-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathgovernance.go
More file actions
133 lines (123 loc) · 3.87 KB
/
governance.go
File metadata and controls
133 lines (123 loc) · 3.87 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
package proof
import (
"encoding/json"
"fmt"
"strings"
"time"
"github.com/Clyra-AI/proof/core/schema"
)
// GovernanceEvent is a lightweight, unsigned governance signal that can be
// promoted into a signed proof record.
type GovernanceEvent struct {
EventID string `json:"event_id"`
Timestamp string `json:"timestamp"`
EventType string `json:"event_type"`
AgentID string `json:"agent_id,omitempty"`
ToolName string `json:"tool_name,omitempty"`
Verdict string `json:"verdict,omitempty"`
Context map[string]any `json:"context,omitempty"`
Detail map[string]any `json:"detail,omitempty"`
}
// ValidateGovernanceEvent validates a governance event against the embedded
// governance event schema.
func ValidateGovernanceEvent(event GovernanceEvent) error {
raw, err := json.Marshal(event)
if err != nil {
return err
}
if err := schema.ValidateAgainstSchema(raw, "v1/governance-event-v1.schema.json"); err != nil {
return fmt.Errorf("governance event validation failed: %w", err)
}
if _, err := parseGovernanceTimestamp(event.Timestamp); err != nil {
return fmt.Errorf("governance event validation failed: %w", err)
}
return nil
}
// NewRecordFromEvent creates a proof.Record from a validated governance event.
// The caller is responsible for signing and chain-appending the returned record.
func NewRecordFromEvent(event GovernanceEvent, source string) (*Record, error) {
if err := ValidateGovernanceEvent(event); err != nil {
return nil, err
}
ts, err := parseGovernanceTimestamp(event.Timestamp)
if err != nil {
return nil, err
}
recordType, err := governanceEventRecordType(event.EventType)
if err != nil {
return nil, err
}
eventPayload := cloneAnyMap(event.Detail)
if eventPayload == nil {
eventPayload = map[string]any{}
}
if _, ok := eventPayload["event_id"]; !ok {
eventPayload["event_id"] = strings.TrimSpace(event.EventID)
}
if _, ok := eventPayload["event_type"]; !ok {
eventPayload["event_type"] = strings.TrimSpace(event.EventType)
}
if strings.TrimSpace(event.ToolName) != "" {
if _, ok := eventPayload["tool_name"]; !ok {
eventPayload["tool_name"] = strings.TrimSpace(event.ToolName)
}
}
if strings.TrimSpace(event.Verdict) != "" {
verdict := strings.TrimSpace(event.Verdict)
if recordType == "compiled_action" {
if verdict == "pending" {
if _, ok := eventPayload["verdict"]; !ok {
eventPayload["verdict"] = verdict
}
} else if _, ok := eventPayload["gate_verdict"]; !ok {
eventPayload["gate_verdict"] = verdict
}
} else if _, ok := eventPayload["verdict"]; !ok {
eventPayload["verdict"] = verdict
}
}
return NewRecord(RecordOpts{
Timestamp: ts,
Source: strings.TrimSpace(source),
SourceProduct: strings.TrimSpace(source),
AgentID: strings.TrimSpace(event.AgentID),
Type: recordType,
Event: eventPayload,
Metadata: cloneAnyMap(event.Context),
})
}
func governanceEventRecordType(eventType string) (string, error) {
switch strings.TrimSpace(eventType) {
case "tool_gate":
return "policy_enforcement", nil
case "permission_check":
return "permission_check", nil
case "approval_request":
return "guardrail_activation", nil
case "policy_evaluation":
return "policy_enforcement", nil
case "guardrail_activation":
return "guardrail_activation", nil
case "script_evaluation":
return "compiled_action", nil
default:
return "", fmt.Errorf("unsupported governance event_type: %s", eventType)
}
}
func parseGovernanceTimestamp(raw string) (time.Time, error) {
ts, err := time.Parse(time.RFC3339Nano, strings.TrimSpace(raw))
if err != nil {
return time.Time{}, fmt.Errorf("invalid timestamp %q: %w", raw, err)
}
return ts.UTC(), nil
}
func cloneAnyMap(in map[string]any) map[string]any {
if in == nil {
return nil
}
out := make(map[string]any, len(in))
for k, v := range in {
out[k] = v
}
return out
}