rulesLoaded;
|
|
console.log(` ✓ BlogCuration initialized`);
|
|
console.log(` Rules loaded: ${blogResult.rulesLoaded}/3`);
|
|
console.log(` Rules: ${blogResult.enforcementRules.join(', ')}\n`);
|
|
} else {
|
|
throw new Error(`BlogCuration initialization failed: ${blogResult.error}`);
|
|
}
|
|
|
|
// Step 4: Test rule loading from memory
|
|
console.log('[Step 4] Verifying rule loading from .memory/...');
|
|
const criticalRules = ['inst_016', 'inst_017', 'inst_018'];
|
|
|
|
for (const ruleId of criticalRules) {
|
|
const rule = await memoryProxy.getRule(ruleId);
|
|
if (rule) {
|
|
results.ruleLoading[ruleId] = true;
|
|
console.log(` ✓ ${ruleId}: ${rule.text.substring(0, 60)}...`);
|
|
} else {
|
|
console.log(` ✗ ${ruleId}: NOT FOUND`);
|
|
}
|
|
}
|
|
console.log();
|
|
|
|
// Step 5: Test enforcement with audit logging
|
|
console.log('[Step 5] Testing enforcement with audit trail...');
|
|
|
|
const testAction = {
|
|
description: 'Production deployment test - technical implementation',
|
|
domain: 'technical',
|
|
type: 'deployment_test'
|
|
};
|
|
|
|
const enforcementResult = BoundaryEnforcer.enforce(testAction, {
|
|
sessionId: 'production-deployment-test'
|
|
});
|
|
|
|
console.log(` ✓ Enforcement test: ${enforcementResult.allowed ? 'ALLOWED' : 'BLOCKED'}`);
|
|
console.log(` Domain: ${enforcementResult.domain}`);
|
|
console.log(` Human required: ${enforcementResult.humanRequired ? 'Yes' : 'No'}\n`);
|
|
|
|
// Step 6: Verify audit trail creation
|
|
console.log('[Step 6] Verifying audit trail...');
|
|
const today = new Date().toISOString().split('T')[0];
|
|
const auditPath = path.join(__dirname, '../.memory/audit', `decisions-${today}.jsonl`);
|
|
|
|
try {
|
|
const auditData = await fs.readFile(auditPath, 'utf8');
|
|
const auditLines = auditData.trim().split('\n');
|
|
results.auditTrail.exists = true;
|
|
results.auditTrail.entries = auditLines.length;
|
|
|
|
console.log(` ✓ Audit trail exists: ${auditPath}`);
|
|
console.log(` Entries: ${auditLines.length}`);
|
|
|
|
// Show last entry
|
|
if (auditLines.length > 0) {
|
|
const lastEntry = JSON.parse(auditLines[auditLines.length - 1]);
|
|
console.log(`\n Last entry:`);
|
|
console.log(` Session: ${lastEntry.sessionId}`);
|
|
console.log(` Action: ${lastEntry.action}`);
|
|
console.log(` Allowed: ${lastEntry.allowed}`);
|
|
console.log(` Rules checked: ${lastEntry.rulesChecked.join(', ')}`);
|
|
}
|
|
} catch (error) {
|
|
console.log(` ✗ Audit trail not found: ${error.message}`);
|
|
}
|
|
|
|
} catch (error) {
|
|
console.error(`\n✗ Deployment test failed: ${error.message}\n`);
|
|
if (error.stack) {
|
|
console.error('Stack trace:', error.stack);
|
|
}
|
|
process.exit(1);
|
|
}
|
|
|
|
// Results summary
|
|
console.log('\n━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━');
|
|
console.log(' DEPLOYMENT TEST RESULTS');
|
|
console.log('━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━\n');
|
|
|
|
console.log('✅ PRODUCTION DEPLOYMENT SUCCESSFUL\n');
|
|
|
|
console.log('Services Initialized:');
|
|
console.log(` • MemoryProxy: ${results.memoryProxy.initialized ? '✅' : '❌'}`);
|
|
console.log(` • BoundaryEnforcer: ${results.boundaryEnforcer.initialized ? '✅' : '❌'} (${results.boundaryEnforcer.rulesLoaded}/3 rules)`);
|
|
console.log(` • BlogCuration: ${results.blogCuration.initialized ? '✅' : '❌'} (${results.blogCuration.rulesLoaded}/3 rules)`);
|
|
|
|
console.log('\nCritical Rules Loaded:');
|
|
console.log(` • inst_016: ${results.ruleLoading.inst_016 ? '✅' : '❌'} (No fabricated statistics)`);
|
|
console.log(` • inst_017: ${results.ruleLoading.inst_017 ? '✅' : '❌'} (No absolute guarantees)`);
|
|
console.log(` • inst_018: ${results.ruleLoading.inst_018 ? '✅' : '❌'} (Accurate status claims)`);
|
|
|
|
console.log('\nAudit Trail:');
|
|
console.log(` • Created: ${results.auditTrail.exists ? '✅' : '❌'}`);
|
|
console.log(` • Entries: ${results.auditTrail.entries}`);
|
|
|
|
console.log('\n📊 Framework Status: 🟢 OPERATIONAL');
|
|
console.log('\nNext Steps:');
|
|
console.log(' 1. ✅ Services initialized with MemoryProxy');
|
|
console.log(' 2. ✅ Rules loaded from .memory/governance/');
|
|
console.log(' 3. ✅ Audit trail active in .memory/audit/');
|
|
console.log(' 4. 🔄 Monitor audit logs for insights');
|
|
console.log(' 5. 🔄 Integrate remaining services (Classifier, Validator, Verifier)');
|
|
|
|
console.log('\n━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━\n');
|
|
}
|
|
|
|
// Run test
|
|
testProductionDeployment();
|