feat(core): expose canonical runtime optic requirements artifact#507
Conversation
|
Warning Rate limit exceeded
You’ve run out of usage credits. Purchase more in the billing tab. ⌛ How to resolve this issue?After the wait time has elapsed, a review can be triggered using the We recommend that you space out your commits to avoid hitting the rate limit. 🚦 How do rate limits work?CodeRabbit enforces hourly rate limits for each developer per organization. Our paid plans have higher rate limits than the trial, open-source and free plans. In all cases, we re-allow further reviews after a brief timeout. Please see our FAQ for further information. ℹ️ Review info⚙️ Run configurationConfiguration used: Path: .coderabbit.yaml Review profile: CHILL Plan: Pro Run ID: 📒 Files selected for processing (7)
✨ Finishing Touches🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
🔍 The Case of Pull Request #507Plain-English Readout
Suggested next actions
📚 Glossary (what the Holmes terms mean)
🕵️ SHA-lock HOLMES full report (click to expand)🕵️ SHA-lock HOLMES Investigation
🔍 Executive Deduction"Watson, after careful examination of the evidence, I deduce..." Weighted Completion: ░░░░░░░░░░ 0.0% 🧩 SCS Breakdown
🧪 TCI Breakdown
|
| Component | Risk Share | Points | Count |
|---|---|---|---|
| Drops | 0% | 0 | 0 |
| Renames Without Uid | 0% | 0 | 0 |
| Add Not Null Without Default | 0% | 0 | 0 |
| Non Concurrent Indexes | 0% | 0 | 0 |
📊 The Weight of Evidence
"Observe, Watson, how not all features carry equal importance..."
| Element | Weight | Status | Evidence | Strength | Deduction |
|---|
🚪 Security & Performance Gates
"Elementary security measures, Watson..."
| Gate | Status | Evidence | Holmes's Ruling |
|---|---|---|---|
| Migration Risk | ✅ | MRI: 0.0% | "Trivial risk" |
| Test Coverage | TCI: 0.0% | "Theatrical tests!" | |
| Sensitive Fields | ✅ | 0 fields | "All secured" |
| Evidence Quality | ⛔ | 0 exact · 0 whole-file · 0 coarse | "No evidence citations were available for trust analysis." |
📋 The Verdict
⛔ YOU SHALL NOT PASS
"Critical evidence is missing! Return to your laboratory!"
Signed and sealed,
- S. Holmes, Consulting Detective
[END OF INVESTIGATION FOR COMMIT 4943f52]
🧵 Command Run
- Run ID: run-mp6rq35z-ip72am
- Transmutation: holmes-investigate
- Command: investigate
- Status: completed
- Ledger: /home/runner/work/wesley/wesley/test/fixtures/examples/.wesley-cache/ledger
🩺 Dr. WATSON full report (click to expand)
🩺 Dr. Watson's Independent Verification Report
Medical Examination of Evidence
- Examination Date: 2026-05-15T10:22:44.994Z
- Patient SHA: 4943f52
🔬 Citation Verification
"Let me examine each piece of evidence independently..."
- Citations Examined: 0
- Verified: 0 ✅
- Failed: 0 ❌
- Unable to Verify: 0
- Exact Subrange Citations: 0
- Whole-file Citations: 0
- Coarse Citations: 0
- Evidence Trust: missing
- Trust Note: No evidence citations were available for trust analysis.
Verification Rate: 0.0%
📊 Mathematical Verification
"I shall recalculate Holmes's arithmetic..."
Holmes claimed SCS: 0.0%
Watson calculates: 0.0%
Difference: ✅ Negligible
🔍 Consistency Analysis
"Checking for contradictions in Holmes's deductions..."
🩺 Dr. Watson's Medical Opinion
VERIFICATION: CONCERNS NOTED
"While Holmes's methods are generally sound, I have noted some"
"discrepancies that warrant further investigation. No evidence citations were available for trust analysis."
Respectfully submitted,
- Dr. J. Watson, M.D.
Medical Examiner & Verification Specialist
🧵 Command Run
- Run ID: run-mp6rqsc9-7qgju2
- Transmutation: watson-verify
- Command: verify
- Status: completed
- Ledger: /home/runner/work/wesley/wesley/test/fixtures/examples/.wesley-cache/ledger
🔮 Professor MORIARTY full report (click to expand)
🧠 Professor Moriarty's Temporal Predictions
The Mathematics of Inevitability
- Analysis Date: 2026-05-15T10:23:24.447Z
🔮 Current State
SCS: ░░░░░░░░░░ 0.0%
TCI: ░░░░░░░░░░ 0.0%
MRI: 0.0% risk
Evidence Trust: missing
📈 Velocity Analysis
SCS Velocity: +0.00%/day
Git Activity (window): 24h · commits 2 (0 relevant) · ~2.00 commits/day
↳ Magnitude: ~0 relevant LOC/day across ~0.0 files/day
Activity Index: 3 / 100 (PR 0, Window 8)
Blended Velocity: +0.02%/day
Commit Size Burstiness: 0 / 100 (higher = more uneven commit sizes)
⏰ Completion Predictions
ETA: Cannot predict (insufficient velocity)
"At current velocity, completion is... improbable."
⚠️ Warnings
- Evidence trust is missing; No evidence citations were available for trust analysis.
🧪 Readiness EXPLAIN
- SCS ≥ 80% → FAIL ❌ (actual 0.0%)
- TCI ≥ 70% → FAIL ❌ (actual 0.0%)
- MRI ≤ 40% → PASS ✅ (actual 0.0%)
- CI Stability ≥ 90% (branch main) → FAIL ❌ (actual 88% over ~168h)
- Evidence Trust ≥ moderate → FAIL ❌ (actual missing) — No evidence citations were available for trust analysis.
- Delivery context (last 168h): 0 issues closed · 8 PRs merged (informational, not gating)
Signals blend: SCS velocity (70%) + Git activity (30%, branch-first). Activity only suppresses false plateaus; it never inflates readiness.
📊 Historical Trajectory
05-15: ░░░░░░░░░░ 0.0%
05-15: ░░░░░░░░░░ 0.0%
05-15: ░░░░░░░░░░ 0.0%
"Every problem becomes elementary when reduced to mathematics"
— Professor Moriarty
🧵 Command Run
- Run ID: run-mp6rrmsd-y1p844
- Transmutation: moriarty-predict
- Command: predict
- Status: completed
- Ledger: /home/runner/work/wesley/wesley/test/fixtures/examples/.wesley-cache/ledger
Machine-readable reports: holmes-report.json · watson-report.json · moriarty-report.json (see workflow artifacts).
Filed at 221B Repository Street
|
@codex self-audit finding before remediation:
|
Code Lawyer Activity Summary
No unresolved inline PR review threads were present in the GraphQL review-thread query at audit start. |
Summary
Testing
|
Summary
OpticAdmissionRequirementsArtifactwith Wesley-owned canonical requirements bytes, codec, and digestrequirements_artifactfromcompile_runtime_optic()while keeping structuredOpticAdmissionRequirementsrequirements_digestfrom the exact canonical bytes and include requirements artifact identity in artifact hashingDoctrine
Wesley publishes compiler truth. Echo and other runtimes import compiler truth. Runtimes should verify the requirements artifact bytes/digest/codec instead of recreating admission truth with local serialization.
Validation
cargo test -p wesley-core runtime_opticcargo test -p wesley-core canonical_requirementscargo test -p wesley-corecargo check --workspace --all-targetscargo clippy --workspace --all-targets -- -D warningscargo xtask docs-checkgit diff --checkpnpm run preflight